Adversaries have a lot to gain from hacking into your mobile devices, especially if you handle intellectual property, sensitive material, or secure documents with mandatory federal government labeling. However, using mobile devices, given today’s remote work and frequent travel, is a necessity of the modern workforce.
The following are some examples of vulnerabilities in commercial 5G devices (which are fast and always connected), creating "leaks" in a high-security posture:
The reality: if you are working from a laptop using 5G or unsecured WiFi without additional security layers, you’re exposed. Competitors, adversaries, automated systems, and even the general public could gain access to your otherwise secure files, images, connections, and communications.
Without an advanced solution, this data is ripe for data thieves and their bad intentions. Through nefarious methods and the use of AI, they could access login information, satellite data, sensitive imagery, and information exposing OPSEC. This is a danger for individuals, but particularly for government agencies and corporations, where national security becomes vulnerable.
A connected device, albeit a laptop, cellular device, or a tablet, is vulnerable to the risks above. This is how do we address these risks:
An Enhanced Retransmission Device acts as a high-security physical and logical buffer between your commercial phone and the rest of the world. It doesn't just "detect" threats; it physically re-engineers how the connected device talks to the network.
What if the solution was as simple as a small device you could attach to your laptop?
The good news: It is.
The Aegis R52L significantly minimizes the possibility of remote hacking. You’re a tougher target—which makes data thieves more likely to move on to someone else.
The Aegis R52L is a compact ERD purposely built to the NSA’s Commercial Solutions for Classified (CSfC) laptop use case. Designed and manufactured in the US, the Aegis R52L supports key laptop connection methods (Ethernet, WiFi and USB-C) and meets NSA CSfC’s Mobile Access Capability Package (MACP) requirements for ERDs.
The Aegis model features:
When possible, you should never connect to a network you don’t control, but upgrading the connection with an ERD can keep you safe and connected. Without the Aegis R52L, it’s like you’re connecting directly to an adversary, exposing your communications, data, and login information to them.
Avoiding this misstep is simple.
Contact Riverside Research about Aegis R52L today and match CSfC requirements or visit us at CSfC to learn more.
Enhance security for your organization. Please provide your contact information to inquire about the Aegis R52L ERD.

Tara Clapper is a marketing strategist and content creator at Riverside Research. Her professional background includes technical writing, social media management, publishing, marketing, editorial duties, analog game design, prompt engineering, and content management in govcon, academic, and private sector spaces. Tara helps tell the Riverside Research story by interviewing SMEs for blogs, press releases, and social media channels. Tara holds a Bachelor of the Arts in English from McDaniel College.
LinkedIN
Carl Nerup is the VP of Corporate Development at Riverside Research, including strategic initiatives, partnerships, and alliances. A communications industry veteran, he brings a wealth of knowledge to the leadership team with demonstrated successes in cyber security, embedded systems, mobile/wireless, and new product development.
Prior to Riverside Research’s acquisition of Cog Systems, Carl served as its founder and CEO. He previously worked as the Global Vice President for Samsung where he had responsibility for the secure mobility business. His background also includes strategic development support at General Dynamics and Vice President, Strategic Business Development and Venture & Equity Portfolio Management, at AT&T.
Carl attended the United States Naval Academy and holds a Bachelor of Science from Seattle University. He also received a degree in Data Communication from the University of Washington.
LinkedIN
The above listed authors are current or former employees of Riverside Research. Authors affiliated with other institutions are listed on the full paper. It is the responsibility of the author to list material disclosures in each paper, where applicable – they are not listed here. This academic papers directory is published in accordance with federal guidance to make public and available academic research funded by the federal government.