SlideShare a Scribd company logo
1 of 16
Download to read offline
Introduction to
                                                     Cellcrypt
                                                          Steve Rogers
                                                    Director of Sales - Europe



                                                        24th November 2011


© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL   www.cellcrypt.com   RTN   Slide 1
Secure Calling: As Easy as Making a Regular Call




 • Choose a name from                    • Phone’s UI indicates                • Secure call
   the address list, or                    secure call setup, or                 in progress
 • Enter a number                        • Advises if busy,
   manually                                unavailable
© 2011 Cellcrypt. All rights reserved.     COMPANY CONFIDENTIAL    www.cellcrypt.com    RTN    Slide 2
Intuitive GUI - appears like native address book




                                         • Above example - Blackberry


© 2011 Cellcrypt. All rights reserved.            COMPANY CONFIDENTIAL   www.cellcrypt.com   RTN   Slide 3
Cell Phone Calls Are Vulnerable

                 Passive Radio Attack                                                 Network Attacks
                 • Undetectable, listens passively to calls                           • Exploits network hardware such as base
                 • Decrypts calls if encryption is turned on                            stations or microwave repeaters where
                   by carrier                                                           encryption is not used




                                                                 Mobile Carrier
                                                                  Fixed Line
                                                                   Network




                                                                                                       Device Attacks
                                                                                                       • Hardware or software
                                                                                                         listening/recording device is
   Active Radio Attack                                Insider Attacks                                    placed on device to bypass
   • ‘Man in the middle’ pretends to be               • No/weak encryption on backhaul                   call encryption
     a cell phone base station                        • Bribed or coerced employees subvert            • Requires device access so
   • Instructs phone to turn off                        internal systems including lawful                can be foiled by device
     encryption                                         intercept                                        management




© 2011 Cellcrypt. All rights reserved.                         COMPANY CONFIDENTIAL            www.cellcrypt.com           RTN       Slide 4
Why do You Need to Protect Your Calls ?
                                                          2009: Dominican Republic presidential               2010: Mexican spy centre discovered,
  1. Espionage: Foreign State                              accuses opponent of electoral fraud and              including mobile van unit, alleged to
  and Industrial                                           publishes wire-tapping transcripts.                  be used for intercepting politicians,
                                                                                                                businessmen and journalists.
      In 2010, a technician who worked in a              2005: The annual report to the US Congress
       Lebanese mobile phone operator was                  on Foreign Economic Collection and                  Risk of kidnapping of international business
       arrested for being an Israeli spy and giving        Industrial Espionage, stated that 108                executives (estimated 9000 total
       access to phone calls for 14 years.                 countries were involved in collection efforts        kidnappings in Venezuela in 2009).
                                                           against sensitive and protected US
       2010: Indian parliament disrupted over
   
       alleged widespread unauthorized
                                                           technologies. 40% of global R&D is US,           3. Investigative Journalism
                                                           $1Trillion worth of IP lost in 2008. IN 2007
       government wiretapping.                             the UK’s MI5 sent a letter to 300 CEO’s             2011: UK police re-open investigation into
      2010: Pirelli accused of tapping Michelin &         warning of attacks from “Chinese state               widespread cell phone voicemail hacking by
       Yokahoma in an industrial espionage                 organizations”.                                      British tabloid News of the World. Allegation
       allegation via insider attack at Telecom                                                                 is that practice is widespread practice
                                                          2004: Eavesdroppers tapped the mobile                amongst many newspapers. (News of the
       Italia.                                             phones of Greek Prime Minister, cabinet              World is part of media conglomerate News
      2010: Global internet data (including voice)        ministers and security officials between             Corp who own The Times, The Sunday
       were twice redirected through China after a         June 2004-Mar 2005 around the Athens                 Times, The Sun, New York Post, The Wall
       Chinese telecommunications company re-              Olympics. About 100 people, whose ranks              Street Journal, Dow Jones, Fox and many
       programmed routing tables around the                include journalists and Arabs living in              others).
       world. Included 8000 US networks including          Greece, as well as the country's political and
       Apple, Dell and CNN.                                security elite and a US embassy worker,             2010: Ex-girlfriend of England Football
                                                           were monitored after snooping software               captain sues against alleged mobile phone
      2010: National carrier pushed hidden                was illegally installed on the systems of            interception.
       software update to all subscribers, Written         Vodafone Greece. Vodafone were fined
       by surveillance company, the update                                                                     2008: James Pellicano “P.I. to the stars” was
                                                           £51m.
       secretly accesses phone data.                                                                            jailed for 3 ½ years for wiretapping activities
                                                                                                                that he performed on demand against a
      2009: Turkey Prime Minister declares he has     2. Organized Crime                                       large number of celebrities and C-level
       been a victim of phone-tapping for six years.      In 2010, Romanian law enforcement                    executives. FBI found recordings of
       Led to revelations of over 50 leading               authorities arrested 50 people for allegedly         conversations that stretched back almost
       members of judiciary also tapped.                   using off-the-shelf software to monitor              ten years.
                                                           other people's cell phone communications.
© 2011 Cellcrypt. All rights reserved.                          COMPANY CONFIDENTIAL                        www.cellcrypt.com                 RTN         Slide 5
Traditional equipment

                      Traditional commercial equipment used for routine
                              active and passive radio interception
                                                      Jet-990 Mobile Phone Intercept System: Tactical off air GSM, AMPS,
                                                      HCMTS, CDMA , TDMA ,TACS , PCS , mobile phone intercept system,
                                                      designed to intercept all cellular telephone. A passive system, it is
                                                      undetectable and does not interfere with the network.

                                                      GSM 3060TP: GSM interceptor tracks GSM cellular telephone traffic
                                                      in a local area. No hard wired connection to the cellular provider is
                                                      necessary, as the GSM Interceptor can intercept GSM signals off the
                                                      air. CDMA version available.
                                                      Endoacustica GSM 007A: To intercept all cellular systems and
                                                      transmission. Description: 'a system for receiving digital multi-channel
                                                      program for the monitoring of mobile communications.
                                                      Comstrac: Both fully passive and hybrid active systems for the
                                                      intercept of GSM cellular communications. For any frequency across
                                                      850/900/1800/1900Mhz and from 4 channels up to vehicle installed
                                                      128 channel systems. 2G GSM, UMTS and CDMA Protocols are all
                                                      covered by the range of CTS systems.
                                                      Ability GTReS, AGIS-51, IBIS & ACIS: passive & active cellular
                                                      interception for GSM & CDMA. Records hundreds of simultaneous
                                                      calls, SMS, DTMF tones.
                                                      Dataforce NDR-320 GSM Interceptor / NDR-330 CDMA Interceptor:
                                                      provides fully passive (non-detectable) off-air interception of GSM
                                                      communications in both non-encrypted and encrypted GSM
                                                      networks.

© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL                   www.cellcrypt.com              RTN        Slide 6
Attacks Are Becoming More Widespread

             NEW AND EMERGING THREAT – INTERCEPTION FOR $1,400




   Standard Laptop                       Free, open source
                                         software                             All-purpose radio
                                                                              transmitter
                                                                              ($1400)

© 2011 Cellcrypt. All rights reserved.      COMPANY CONFIDENTIAL   www.cellcrypt.com      RTN     Slide 7
Wireless Arial Surveillance Platform (W.A.S.P)


     Altitudes up to 22,000
      Feet
     Autopilot
     GPS
     Multiple Options
      including Wi-Fi and
      Cellular
     Capable of Faking a
      Base Station & Call
      Recording
     $6,000




© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL   www.cellcrypt.com   RTN   Slide 8
Ease of Use combined with Strong Security
                                                      BlackBerry                           Android

       Cellcrypt Mobile™
            Standard downloadable
             app for commercial off-
             the-shelf smartphones
            Entirely software-based
             solution, deployable
             over-the air in minutes                               Interoperability
            IP-based running on
             GSM/CDMA 2G, 3G, 4G,
             Wi-Fi® and satellite
            Certified to US NIST FIPS
             140-2 security standard,
             validated to UK CESG
             Claims Tested Mark
                                                         Nokia                              iPhone
© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL          www.cellcrypt.com        RTN   Slide 9
Cellcrypt Encrypted Voice Service



                                                       Cellcrypt Encrypted
                                                       Content Delivery
               Cellular (CDMA, GSM, 2.5G, 3G),         Network™
                         Wi-Fi & Satellite             Management Console
                                                       Signaling Server and globally
                                                       distributed media servers



        Cellcrypt™
        Mobile




© 2011 Cellcrypt. All rights reserved.           COMPANY CONFIDENTIAL                  www.cellcrypt.com   RTN   Slide 10
Cellcrypt Gateway



                                                              Cellcrypt Encrypted
                                                              Content Delivery
               Cellular (CDMA, GSM, 2.5G, 3G),                Network™
                         Wi-Fi & Satellite                    Management Console
                                                              Signaling Server and globally
                                                              distributed media servers


                                                                                   Customer-controlled Office Phone System
        Cellcrypt™
        Mobile
                                                                                      PBX
                                                                                                                  Landlines

        Server-based endpoint encrypts/decrypts
        50 concurrent calls                                       Cellcrypt™
        Interfaces to PBX, passes plaintext calls                 Gateway
        Leverages PBX functionality                                                                               Conference
                                                                                                                  Call

                                          Any phone                PSTN
                                         connected to
                                                                                                                  Voicemail
                                            PSTN



© 2011 Cellcrypt. All rights reserved.                  COMPANY CONFIDENTIAL                  www.cellcrypt.com         RTN    Slide 11
Cellcrypt Private Switch

                                                                                           Access to ECDN

                                                              Cellcrypt Encrypted                 Cellcrypt Private Switch™
                                                              Content Delivery
               Cellular (CDMA, GSM, 2.5G, 3G),                Network™                                         Management
                         Wi-Fi & Satellite                                                                     Console
                                                              Globally distributed media                       Signaling
                                                              servers                                    Customer-controlled
                                                                                                                    Servers
                                                                                  Customer-controlled Office Phone System
        Cellcrypt™
        Mobile
                                                                                     PBX
                                                                                                                Landlines


                                                                  Cellcrypt™
                                                                  Gateway
                                                                                                                Conference
                                                                                                                Call

                                          Any phone                PSTN
                                         connected to
                                                                                                                Voicemail
                                            PSTN



© 2011 Cellcrypt. All rights reserved.                  COMPANY CONFIDENTIAL               www.cellcrypt.com          RTN     Slide 12
Cellcrypt Solutions for Satellite


       Uses standard satellite IP channel (VSAT, BGAN) with no additional hardware
       Background IP and Streaming IP modes
       Low latency (1000ms) & low bandwidth (24kbps)
       Supports multiple, concurrent devices:
            Multiple smartphones connected
             directly to satellite terminal (via Wi-Fi)
            Multiple landlines connected directly
             to Cellcrypt Gateway which is connected
             to satellite terminal via Ethernet

       Benefits
            Concurrent callings (eg up to 20
             Nokia smartphones on Explorer
             700 BGAN (492kbps))
            Lower cost than standard satellite
             call (depending on data plan)
            Same device for calling over satellite
             as well as cellular and Wi-Fi
© 2011 Cellcrypt. All rights reserved.                COMPANY CONFIDENTIAL   www.cellcrypt.com   RTN   Slide 13
Cellcrypt: Ease of Use + Strong Security
                                                      BlackBerry                          Android
 Downloadable app, no
  hardware, deployable over-
  the air in minutes
 End-to-end encryption
 IP-based running on 2G, 3G,
  4G, Wi-Fi® and satellite
 Government-grade security                                        Interoperable
          » Certified to US NIST FIPS
            140-2 security standard
          » Validated to UK CESG Claims
            Tested Mark security
            scheme
 Industry’s best performance
                                                         Nokia                             iPhone
© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL         www.cellcrypt.com        RTN   Slide 14
Cellcrypt Company Overview

                       Technical Innovation:                                             Leadership
                         High Performance Encryption over variable                         BlackBerry Alliance Partner: First BlackBerry secure
                          wireless networks: unique network                                  voice solution, preferred by RIM
                         Software-only Encryption (high strength)                          Inmarsat Alliance Partner

                                                                                            Telefonica offering in Latin America.

                       History: founded 2005                                               Bid by Defence Contractors and Carriers globally
                         2008: world’s first secure mobile-to-mobile IP-based              2010: SC Magazine Award Finalist “Best Encryption
                          software-only solution demonstrated                                Product”
    R&D




                         2009: world’s first secure mobile-to-landline IP-based
                          software-only solution

                         2009: Q2 world’s first BlackBerry® secure voice
                          solution (and first IP call on BlackBerry®)                     50 people, independent, privately
    Commercialisation




                         2009: Q3 world’s first secure calling via satellite from         owned. Business (offices) in:
                          business cell phones*
                                                                                            Europe (London, also HQ & Development)
                         2010: Q2 world’s first BlackBerry/CDMA secure voice
                          call                                                              North America (Washington DC)

                         2011: Q2 world’s first interoperable secure calls                 Latin America (Miami)
                          between BlackBerry, iPhone, Android, Nokia
                                                                                            Middle East, Africa & Asia (Dubai)

   *Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones

© 2011 Cellcrypt. All rights reserved.                                   COMPANY CONFIDENTIAL                  www.cellcrypt.com        RTN         Slide 15
Thank You
                                                                www.cellcrypt.com




© 2011 Cellcrypt. All rights reserved.   COMPANY CONFIDENTIAL           www.cellcrypt.com   RTN   Slide 16

More Related Content

What's hot

CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkSam Bowne
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01vivianaeliza
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 


huertanix
 
Internet & it's concepts
Internet & it's conceptsInternet & it's concepts
Internet & it's conceptsAbhayDhupar
 

What's hot (20)

CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 



 
Internet & it's concepts
Internet & it's conceptsInternet & it's concepts
Internet & it's concepts
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 

Similar to DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011

Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010CPPGroup Plc
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
Dubai 1
Dubai 1Dubai 1
Dubai 1mmavis
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweepScott Rickard
 
Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt
 
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologiesPrivateWave Italia SpA
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Siddharth Rao
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 

Similar to DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011 (20)

Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
Ch01
Ch01Ch01
Ch01
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweep
 
Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhone
 
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologies
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 

More from Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDEkajalroy875762
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEkajalroy875762
 
How does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - CyclisticHow does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - CyclisticChristofer Vizcaino
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Klinik kandungan
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxseemajojo02
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...bleessingsbender
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfbelieveminhh
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxssuserf63bd7
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxNetapsFoundationAdmi
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 

Recently uploaded (20)

GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
 
How does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - CyclisticHow does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - Cyclistic
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 

DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011

  • 1. Introduction to Cellcrypt Steve Rogers Director of Sales - Europe 24th November 2011 © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 1
  • 2. Secure Calling: As Easy as Making a Regular Call • Choose a name from • Phone’s UI indicates • Secure call the address list, or secure call setup, or in progress • Enter a number • Advises if busy, manually unavailable © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 2
  • 3. Intuitive GUI - appears like native address book • Above example - Blackberry © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 3
  • 4. Cell Phone Calls Are Vulnerable Passive Radio Attack Network Attacks • Undetectable, listens passively to calls • Exploits network hardware such as base • Decrypts calls if encryption is turned on stations or microwave repeaters where by carrier encryption is not used Mobile Carrier Fixed Line Network Device Attacks • Hardware or software listening/recording device is Active Radio Attack Insider Attacks placed on device to bypass • ‘Man in the middle’ pretends to be • No/weak encryption on backhaul call encryption a cell phone base station • Bribed or coerced employees subvert • Requires device access so • Instructs phone to turn off internal systems including lawful can be foiled by device encryption intercept management © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 4
  • 5. Why do You Need to Protect Your Calls ?  2009: Dominican Republic presidential  2010: Mexican spy centre discovered, 1. Espionage: Foreign State accuses opponent of electoral fraud and including mobile van unit, alleged to and Industrial publishes wire-tapping transcripts. be used for intercepting politicians, businessmen and journalists.  In 2010, a technician who worked in a  2005: The annual report to the US Congress Lebanese mobile phone operator was on Foreign Economic Collection and  Risk of kidnapping of international business arrested for being an Israeli spy and giving Industrial Espionage, stated that 108 executives (estimated 9000 total access to phone calls for 14 years. countries were involved in collection efforts kidnappings in Venezuela in 2009). against sensitive and protected US 2010: Indian parliament disrupted over  alleged widespread unauthorized technologies. 40% of global R&D is US, 3. Investigative Journalism $1Trillion worth of IP lost in 2008. IN 2007 government wiretapping. the UK’s MI5 sent a letter to 300 CEO’s  2011: UK police re-open investigation into  2010: Pirelli accused of tapping Michelin & warning of attacks from “Chinese state widespread cell phone voicemail hacking by Yokahoma in an industrial espionage organizations”. British tabloid News of the World. Allegation allegation via insider attack at Telecom is that practice is widespread practice  2004: Eavesdroppers tapped the mobile amongst many newspapers. (News of the Italia. phones of Greek Prime Minister, cabinet World is part of media conglomerate News  2010: Global internet data (including voice) ministers and security officials between Corp who own The Times, The Sunday were twice redirected through China after a June 2004-Mar 2005 around the Athens Times, The Sun, New York Post, The Wall Chinese telecommunications company re- Olympics. About 100 people, whose ranks Street Journal, Dow Jones, Fox and many programmed routing tables around the include journalists and Arabs living in others). world. Included 8000 US networks including Greece, as well as the country's political and Apple, Dell and CNN. security elite and a US embassy worker,  2010: Ex-girlfriend of England Football were monitored after snooping software captain sues against alleged mobile phone  2010: National carrier pushed hidden was illegally installed on the systems of interception. software update to all subscribers, Written Vodafone Greece. Vodafone were fined by surveillance company, the update  2008: James Pellicano “P.I. to the stars” was £51m. secretly accesses phone data. jailed for 3 ½ years for wiretapping activities that he performed on demand against a  2009: Turkey Prime Minister declares he has 2. Organized Crime large number of celebrities and C-level been a victim of phone-tapping for six years.  In 2010, Romanian law enforcement executives. FBI found recordings of Led to revelations of over 50 leading authorities arrested 50 people for allegedly conversations that stretched back almost members of judiciary also tapped. using off-the-shelf software to monitor ten years. other people's cell phone communications. © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 5
  • 6. Traditional equipment Traditional commercial equipment used for routine active and passive radio interception Jet-990 Mobile Phone Intercept System: Tactical off air GSM, AMPS, HCMTS, CDMA , TDMA ,TACS , PCS , mobile phone intercept system, designed to intercept all cellular telephone. A passive system, it is undetectable and does not interfere with the network. GSM 3060TP: GSM interceptor tracks GSM cellular telephone traffic in a local area. No hard wired connection to the cellular provider is necessary, as the GSM Interceptor can intercept GSM signals off the air. CDMA version available. Endoacustica GSM 007A: To intercept all cellular systems and transmission. Description: 'a system for receiving digital multi-channel program for the monitoring of mobile communications. Comstrac: Both fully passive and hybrid active systems for the intercept of GSM cellular communications. For any frequency across 850/900/1800/1900Mhz and from 4 channels up to vehicle installed 128 channel systems. 2G GSM, UMTS and CDMA Protocols are all covered by the range of CTS systems. Ability GTReS, AGIS-51, IBIS & ACIS: passive & active cellular interception for GSM & CDMA. Records hundreds of simultaneous calls, SMS, DTMF tones. Dataforce NDR-320 GSM Interceptor / NDR-330 CDMA Interceptor: provides fully passive (non-detectable) off-air interception of GSM communications in both non-encrypted and encrypted GSM networks. © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 6
  • 7. Attacks Are Becoming More Widespread NEW AND EMERGING THREAT – INTERCEPTION FOR $1,400 Standard Laptop Free, open source software All-purpose radio transmitter ($1400) © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 7
  • 8. Wireless Arial Surveillance Platform (W.A.S.P)  Altitudes up to 22,000 Feet  Autopilot  GPS  Multiple Options including Wi-Fi and Cellular  Capable of Faking a Base Station & Call Recording  $6,000 © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 8
  • 9. Ease of Use combined with Strong Security BlackBerry Android  Cellcrypt Mobile™  Standard downloadable app for commercial off- the-shelf smartphones  Entirely software-based solution, deployable over-the air in minutes Interoperability  IP-based running on GSM/CDMA 2G, 3G, 4G, Wi-Fi® and satellite  Certified to US NIST FIPS 140-2 security standard, validated to UK CESG Claims Tested Mark Nokia iPhone © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 9
  • 10. Cellcrypt Encrypted Voice Service Cellcrypt Encrypted Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Wi-Fi & Satellite Management Console Signaling Server and globally distributed media servers Cellcrypt™ Mobile © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 10
  • 11. Cellcrypt Gateway Cellcrypt Encrypted Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Wi-Fi & Satellite Management Console Signaling Server and globally distributed media servers Customer-controlled Office Phone System Cellcrypt™ Mobile PBX Landlines Server-based endpoint encrypts/decrypts 50 concurrent calls Cellcrypt™ Interfaces to PBX, passes plaintext calls Gateway Leverages PBX functionality Conference Call Any phone PSTN connected to Voicemail PSTN © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 11
  • 12. Cellcrypt Private Switch Access to ECDN Cellcrypt Encrypted Cellcrypt Private Switch™ Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Management Wi-Fi & Satellite Console Globally distributed media Signaling servers Customer-controlled Servers Customer-controlled Office Phone System Cellcrypt™ Mobile PBX Landlines Cellcrypt™ Gateway Conference Call Any phone PSTN connected to Voicemail PSTN © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 12
  • 13. Cellcrypt Solutions for Satellite  Uses standard satellite IP channel (VSAT, BGAN) with no additional hardware  Background IP and Streaming IP modes  Low latency (1000ms) & low bandwidth (24kbps)  Supports multiple, concurrent devices:  Multiple smartphones connected directly to satellite terminal (via Wi-Fi)  Multiple landlines connected directly to Cellcrypt Gateway which is connected to satellite terminal via Ethernet  Benefits  Concurrent callings (eg up to 20 Nokia smartphones on Explorer 700 BGAN (492kbps))  Lower cost than standard satellite call (depending on data plan)  Same device for calling over satellite as well as cellular and Wi-Fi © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 13
  • 14. Cellcrypt: Ease of Use + Strong Security BlackBerry Android  Downloadable app, no hardware, deployable over- the air in minutes  End-to-end encryption  IP-based running on 2G, 3G, 4G, Wi-Fi® and satellite  Government-grade security Interoperable » Certified to US NIST FIPS 140-2 security standard » Validated to UK CESG Claims Tested Mark security scheme  Industry’s best performance Nokia iPhone © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 14
  • 15. Cellcrypt Company Overview  Technical Innovation:  Leadership  High Performance Encryption over variable  BlackBerry Alliance Partner: First BlackBerry secure wireless networks: unique network voice solution, preferred by RIM  Software-only Encryption (high strength)  Inmarsat Alliance Partner  Telefonica offering in Latin America.  History: founded 2005  Bid by Defence Contractors and Carriers globally  2008: world’s first secure mobile-to-mobile IP-based  2010: SC Magazine Award Finalist “Best Encryption software-only solution demonstrated Product” R&D  2009: world’s first secure mobile-to-landline IP-based software-only solution  2009: Q2 world’s first BlackBerry® secure voice solution (and first IP call on BlackBerry®)  50 people, independent, privately Commercialisation  2009: Q3 world’s first secure calling via satellite from owned. Business (offices) in: business cell phones*  Europe (London, also HQ & Development)  2010: Q2 world’s first BlackBerry/CDMA secure voice call  North America (Washington DC)  2011: Q2 world’s first interoperable secure calls  Latin America (Miami) between BlackBerry, iPhone, Android, Nokia  Middle East, Africa & Asia (Dubai) *Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 15
  • 16. Thank You www.cellcrypt.com © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 16