COMMAND • CONTROL • COMMUNICATIONS
Tactical mesh networking for the edge. Secure, decentralized communications that operate where traditional infrastructure fails. Built for the field, proven under pressure.
JCAN was born from 17 years of direct operational experience in environments where reliable communications are not a convenience — they are a lifeline. From network operations in Afghanistan to managing C4I projects across East Africa, from integrating Patriot missile systems to modernizing DoD communications infrastructure, one gap appeared everywhere: the people who need communications the most are the ones least served by existing solutions.
Traditional networks depend on towers, fiber, satellites, and centralized infrastructure. When those systems are degraded, destroyed, or simply unavailable, teams on the ground lose the ability to coordinate, share intelligence, and maintain situational awareness. JCAN exists to close that gap — providing resilient, encrypted, mesh-based communications that work when nothing else does.
The JC3 platform integrates with enterprise-grade systems like REDCOM SIGMA for unified communications (VoIP, video, chat, conferencing) and the TAK ecosystem (ATAK, WinTAK, TAK Server) for common operating picture and situational awareness. Every design decision — from the mesh topology to the relay architecture — was shaped by the demands of operators at the tactical edge, where failure is not an option and simplicity is a requirement.
No single point of failure. Every node is both a client and a router. The mesh self-heals, self-organizes, and continues operating even when individual nodes are lost. Resilience is not a feature — it is the architecture.
WiFi, Bluetooth, cellular, USB, satellite, cloud relay — the platform adapts to whatever connectivity is available. When one transport degrades, traffic automatically routes through alternatives. The network finds a way.
All mesh traffic is encrypted at the source and decrypted only at the destination. Relay servers, transport layers, and intermediate nodes never see plaintext. Zero-trust is the only trust model that survives contact with reality.
Runs on standard Android hardware. No specialized radios, no proprietary equipment. Deploy on phones and tablets your team already carries. Minimal training. Maximum capability. Operational in minutes, not months.
Real-time GPS tracking, common operating picture, and blue force display give commanders and operators a shared understanding of the battlespace. When everyone sees the same picture, coordination happens naturally.
The concepts behind JC3 were developed and refined through years of hands-on experience in communications-challenged environments. This is not theory — it is practice distilled into software.
JCAN is built by Richard "Chaz" Miller, a Senior Technical C4I, Cybersecurity, and Systems Integration Expert with 17 years of military and defense industry experience. A Cyber Security Warrant Officer (255S) in the South Carolina Army National Guard and the 2024 SC Army National Guard Warrant Officer of the Year, Chaz brings direct operational experience from environments where reliable communications are the difference between mission success and failure.
Currently serving as Lead Systems and Networks Security Engineer at Booz Allen Hamilton, Chaz directs integration and security operations for the Tactical Operations Center Light (TOC-L) program, leads RMF authorization for federal programs, and drives DoD-wide modernization of legacy communications through REDCOM integration. His contributions enabled Booz Allen Hamilton to win the TOC-L Phase II contract.
Most recently deployed as J6 Projects Lead at USA-AFRICOM / CJTF-HOA (2023–2024) across Djibouti, Kenya, and Somalia, managing 12 project managers across East Africa. He integrated Patriot missile systems with IBCS, established coalition network interoperability with partner nations, designed next-generation SATCOM architecture achieving 90% cost reduction, and was awarded the Defense Meritorious Service Medal.
Chaz holds a CISSP from ISC2, GIAC certifications (GCIA, GCWN, GCED), CompTIA Security+ and Linux+, and over 20 active certifications spanning cybersecurity, tactical data links (Link 16, Multi-TDL), air defense systems (Patriot, IBCS, NASAMS, AMDWS), and Type 1 encryption systems (HAIPE, KG-175, KG-250). His technical expertise spans REDCOM, SATCOM, tactical radios (PRC-117G/160/167), AWS GovCloud, Docker, Kubernetes, and Cisco networking.
Every design decision in JC3 — from the mesh topology to the relay architecture to the REDCOM SIGMA and TAK integration — is shaped by hard-won lessons from real-world operations in communications-denied environments. This is not theory. It is practice distilled into software by someone who has built networks under fire, in the dark, with gloves on.
Lead Systems & Networks Security Engineer. TOC-L integration lead. RMF Authorization Lead for MTaaS and federal programs. Designed MR2 theater C2 architecture. Driving DoD-wide REDCOM communications modernization.
J6 Projects Lead across East Africa (Djibouti, Kenya, Somalia). Managed 12 PMs. Integrated Patriot/IBCS air defense. Established coalition interoperability. Designed SATCOM architecture with 90% cost savings. Defense Meritorious Service Medal.
Cyber Security Warrant Officer (255S). 2024 Warrant Officer of the Year. Former 14J Air Defense C2 operator. 25D Cyber Defense Technician. Multiple deployments and military decorations.
Northrop Grumman network operations (Afghanistan). GDIT/AFCENT senior systems (Shaw AFB). Expertise in GCCS-J, JADC2, tactical data links, Starlink/Starshield, and Type 1 encryption systems.
The JC3 platform delivers a fully integrated tactical communications suite — from software-defined mesh networking on commodity Android devices, through web-based command and control, to full interoperability with TAK and REDCOM SIGMA enterprise unified communications. Five components, one operational picture.
The core mesh networking application. A software-only peer-to-peer Mobile Ad-Hoc Network (MANET) running on commodity Android devices — no special hardware required. Nodes self-form and self-heal across 10 simultaneous transports with dual-layer AES-256 + ChaCha20 encryption protecting all traffic end-to-end.
PLATFORM: ANDROID • STATUS: OPERATIONAL
Web-based command and control providing a real-time Common Operating Picture with tactical map overlays, incident management, and AI-assisted network analysis. Live WebSocket updates keep the picture current across all connected operators.
Full interoperability with the Team Awareness Kit ecosystem. CHAZ Mesh bridges directly into ATAK (Android) and WinTAK (Windows) via Cursor on Target (CoT) protocol, delivering blue force tracking and situational awareness across both mesh and TAK networks simultaneously.
PLATFORM: ANDROID / WINDOWS / LINUX • STATUS: OPERATIONAL
Enterprise-grade unified communications integrated into the JC3 mesh. REDCOM SIGMA provides VoIP voice, video teleconference, presence, and chat capabilities that bridge seamlessly from the mesh edge to traditional communications infrastructure.
PLATFORM: CROSS-PLATFORM • STATUS: INTEGRATION
Windows C2 workstation built on Electron, wire-compatible with Android CHAZ mesh nodes. Provides full mesh management, TAK server deployment, and network topology visualization from a desktop environment with gateway and proxy services for infrastructure integration.
PLATFORM: WINDOWS • STATUS: OPERATIONAL
Mission-flexible pricing for every operational scale — from lone operators to enterprise fleet deployments and government programs of record.
ANDROID TACTICAL MESH NETWORKING
COMMAND & CONTROL / COMMON OPERATING PICTURE
MESH RELAY INFRASTRUCTURE
Evaluate the full CHAZ Mesh platform risk-free. No credit card required for self-service trials.
CHAZ Mesh delivers tactical mesh networking at a fraction of the cost of dedicated hardware solutions — using phones your team already carries.
| COMPETITOR | THEIR COST | CHAZ EQUIVALENT | SAVINGS | KEY DIFFERENCE |
|---|---|---|---|---|
| goTenna Pro X | $849/unit | $96/yr (Operator) | 9X CHEAPER | No extra hardware needed |
| Silvus StreamCaster | $10–15K/unit | $96/yr (Operator) | 135X CHEAPER | Software-only, runs on any Android |
| Persistent MPU5 | $15–20K/unit | $96/yr (Operator) | 150X+ CHEAPER | Runs on phones they already carry |
| Cisco Meraki | $100–300/device/yr | $96/yr (Operator) | NO LOCK-IN | No mandatory cloud subscription |
CHAZ is software-only, running on commodity Android phones — no $10K+ radios needed. Delivering 10–100x cheaper per-node cost than hardware mesh competitors while providing multi-transport encryption, TAK integration, and fleet management capabilities that dedicated radio solutions charge a premium for.
| VERSION | 2.0.0 |
| FILE SIZE | 7.8 MB |
| BUILD DATE | 2026-03-03 |
| PLATFORM | Android 8.0+ |
| FILE | chaz-mesh-v2.0.0.apk |
| VERSION | 2.0.0 |
| FILE SIZE | 72 MB |
| BUILD DATE | 2026-03-07 |
| PLATFORM | Windows 10+ |
| FILE | JC3-MESH-2.0.0-portable.exe |
| TYPE | Portable (no install required) |
JC3 MESH is distributed as a direct APK download. Follow these steps to install on your Android device.
EFFECTIVE DATE: JANUARY 1, 2025 • LAST UPDATED: MARCH 2026
By accessing or using the JCAN.US website, the JC3 application suite, or any associated services (collectively, the "Services"), you agree to be bound by these Terms of Service ("Terms"). If you do not agree to these Terms, do not use the Services.
The Services are provided for lawful purposes only. You agree to use the Services in compliance with all applicable federal, state, and local laws and regulations. You may not use the Services for any purpose that is illegal, harmful, or otherwise objectionable.
Certain features of the Services may require authentication. You are responsible for maintaining the confidentiality of your access credentials and for all activities that occur under your account. You agree to notify JCAN.US immediately of any unauthorized use of your account.
All content, software, logos, trademarks, and other intellectual property associated with JCAN.US and the JC3 application suite are the exclusive property of JCAN.US or its licensors. You may not copy, modify, distribute, or create derivative works without prior written consent.
THE SERVICES ARE PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT PERMITTED BY LAW, JCAN.US SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES ARISING FROM YOUR USE OF THE SERVICES.
You agree to indemnify, defend, and hold harmless JCAN.US, its officers, directors, employees, and agents from and against any claims, liabilities, damages, losses, and expenses arising from your use of the Services or violation of these Terms.
JCAN.US reserves the right to suspend or terminate your access to the Services at any time, with or without cause, and with or without notice. Upon termination, your right to use the Services ceases immediately.
These Terms shall be governed by and construed in accordance with the laws of the United States of America. Any disputes arising under these Terms shall be resolved in the courts of competent jurisdiction.
JCAN.US reserves the right to modify these Terms at any time. Changes will be effective upon posting to this page. Your continued use of the Services after changes constitutes acceptance of the modified Terms.
EFFECTIVE DATE: JANUARY 1, 2025 • LAST UPDATED: MARCH 2026
JCAN.US ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, and safeguard information when you use our Services.
We may collect the following types of information:
Information is used to provide and maintain the Services, improve performance and reliability, enforce terms of service, and comply with legal obligations. We do not sell personal information to third parties.
All mesh traffic within the JC3 platform is end-to-end encrypted. Relay servers transport encrypted payloads without the ability to decrypt or inspect the content. JCAN.US does not have access to the content of your mesh communications.
Connection logs and event data are retained in volatile memory during active relay sessions and are not persisted to long-term storage by default. Operators of self-hosted relay servers are responsible for their own data retention policies.
The COP dashboard may load map tiles from third-party providers (CartoDB, Google Maps, OpenStreetMap). These services are subject to their own privacy policies. No personal information is shared with these providers beyond standard HTTP request headers.
You may request access to, correction of, or deletion of your personal information by contacting us. You may disable location services at the device level at any time.
For privacy inquiries, contact: privacy@jcan.us
EFFECTIVE DATE: JANUARY 1, 2025
The JC3 platform and all associated services are provided for informational and communications purposes only. JCAN.US makes no representations or warranties regarding the accuracy, reliability, completeness, or suitability of the Services for any particular purpose.
The Services are not intended to replace certified emergency communications systems, military-grade COMSEC equipment, or regulated communications infrastructure. Users are responsible for ensuring their use of the Services complies with all applicable regulations and does not interfere with licensed radio operations or protected frequencies.
JCAN.US is not affiliated with, endorsed by, or connected to any government entity, military organization, or defense agency. Any resemblance to military systems, nomenclature, or operational procedures is for functional design purposes only.
JCAN.US shall not be held liable for any loss, damage, or injury arising from the use of or inability to use the Services, including but not limited to communications failures, data loss, or security breaches.
GPS position accuracy depends on device hardware, satellite geometry, environmental conditions, and other factors outside of JCAN.US control. Position data should not be relied upon as the sole source of navigation or life-safety information.
EFFECTIVE DATE: JANUARY 1, 2025
You agree not to use the Services to:
Violations of this Acceptable Use Policy may result in immediate termination of access to the Services, blocking of node identifiers, and referral to law enforcement where appropriate.
EFFECTIVE DATE: JANUARY 1, 2025
JC3 software incorporates encryption technology and may be subject to export controls under the U.S. Export Administration Regulations (EAR) and/or the International Traffic in Arms Regulations (ITAR). You are responsible for complying with all applicable export and re-export control laws and regulations.
This software may not be exported, re-exported, or transferred to embargoed countries, sanctioned entities, or prohibited end-users as defined by the U.S. Department of Commerce, Treasury, or State.
The JC3 suite utilizes open-source libraries and components. We acknowledge and are grateful for the contributions of the open-source community. Relevant license information and attribution for third-party dependencies are included in the software distribution.
© 2024–2026 JCAN.US. All rights reserved.
JC3, JCAN Command Control Communications, and the JCAN.US logo are unregistered trademarks of JCAN.US. All other trademarks are property of their respective owners.
Have questions about the JC3 suite, need support, or want to discuss integration? Reach out through any of the channels below.