© 2011 Cellcrypt. All rights reserved. Slide 1 www.cellcrypt.com COMPANY CONFIDENTIAL RTN Introduction to Cellcrypt 24 th November 2011 Steve Rogers Director of Sales - Europe
May 27, 2015
© 2011 Cellcrypt. All rights reserved. Slide 1 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Introduction to
Cellcrypt
24th November 2011
Steve Rogers
Director of Sales - Europe
© 2011 Cellcrypt. All rights reserved. Slide 2 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Secure Calling: As Easy as Making a Regular Call
• Choose a name from the address list, or
• Enter a number manually
• Phone’s UI indicates secure call setup, or
• Advises if busy, unavailable
• Secure call in progress
© 2011 Cellcrypt. All rights reserved. Slide 3 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Intuitive GUI - appears like native address book
• Above example - Blackberry
© 2011 Cellcrypt. All rights reserved. Slide 4 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cell Phone Calls Are Vulnerable
Mobile Carrier Fixed Line Network
Active Radio Attack • ‘Man in the middle’ pretends to be
a cell phone base station • Instructs phone to turn off
encryption
Insider Attacks • No/weak encryption on backhaul • Bribed or coerced employees subvert
internal systems including lawful intercept
Network Attacks • Exploits network hardware such as base
stations or microwave repeaters where encryption is not used
Device Attacks • Hardware or software
listening/recording device is placed on device to bypass call encryption
• Requires device access so can be foiled by device management
Passive Radio Attack • Undetectable, listens passively to calls • Decrypts calls if encryption is turned on
by carrier
© 2011 Cellcrypt. All rights reserved. Slide 5 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Why do You Need to Protect Your Calls ?
1. Espionage: Foreign State and Industrial In 2010, a technician who worked in a
Lebanese mobile phone operator was arrested for being an Israeli spy and giving access to phone calls for 14 years.
2010: Indian parliament disrupted over alleged widespread unauthorized government wiretapping.
2010: Pirelli accused of tapping Michelin & Yokahoma in an industrial espionage allegation via insider attack at Telecom Italia.
2010: Global internet data (including voice) were twice redirected through China after a Chinese telecommunications company re-programmed routing tables around the world. Included 8000 US networks including Apple, Dell and CNN.
2010: National carrier pushed hidden software update to all subscribers, Written by surveillance company, the update secretly accesses phone data.
2009: Turkey Prime Minister declares he has been a victim of phone-tapping for six years. Led to revelations of over 50 leading members of judiciary also tapped.
2009: Dominican Republic presidential accuses opponent of electoral fraud and publishes wire-tapping transcripts.
2005: The annual report to the US Congress on Foreign Economic Collection and Industrial Espionage, stated that 108 countries were involved in collection efforts against sensitive and protected US technologies. 40% of global R&D is US, $1Trillion worth of IP lost in 2008. IN 2007 the UK’s MI5 sent a letter to 300 CEO’s warning of attacks from “Chinese state organizations”.
2004: Eavesdroppers tapped the mobile phones of Greek Prime Minister, cabinet ministers and security officials between June 2004-Mar 2005 around the Athens Olympics. About 100 people, whose ranks include journalists and Arabs living in Greece, as well as the country's political and security elite and a US embassy worker, were monitored after snooping software was illegally installed on the systems of Vodafone Greece. Vodafone were fined £51m.
2. Organized Crime
In 2010, Romanian law enforcement authorities arrested 50 people for allegedly using off-the-shelf software to monitor other people's cell phone communications.
2010: Mexican spy centre discovered, including mobile van unit, alleged to be used for intercepting politicians, businessmen and journalists.
Risk of kidnapping of international business executives (estimated 9000 total kidnappings in Venezuela in 2009).
3. Investigative Journalism
2011: UK police re-open investigation into widespread cell phone voicemail hacking by British tabloid News of the World. Allegation is that practice is widespread practice amongst many newspapers. (News of the World is part of media conglomerate News Corp who own The Times, The Sunday Times, The Sun, New York Post, The Wall Street Journal, Dow Jones, Fox and many others).
2010: Ex-girlfriend of England Football captain sues against alleged mobile phone interception.
2008: James Pellicano “P.I. to the stars” was jailed for 3 ½ years for wiretapping activities that he performed on demand against a large number of celebrities and C-level executives. FBI found recordings of conversations that stretched back almost ten years.
© 2011 Cellcrypt. All rights reserved. Slide 6 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Traditional equipment
Jet-990 Mobile Phone Intercept System: Tactical off air GSM, AMPS, HCMTS, CDMA , TDMA ,TACS , PCS , mobile phone intercept system, designed to intercept all cellular telephone. A passive system, it is undetectable and does not interfere with the network.
GSM 3060TP: GSM interceptor tracks GSM cellular telephone traffic in a local area. No hard wired connection to the cellular provider is necessary, as the GSM Interceptor can intercept GSM signals off the air. CDMA version available.
Comstrac: Both fully passive and hybrid active systems for the intercept of GSM cellular communications. For any frequency across 850/900/1800/1900Mhz and from 4 channels up to vehicle installed 128 channel systems. 2G GSM, UMTS and CDMA Protocols are all covered by the range of CTS systems.
Endoacustica GSM 007A: To intercept all cellular systems and transmission. Description: 'a system for receiving digital multi-channel program for the monitoring of mobile communications.
Ability GTReS, AGIS-51, IBIS & ACIS: passive & active cellular interception for GSM & CDMA. Records hundreds of simultaneous calls, SMS, DTMF tones.
Dataforce NDR-320 GSM Interceptor / NDR-330 CDMA Interceptor: provides fully passive (non-detectable) off-air interception of GSM communications in both non-encrypted and encrypted GSM networks.
Traditional commercial equipment used for routine active and passive radio interception
© 2011 Cellcrypt. All rights reserved. Slide 7 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Attacks Are Becoming More Widespread
NEW AND EMERGING THREAT – INTERCEPTION FOR $1,400
Standard Laptop Free, open source software All-purpose radio
transmitter ($1400)
© 2011 Cellcrypt. All rights reserved. Slide 8 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Wireless Arial Surveillance Platform (W.A.S.P)
Altitudes up to 22,000 Feet
Autopilot
GPS
Multiple Options including Wi-Fi and Cellular
Capable of Faking a Base Station & Call Recording
$6,000
© 2011 Cellcrypt. All rights reserved. Slide 9 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Ease of Use combined with Strong Security
Cellcrypt Mobile™
Standard downloadable app for commercial off-the-shelf smartphones
Entirely software-based solution, deployable over-the air in minutes
IP-based running on GSM/CDMA 2G, 3G, 4G, Wi-Fi® and satellite
Certified to US NIST FIPS 140-2 security standard, validated to UK CESG Claims Tested Mark
Nokia
Android BlackBerry
iPhone
Interoperability
© 2011 Cellcrypt. All rights reserved. Slide 10 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt Encrypted Voice Service
Cellcrypt™ Mobile
Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite
Cellcrypt Encrypted Content Delivery Network™ Management Console Signaling Server and globally distributed media servers
© 2011 Cellcrypt. All rights reserved. Slide 11 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt Gateway
Cellcrypt™ Mobile
Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite
PBX Landlines
Voicemail
Cellcrypt™ Gateway
Conference Call
Any phone connected to
PSTN
PSTN
Cellcrypt Encrypted Content Delivery Network™ Management Console Signaling Server and globally distributed media servers
Customer-controlled Office Phone System
Server-based endpoint encrypts/decrypts 50 concurrent calls Interfaces to PBX, passes plaintext calls Leverages PBX functionality
© 2011 Cellcrypt. All rights reserved. Slide 12 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt Private Switch
Cellcrypt™ Mobile
Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite
PBX Landlines
Voicemail
Cellcrypt™ Gateway
Conference Call
Any phone connected to
PSTN
PSTN
Cellcrypt Encrypted Content Delivery Network™
Globally distributed media servers
Management Console Signaling
Cellcrypt Private Switch™
Access to ECDN
Customer-controlled Servers
Customer-controlled Office Phone System
© 2011 Cellcrypt. All rights reserved. Slide 13 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt Solutions for Satellite
Uses standard satellite IP channel (VSAT, BGAN) with no additional hardware
Background IP and Streaming IP modes
Low latency (1000ms) & low bandwidth (24kbps)
Supports multiple, concurrent devices:
Multiple smartphones connected directly to satellite terminal (via Wi-Fi)
Multiple landlines connected directly to Cellcrypt Gateway which is connected to satellite terminal via Ethernet
Benefits
Concurrent callings (eg up to 20 Nokia smartphones on Explorer 700 BGAN (492kbps))
Lower cost than standard satellite call (depending on data plan)
Same device for calling over satellite as well as cellular and Wi-Fi
© 2011 Cellcrypt. All rights reserved. Slide 14 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt: Ease of Use + Strong Security
Downloadable app, no hardware, deployable over-the air in minutes
End-to-end encryption
IP-based running on 2G, 3G, 4G, Wi-Fi® and satellite
Government-grade security
» Certified to US NIST FIPS 140-2 security standard
» Validated to UK CESG Claims Tested Mark security scheme
Industry’s best performance
Nokia
Android BlackBerry
iPhone
Interoperable
© 2011 Cellcrypt. All rights reserved. Slide 15 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Cellcrypt Company Overview
Leadership BlackBerry Alliance Partner: First BlackBerry secure
voice solution, preferred by RIM
Inmarsat Alliance Partner
Telefonica offering in Latin America.
Bid by Defence Contractors and Carriers globally
2010: SC Magazine Award Finalist “Best Encryption Product”
Technical Innovation: High Performance Encryption over variable
wireless networks: unique network
Software-only Encryption (high strength)
50 people, independent, privately owned. Business (offices) in: Europe (London, also HQ & Development)
North America (Washington DC)
Latin America (Miami)
Middle East, Africa & Asia (Dubai)
*Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones
History: founded 2005 2008: world’s first secure mobile-to-mobile IP-based
software-only solution demonstrated
2009: world’s first secure mobile-to-landline IP-based software-only solution
2009: Q2 world’s first BlackBerry® secure voice solution (and first IP call on BlackBerry®)
2009: Q3 world’s first secure calling via satellite from business cell phones*
2010: Q2 world’s first BlackBerry/CDMA secure voice call
2011: Q2 world’s first interoperable secure calls between BlackBerry, iPhone, Android, Nokia
R&
D
Co
mm
erc
ialis
atio
n
© 2011 Cellcrypt. All rights reserved. Slide 16 www.cellcrypt.com COMPANY CONFIDENTIAL RTN
Thank You
www.cellcrypt.com