Enterprise Architect | Strategic Investor & Technology Innovator

"Enterprise architecture (EA) is the practice of analyzing, designing, planning and implementing enterprise analysis to successfully execute on business strategies."

Moonraker

A sail flown immediately above the skysail on top of the royal mast on large, square-rigged clipper ships.
This sail enabled the ship’s master to achieve maximum performance under the prevailing conditions.

 

MoonRaker Associates, founded by Kevin McCarthy, a strategic investor and technology innovator, as well as, an operations and security expert based in Park City UT. Author of several technology patents involving cryptography and an enterprise architect, Kevin maintains equity stakes in, and leadership responsibilities for various endeavors related to CyberSecurity, resilience, and operational environments. Providing a wide range of advice and counsel related to evolving threats in the twenty-first century he is a sought-after discrete resource.

Kevin founded and served as Chairman of the non-profit 501c.3, Friends of Summit County Search And Rescue, www.FSCSAR.org for over four years. FSCSAR is focused on supporting the health, safety, and well-being of the all-volunteer team. The SAR team operates under the statutory authority of the county sheriff and currently consists of 40 members.

Since inception FSCSAR has raised funds which were allocated to acquire critical safety and operational equipment and training for the team. Under his tenure approximately $150K has been invested in excess of county budgeted support. 

Spring 2021 Kevin passed on leadership of the non-profit to further the development of MoonRaker, LLC.

Based at NASA/Kennedy Space Center FL, Mr. McCarthy is a Founding Member of the International Association of Certified ISAOs (IACI) 'Global Cybersecurity Resilience Council', providing executive leadership expertise supporting Space Critical Infrastructure protection

The Global Cybersecurity Resilience Council (GCRC), led by the private-sector, enables trusted open dialogue, critical insight, and thought exchange linking the public- and private-sector to accelerate operationalizing cybersecurity resilience within and across critical infrastructure sectors, sub-sectors, government, public-safety and law enforcement, academia, and other communities of interest.

Mr. McCarthy co-founded the cyber tech startup company                in 2014 and served as COO / Director until fall-2018. The company specializes in quantum-resistant non-mathematically based encryption technology.

As an author of technology patents involving cryptography and an enthusiast for the system Kevin maintains an equity stake in             . He designed the architecture to secure communications channels between business jets, their principals and corporate home base, as well as expanding organically throughout corporate infrastructures.

His extensive global experience in operations, transportation, national security, and counter-terrorism were integral to             engagement throughout a wide range of corporate opportunities where maintaining data integrity has become the Holy Grail.

Kevin is co-inventor on several, Seven patents architected to produce a Post Quantum Cryptography system, these most recently issued greatly increases overall cybersecurity of operations utilizing Quantum Resistant Encryption

 

Cryptographic Systems and Methods For Extending Apparent Size of Pools of Truly Random Numbers

US Patent #11,362,813                                                   Hammon, Hildebrandt, McCarthy                         June 14,2022

 Abstract #7

A first copy of a True Random Number (TRN) pool comprising key data of truly random numbers in a pool of files may be stored on a sender and a second copy of the TRN pool is stored on a receiver. An apparent size of the TRN pool on each device is expanded using a randomizing process for selecting and re-using the key data from the files to produce transmit key data from the first copy and receive key data from the second copy.

 

Random Cipher Pad Cryptography

US Patent #11,245,515                                                         Hammon, McCarthy                                       February 8, 2022

Abstract #6

Methods for a server include defining a starting element and an element step size. A pad mapping is applied to a data Random Cipher Pad (RCP) to obtain a Key RCP using each element of the data RCP once in a predetermined non-sequential order. The starting element and the element step size are combined with the data RCP. The data RCP is encrypted using the Key RCP to produce a subsequent data RCP. The subsequent data RCP is transmitted to another computer. Methods for clients include applying a pad mapping to a data RCP to obtain a Key RCP using each element of the data RCP once in a predetermined non-sequential order to develop the Key RCP. The Key RCP is encrypted using the data RCP to produce a subsequent Key RCP. A data structure is encrypted using the data RCP to produce an encrypted data structure.

 

Devices and methods for enabling portable secure communication using random cipher pad cryptography by enabling communications to be passed to the device from a host, encrypted and/or decrypted, and passed back to the host

US Patent 11,201,729                                                         Hammon, Hildebrandt, McCarthy                     December 14, 2021

Abstract #5

A cryptographic system includes a host device and a cryptographic device. For encryption, the host includes an application that is configured to enable a user to compose an unencrypted message on a user interface and transmit the unencrypted message. The cryptographic device is configured to receive the unencrypted message, encrypt the unencrypted message with RCPs on a non-volatile storage to create an encrypted message, and send the encrypted message to the host, which then transmits the encrypted message through a communication channel. For decryption, the host receives an encrypted message through the communication channel and sends it to the cryptographic device. The cryptographic device decrypts the encrypted message with the RCPs and sends the decrypted message back to the host, which presents the decrypted message on a display. The cryptographic device may be configured to destroy RCPs that have been used up.

 

Systems and Methods for Secure Communication Using Random Cipher Pad Cryptography

US Patent 11,082,211                                                            McCarthy, et al.                                                 August 3, 2021

Abstract #4

Systems and methods with multiple different modes for bidirectional data transfer of messages encrypted with Random Cipher Pads (RCPs) are disclosed. A direct mode is from one single endpoint to another endpoint in a peer-to-peer fashion. A throughput mode may be configured as a communication between endpoints with a cryptographic data server (CDS) managing communications and additional encryption between the endpoints. The CDS further encrypts the messages such that there is a peer-to-peer encryption between the source endpoint and the CDS and a different peer-to-peer encryption between the CDS and destination endpoints. The throughput mode may also be configured as a broadcast communication between a sender and multiple destinations, each with its own different RCP encryption. A router-to-router mode may be thought of as a specific type of peer-to-peer transfer where the peers on each end are routers, servers, Virtual Private Network servers, and gateways rather than user endpoints.

 

Cryptographic Systems and Methods for Modification of Pools of Truly Random Numbers

US Patent #10,855,459                                                        Hammon, Hildebrandt, McCarthy                          December 1, 2020

Abstract #3

Systems and methods include modifying a True Random Number (TRN) pool using one or more user-identified randomization processes to produce a modified TRN pool with a user-specific modification that is unknown to or otherwise separated from a TRN provider. Systems and methods also include sending and receiving encrypted messages that are encrypted and decrypted using the modified TRN pool.

 

Previously issued,

US Patent # 10,637,649, Random cipher pad cryptography  issued April 28, 2020

US Patent #10,003,457, Random Cipher Pad Cryptography issued June 19, 2018

 

 

 

Captain McCarthy has over 33 years of experience flying US military and commercial aircraft, his final command was the B-777 in worldwide operations. As a Director in the Air Line Pilots Association International (ALPA), he created and led the industry’s first Office of Intelligence & Emerging Threats.

He was also was instrumental in establishing the Federal Flight Deck Officer program for the Transportation Security Administration, Department of Homeland Security, and served in the first cadre of sworn officers to go on duty protecting US airliners.

 

Kevin McCarthy has been an advisor to the Departments of Defense and Homeland Security; the US House of Representatives Select Committee on Homeland Security and The White House. In the private sector he has been intimately involved with developing intelligence businesses and operational deployment of aviation assets in conflict zones and developing regions for various clients.

Captain McCarthy authored the Aviation Security portion of "Counterterrorism: Bridging Operations and Theory" - A Terrorism Research Center Book published in 2015;

He was a consulting subject matter expert on the project: "Operational and Business Continuity Planning for Prolonged Airport Disruptions", a report published Nov 2013. The (latter) project for the Airport Cooperative Research Program was sponsored by the FAA and managed by the National Academies through the Transportation Research Board;

The Heritage Foundation engaged Kevin as a contributor to the report "Maritime Security: Fighting Piracy in the Gulf of Aden and Beyond", June 2009;

The American Committees on Foreign Relations have Kevin on their distinguished speakers list as a guest lecturer on issues of global security operations.

A graduate of West Chester University PA, Kevin received advanced intelligence officer education at The Centre for Counterintelligence and Security Studies, Arlington VA. He is a graduate of the Federal Law Enforcement Training Center, Glynco GA. He also has completed the University of Maryland, START curriculum, Understanding Terrorism and the Terrorist Threat.

 

© 2022 - MoonRaker Associates

Contact:

kmccarthy@moonrakerllc.com