Submit Search
Upload
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
•
2 likes
•
880 views
Andris Soroka
Follow
Presentation from "DSS" organized ITSEC conference on 24th of November, RIga, Latvia.
Read less
Read more
Business
Technology
Report
Share
Report
Share
1 of 16
Download now
Download to read offline
Recommended
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
Dubai 2
Dubai 2
mmavis
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
Droidcon Berlin
Cse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
Mobile phone technology
Mobile phone technology
Rhithu
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
Arturo Filastò
Information Security 5 06
Information Security 5 06
johnhewitt_cpp
amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
amrapalibuildersreviews
Recommended
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
Dubai 2
Dubai 2
mmavis
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
Droidcon Berlin
Cse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
Mobile phone technology
Mobile phone technology
Rhithu
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
Arturo Filastò
Information Security 5 06
Information Security 5 06
johnhewitt_cpp
amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
amrapalibuildersreviews
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
Sam Bowne
Mobile Cloning Technology
Mobile Cloning Technology
maham4569
Mobile Cloning
Mobile Cloning
sorabh2312
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01
vivianaeliza
Mobile phone cloning
Mobile phone cloning
hcls
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
Mobile cloning
Mobile cloning
Sai Srinivas Mittapalli
Mobile cloning
Mobile cloning
Abhishek Abhi
Cloning. (4)
Cloning. (4)
Jagjit Khalsa
Mobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
Cell phone cloning
Cell phone cloning
Gudia Khan
Wireless Jamming Networks
Wireless Jamming Networks
ijtsrd
Cell phone cloning
Cell phone cloning
Jashir Chakkayil
Mobile phone-cloning
Mobile phone-cloning
Shishupal Nagar
Mobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
Mobile Cloning
Mobile Cloning
Karteek Reddy
huertanix
Internet & it's concepts
Internet & it's concepts
AbhayDhupar
Mobile communication
Mobile communication
Nikhilesh Vaidya
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
Hamilton Turner
Voice communication security
Voice communication security
Fabio Pietrosanti
More Related Content
What's hot
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
Sam Bowne
Mobile Cloning Technology
Mobile Cloning Technology
maham4569
Mobile Cloning
Mobile Cloning
sorabh2312
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01
vivianaeliza
Mobile phone cloning
Mobile phone cloning
hcls
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
Mobile cloning
Mobile cloning
Sai Srinivas Mittapalli
Mobile cloning
Mobile cloning
Abhishek Abhi
Cloning. (4)
Cloning. (4)
Jagjit Khalsa
Mobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
Cell phone cloning
Cell phone cloning
Gudia Khan
Wireless Jamming Networks
Wireless Jamming Networks
ijtsrd
Cell phone cloning
Cell phone cloning
Jashir Chakkayil
Mobile phone-cloning
Mobile phone-cloning
Shishupal Nagar
Mobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
Mobile Cloning
Mobile Cloning
Karteek Reddy
huertanix
Internet & it's concepts
Internet & it's concepts
AbhayDhupar
Mobile communication
Mobile communication
Nikhilesh Vaidya
What's hot
(20)
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
Mobile Cloning Technology
Mobile Cloning Technology
Mobile Cloning
Mobile Cloning
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Phone CommunicationpresentacióN01
Phone CommunicationpresentacióN01
Mobile phone cloning
Mobile phone cloning
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Mobile cloning
Mobile cloning
Mobile cloning
Mobile cloning
Cloning. (4)
Cloning. (4)
Mobile Cloning Technology
Mobile Cloning Technology
Cell phone cloning
Cell phone cloning
Wireless Jamming Networks
Wireless Jamming Networks
Cell phone cloning
Cell phone cloning
Mobile phone-cloning
Mobile phone-cloning
Mobile Phone Cloning
Mobile Phone Cloning
Mobile Cloning
Mobile Cloning
Internet & it's concepts
Internet & it's concepts
Mobile communication
Mobile communication
Similar to DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
Hamilton Turner
Voice communication security
Voice communication security
Fabio Pietrosanti
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
Fabio Ghioni
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010
CPPGroup Plc
Smartphone
Smartphone
Naval OPSEC
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
Richard Stiennon
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
Paul Parke
Dubai 1
Dubai 1
mmavis
Ch01
Ch01
Ali Khawaja
Glimmerglass CyberSweep
Glimmerglass CyberSweep
Scott Rickard
Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhone
Cellcrypt
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and technologies
PrivateWave Italia SpA
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Handset Theft - A Case Study
Handset Theft - A Case Study
Ministerio TIC Colombia
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Siddharth Rao
Mobile Phone Cloning
Mobile Phone Cloning
Devyani Vaidya
Unit-3.pptx
Unit-3.pptx
Ramya Nellutla
BYOD and Your Business
BYOD and Your Business
cherienetclarity
Personal Data Security in a Digital World
Personal Data Security in a Digital World
alxdvs
Similar to DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
(20)
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
Voice communication security
Voice communication security
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010
Smartphone
Smartphone
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
Dubai 1
Dubai 1
Ch01
Ch01
Glimmerglass CyberSweep
Glimmerglass CyberSweep
Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhone
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and technologies
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Handset Theft - A Case Study
Handset Theft - A Case Study
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Mobile Phone Cloning
Mobile Phone Cloning
Unit-3.pptx
Unit-3.pptx
BYOD and Your Business
BYOD and Your Business
Personal Data Security in a Digital World
Personal Data Security in a Digital World
More from Andris Soroka
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Andris Soroka
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Andris Soroka
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Andris Soroka
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Andris Soroka
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Andris Soroka
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Andris Soroka
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Andris Soroka
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Andris Soroka
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Andris Soroka
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Andris Soroka
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Andris Soroka
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Andris Soroka
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Andris Soroka
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Andris Soroka
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Andris Soroka
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Andris Soroka
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Andris Soroka
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Andris Soroka
More from Andris Soroka
(20)
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Recently uploaded
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
kajalroy875762
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
kajalroy875762
How does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - Cyclistic
Christofer Vizcaino
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy Verified Cash App Account
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Klinik kandungan
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
hemanthkumar470700
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
DitasDelaCruz
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
seemajojo02
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
will854175
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
Hector Del Castillo, CPM, CPMM
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
ssuserf63bd7
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
IndeedSEO
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
bleessingsbender
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
believeminhh
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Falcon Invoice Discounting
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
ssuserf63bd7
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
NetapsFoundationAdmi
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Tim Wilson
Recently uploaded
(20)
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
How does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - Cyclistic
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
1.
Introduction to
Cellcrypt Steve Rogers Director of Sales - Europe 24th November 2011 © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 1
2.
Secure Calling: As
Easy as Making a Regular Call • Choose a name from • Phone’s UI indicates • Secure call the address list, or secure call setup, or in progress • Enter a number • Advises if busy, manually unavailable © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 2
3.
Intuitive GUI -
appears like native address book • Above example - Blackberry © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 3
4.
Cell Phone Calls
Are Vulnerable Passive Radio Attack Network Attacks • Undetectable, listens passively to calls • Exploits network hardware such as base • Decrypts calls if encryption is turned on stations or microwave repeaters where by carrier encryption is not used Mobile Carrier Fixed Line Network Device Attacks • Hardware or software listening/recording device is Active Radio Attack Insider Attacks placed on device to bypass • ‘Man in the middle’ pretends to be • No/weak encryption on backhaul call encryption a cell phone base station • Bribed or coerced employees subvert • Requires device access so • Instructs phone to turn off internal systems including lawful can be foiled by device encryption intercept management © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 4
5.
Why do You
Need to Protect Your Calls ? 2009: Dominican Republic presidential 2010: Mexican spy centre discovered, 1. Espionage: Foreign State accuses opponent of electoral fraud and including mobile van unit, alleged to and Industrial publishes wire-tapping transcripts. be used for intercepting politicians, businessmen and journalists. In 2010, a technician who worked in a 2005: The annual report to the US Congress Lebanese mobile phone operator was on Foreign Economic Collection and Risk of kidnapping of international business arrested for being an Israeli spy and giving Industrial Espionage, stated that 108 executives (estimated 9000 total access to phone calls for 14 years. countries were involved in collection efforts kidnappings in Venezuela in 2009). against sensitive and protected US 2010: Indian parliament disrupted over alleged widespread unauthorized technologies. 40% of global R&D is US, 3. Investigative Journalism $1Trillion worth of IP lost in 2008. IN 2007 government wiretapping. the UK’s MI5 sent a letter to 300 CEO’s 2011: UK police re-open investigation into 2010: Pirelli accused of tapping Michelin & warning of attacks from “Chinese state widespread cell phone voicemail hacking by Yokahoma in an industrial espionage organizations”. British tabloid News of the World. Allegation allegation via insider attack at Telecom is that practice is widespread practice 2004: Eavesdroppers tapped the mobile amongst many newspapers. (News of the Italia. phones of Greek Prime Minister, cabinet World is part of media conglomerate News 2010: Global internet data (including voice) ministers and security officials between Corp who own The Times, The Sunday were twice redirected through China after a June 2004-Mar 2005 around the Athens Times, The Sun, New York Post, The Wall Chinese telecommunications company re- Olympics. About 100 people, whose ranks Street Journal, Dow Jones, Fox and many programmed routing tables around the include journalists and Arabs living in others). world. Included 8000 US networks including Greece, as well as the country's political and Apple, Dell and CNN. security elite and a US embassy worker, 2010: Ex-girlfriend of England Football were monitored after snooping software captain sues against alleged mobile phone 2010: National carrier pushed hidden was illegally installed on the systems of interception. software update to all subscribers, Written Vodafone Greece. Vodafone were fined by surveillance company, the update 2008: James Pellicano “P.I. to the stars” was £51m. secretly accesses phone data. jailed for 3 ½ years for wiretapping activities that he performed on demand against a 2009: Turkey Prime Minister declares he has 2. Organized Crime large number of celebrities and C-level been a victim of phone-tapping for six years. In 2010, Romanian law enforcement executives. FBI found recordings of Led to revelations of over 50 leading authorities arrested 50 people for allegedly conversations that stretched back almost members of judiciary also tapped. using off-the-shelf software to monitor ten years. other people's cell phone communications. © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 5
6.
Traditional equipment
Traditional commercial equipment used for routine active and passive radio interception Jet-990 Mobile Phone Intercept System: Tactical off air GSM, AMPS, HCMTS, CDMA , TDMA ,TACS , PCS , mobile phone intercept system, designed to intercept all cellular telephone. A passive system, it is undetectable and does not interfere with the network. GSM 3060TP: GSM interceptor tracks GSM cellular telephone traffic in a local area. No hard wired connection to the cellular provider is necessary, as the GSM Interceptor can intercept GSM signals off the air. CDMA version available. Endoacustica GSM 007A: To intercept all cellular systems and transmission. Description: 'a system for receiving digital multi-channel program for the monitoring of mobile communications. Comstrac: Both fully passive and hybrid active systems for the intercept of GSM cellular communications. For any frequency across 850/900/1800/1900Mhz and from 4 channels up to vehicle installed 128 channel systems. 2G GSM, UMTS and CDMA Protocols are all covered by the range of CTS systems. Ability GTReS, AGIS-51, IBIS & ACIS: passive & active cellular interception for GSM & CDMA. Records hundreds of simultaneous calls, SMS, DTMF tones. Dataforce NDR-320 GSM Interceptor / NDR-330 CDMA Interceptor: provides fully passive (non-detectable) off-air interception of GSM communications in both non-encrypted and encrypted GSM networks. © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 6
7.
Attacks Are Becoming
More Widespread NEW AND EMERGING THREAT – INTERCEPTION FOR $1,400 Standard Laptop Free, open source software All-purpose radio transmitter ($1400) © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 7
8.
Wireless Arial Surveillance
Platform (W.A.S.P) Altitudes up to 22,000 Feet Autopilot GPS Multiple Options including Wi-Fi and Cellular Capable of Faking a Base Station & Call Recording $6,000 © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 8
9.
Ease of Use
combined with Strong Security BlackBerry Android Cellcrypt Mobile™ Standard downloadable app for commercial off- the-shelf smartphones Entirely software-based solution, deployable over-the air in minutes Interoperability IP-based running on GSM/CDMA 2G, 3G, 4G, Wi-Fi® and satellite Certified to US NIST FIPS 140-2 security standard, validated to UK CESG Claims Tested Mark Nokia iPhone © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 9
10.
Cellcrypt Encrypted Voice
Service Cellcrypt Encrypted Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Wi-Fi & Satellite Management Console Signaling Server and globally distributed media servers Cellcrypt™ Mobile © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 10
11.
Cellcrypt Gateway
Cellcrypt Encrypted Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Wi-Fi & Satellite Management Console Signaling Server and globally distributed media servers Customer-controlled Office Phone System Cellcrypt™ Mobile PBX Landlines Server-based endpoint encrypts/decrypts 50 concurrent calls Cellcrypt™ Interfaces to PBX, passes plaintext calls Gateway Leverages PBX functionality Conference Call Any phone PSTN connected to Voicemail PSTN © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 11
12.
Cellcrypt Private Switch
Access to ECDN Cellcrypt Encrypted Cellcrypt Private Switch™ Content Delivery Cellular (CDMA, GSM, 2.5G, 3G), Network™ Management Wi-Fi & Satellite Console Globally distributed media Signaling servers Customer-controlled Servers Customer-controlled Office Phone System Cellcrypt™ Mobile PBX Landlines Cellcrypt™ Gateway Conference Call Any phone PSTN connected to Voicemail PSTN © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 12
13.
Cellcrypt Solutions for
Satellite Uses standard satellite IP channel (VSAT, BGAN) with no additional hardware Background IP and Streaming IP modes Low latency (1000ms) & low bandwidth (24kbps) Supports multiple, concurrent devices: Multiple smartphones connected directly to satellite terminal (via Wi-Fi) Multiple landlines connected directly to Cellcrypt Gateway which is connected to satellite terminal via Ethernet Benefits Concurrent callings (eg up to 20 Nokia smartphones on Explorer 700 BGAN (492kbps)) Lower cost than standard satellite call (depending on data plan) Same device for calling over satellite as well as cellular and Wi-Fi © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 13
14.
Cellcrypt: Ease of
Use + Strong Security BlackBerry Android Downloadable app, no hardware, deployable over- the air in minutes End-to-end encryption IP-based running on 2G, 3G, 4G, Wi-Fi® and satellite Government-grade security Interoperable » Certified to US NIST FIPS 140-2 security standard » Validated to UK CESG Claims Tested Mark security scheme Industry’s best performance Nokia iPhone © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 14
15.
Cellcrypt Company Overview
Technical Innovation: Leadership High Performance Encryption over variable BlackBerry Alliance Partner: First BlackBerry secure wireless networks: unique network voice solution, preferred by RIM Software-only Encryption (high strength) Inmarsat Alliance Partner Telefonica offering in Latin America. History: founded 2005 Bid by Defence Contractors and Carriers globally 2008: world’s first secure mobile-to-mobile IP-based 2010: SC Magazine Award Finalist “Best Encryption software-only solution demonstrated Product” R&D 2009: world’s first secure mobile-to-landline IP-based software-only solution 2009: Q2 world’s first BlackBerry® secure voice solution (and first IP call on BlackBerry®) 50 people, independent, privately Commercialisation 2009: Q3 world’s first secure calling via satellite from owned. Business (offices) in: business cell phones* Europe (London, also HQ & Development) 2010: Q2 world’s first BlackBerry/CDMA secure voice call North America (Washington DC) 2011: Q2 world’s first interoperable secure calls Latin America (Miami) between BlackBerry, iPhone, Android, Nokia Middle East, Africa & Asia (Dubai) *Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 15
16.
Thank You
www.cellcrypt.com © 2011 Cellcrypt. All rights reserved. COMPANY CONFIDENTIAL www.cellcrypt.com RTN Slide 16
Download now