The Market
The ProblemThe need for voice encryption is well known in the Government and MilitaryThere is a latent demand in the Corporate and private sector to protect calls over the public network against interceptionThis latent demand is being encouraged by reports in the Press of industrial espionage and reports of prominent figures being embarrassed by interception of their mobile callsEisfor products encrypt telephone calls over public networks end-to-end so that any intercepted call cannot be understood
Press ReportsVodafone fined £53m over Greek phone tapping affairVodafone was last night ordered to pay an unprecedented €76m (£53m) in fines for its role in an espionage scandal that saw the mobile phones of Greece's political, business and military elite being tapped in the run-up to and after the 2004 Olympic Games in Athens.Observer (London) December 15 2006Italy arrests 12 more in T.Italia wiretap caseMILAN, March 22 (Reuters) - Italian authorities have arrested 12 more people in connection with an investigation into illegal wiretapping by Telecom Italia staff and others, judicial sources told Reuters on Thursday. The investigation began last year, and in September magistrates arrested several people including Telecom Italia's former head of security, GiulianoTavaroli. Reuters March 22 2007Role of Telecom Firms in Wiretaps Is Confirmed WASHINGTON, Aug. 23 — The Bush administration has confirmed for the first time that American telecommunications companies played a crucial role in the National Security Agency’s domestic eavesdropping program after asserting for more than a year that any role played by them was a “state secret.”New York Times August 24 2007Three quizzed over royal phone tap claimsFormer royal aide Dickie Arbiter said there was considerable sensitivity within the royal family over phone interceptions following the infamous “squidgy-gate” episode in the 1990s.He told Sky News: “If you cast your mind back there were several phone tappings, mainly of mobiles.“This goes a stage further and if this is phone tapping landlines then this is a very serious offence.“There is a lot of sensitivity after these incidents with mobile telephones.Observer (London) Ausust 8 2006
Enhanced GSM SecurityThe GSM network introduced a significantly higher level of security than previously existed in the older analogue cellular systems.   The GSM network can provide a secure encryption facility only on the air interface between the mobile handset (ME) and the base-station (BTS). This encryption is switched on at the network operator’s discretion.BSCPPSTN,ISDN, PSPDNCSPDNBTSBSCMSCBTSUmAbisABase Station Subsystem Network SubsystemBTS  Base Transceiver StationBSC  Base Station ControllerMSC  Mobile Switching CentreEncrypted communicationsHowever, the high level of privacy in the GSM network does not extend in the other public telecommunication networks that may be used to carry a call.  User data (voice, data or fax), passes completely unencrypted through the non-GSM network portion of a call.
Even if the GSM encryption is switched on…….GSM phone encryption "can be cracked“The encryption system that protects the almost 900 million users of GSM cell phones from instant eavesdropping or fraud is no longer impregnable, cryptologists claim.Researchers at the Technion-Israel Institute of Technology in Haifa say they have found a way to defeat the security system, exploiting a flaw in the way the encryption is applied.With GSM, the voice is encoded digitally. But, before this data is encrypted, it is corrected to help compensate for any interference or noise, says Eli Biham, who led the Technion team. This gives an opportunity for a "man in the middle" attack, in which the call is intercepted between the handset and the network base station.New Scientist September 4 2003Interception equipment is readily available for all algorithms used within GSM,Thuraya and VOIP.
The solutionBSCBSCBTSBTSBSCBSCMSCBTSBTSEncrypted communicationsPSTNVoIPOur products provide customers who are looking for the highest level of privacy with the additional protection of  safeguarding their conversations over the entire network including the non-GSM portion.  User conversationwill be encrypted on a peer-to-peer level, that is, encryption will occur in the calling party handset, and decryption will occur only at the called party’s handset.
What do we know about the corporate market for secure voice productsExpressed need for secure voiceWhy haven’t Corporates already bought?Do not know where to buy these products
Did not know that they existed
Not advertised to my knowledge
Lack of availability
Where to buy, I do not want to go to a “spy” shop
Is it legal to use
Gives me bad “vibrations” , like FBI and CIA
Telenor did not buy us one, so they probably do not think to much about these issues
Until clients ask for usage of this, we will not buy it. (E&Y lawyer)
Encrypted GSM:
Daily: 85%
Weekly: 12.5%
Monthly: 2.5%
Encrypted Desktop:
Daily: 77.5%
Weekly: 22.5%
Monthly: 0%
Encrypted Fax:
Daily: 10%
Weekly: 50%
Monthly: 25%
Not use at all: 15%Strong acceptance of the needDon’t know how to fulfilBUTSource: Eisfor Market Research
Corporate Market Requirements+High PerformanceModerate PricesSource: Eisfor Market Research
Market PositioningTraditionalSuppliersHighGovt/MilitarySegmentCorporateSegmentPriceModerateEisforNewGenerationSuppliersLowHighModerateLowPerformance
Initial primary marketing researchEisfor Ltd
Purpose    To gain better knowledge of corporate market for voice encryption products, in terms of:		- current awareness in the corporate sector                      	   about voice encryption products		- probable usage of the products		- expressed need for encryption		- pricing preferences
MethodologyMethodologyTelephone survey: Called 40 senior managers in                       different industries living in 12 EFTA countriesDuration: approx. 30 minStructured questions: Asked all persons the same 	15 questions
Methodology (continued)Management of  responses: Some of the 	 		question were unprompted, but most of them were 	prompted.Description of respondents: All the persons 	 interviewed are employed in middle/senior   		 management positions
ConclusionCorporate market largely unaware of voice encryption productsThere is a sizeable demand for voice encryptionGreatest demand is to encrypt Voice and data
Research questions and indicative responses
When you think about confidential call, what are your concerns?Who are listening to us and what will they use the information forI need secure communicationIs it safe to use GSM or fixed phone for confidential conversationNeed to be very carefulDifficult to do business when you are never sure if someone is listening to youWhat to say and not to sayIs it to day possible to make a secure conversation over GSM/Fixed lineIs anybody listening to us?People have eavesdropping as a profession.  It is big businessHow can I make my call secure?
I’d like you to think about a confidential phone call that you have made recently.  Describe your thoughts and emotions.Before:Do not think to much about it.Who needs this information that I am in a process of communicating?Concerned that the message goes through in the manner that I wantLess concerned now than beforeNo secure phone today, so what can I do?I always plan my phone calls in advance, what to say and not to sayIt is a part of my daily businessI need to be very careful, not mention names and numbersI stand in places where nobody can hear what I am saying

Eisfor marketing research

  • 1.
  • 2.
    The ProblemThe needfor voice encryption is well known in the Government and MilitaryThere is a latent demand in the Corporate and private sector to protect calls over the public network against interceptionThis latent demand is being encouraged by reports in the Press of industrial espionage and reports of prominent figures being embarrassed by interception of their mobile callsEisfor products encrypt telephone calls over public networks end-to-end so that any intercepted call cannot be understood
  • 3.
    Press ReportsVodafone fined£53m over Greek phone tapping affairVodafone was last night ordered to pay an unprecedented €76m (£53m) in fines for its role in an espionage scandal that saw the mobile phones of Greece's political, business and military elite being tapped in the run-up to and after the 2004 Olympic Games in Athens.Observer (London) December 15 2006Italy arrests 12 more in T.Italia wiretap caseMILAN, March 22 (Reuters) - Italian authorities have arrested 12 more people in connection with an investigation into illegal wiretapping by Telecom Italia staff and others, judicial sources told Reuters on Thursday. The investigation began last year, and in September magistrates arrested several people including Telecom Italia's former head of security, GiulianoTavaroli. Reuters March 22 2007Role of Telecom Firms in Wiretaps Is Confirmed WASHINGTON, Aug. 23 — The Bush administration has confirmed for the first time that American telecommunications companies played a crucial role in the National Security Agency’s domestic eavesdropping program after asserting for more than a year that any role played by them was a “state secret.”New York Times August 24 2007Three quizzed over royal phone tap claimsFormer royal aide Dickie Arbiter said there was considerable sensitivity within the royal family over phone interceptions following the infamous “squidgy-gate” episode in the 1990s.He told Sky News: “If you cast your mind back there were several phone tappings, mainly of mobiles.“This goes a stage further and if this is phone tapping landlines then this is a very serious offence.“There is a lot of sensitivity after these incidents with mobile telephones.Observer (London) Ausust 8 2006
  • 4.
    Enhanced GSM SecurityTheGSM network introduced a significantly higher level of security than previously existed in the older analogue cellular systems. The GSM network can provide a secure encryption facility only on the air interface between the mobile handset (ME) and the base-station (BTS). This encryption is switched on at the network operator’s discretion.BSCPPSTN,ISDN, PSPDNCSPDNBTSBSCMSCBTSUmAbisABase Station Subsystem Network SubsystemBTS Base Transceiver StationBSC Base Station ControllerMSC Mobile Switching CentreEncrypted communicationsHowever, the high level of privacy in the GSM network does not extend in the other public telecommunication networks that may be used to carry a call. User data (voice, data or fax), passes completely unencrypted through the non-GSM network portion of a call.
  • 5.
    Even if theGSM encryption is switched on…….GSM phone encryption "can be cracked“The encryption system that protects the almost 900 million users of GSM cell phones from instant eavesdropping or fraud is no longer impregnable, cryptologists claim.Researchers at the Technion-Israel Institute of Technology in Haifa say they have found a way to defeat the security system, exploiting a flaw in the way the encryption is applied.With GSM, the voice is encoded digitally. But, before this data is encrypted, it is corrected to help compensate for any interference or noise, says Eli Biham, who led the Technion team. This gives an opportunity for a "man in the middle" attack, in which the call is intercepted between the handset and the network base station.New Scientist September 4 2003Interception equipment is readily available for all algorithms used within GSM,Thuraya and VOIP.
  • 6.
    The solutionBSCBSCBTSBTSBSCBSCMSCBTSBTSEncrypted communicationsPSTNVoIPOurproducts provide customers who are looking for the highest level of privacy with the additional protection of safeguarding their conversations over the entire network including the non-GSM portion. User conversationwill be encrypted on a peer-to-peer level, that is, encryption will occur in the calling party handset, and decryption will occur only at the called party’s handset.
  • 7.
    What do weknow about the corporate market for secure voice productsExpressed need for secure voiceWhy haven’t Corporates already bought?Do not know where to buy these products
  • 8.
    Did not knowthat they existed
  • 9.
    Not advertised tomy knowledge
  • 10.
  • 11.
    Where to buy,I do not want to go to a “spy” shop
  • 12.
  • 13.
    Gives me bad“vibrations” , like FBI and CIA
  • 14.
    Telenor did notbuy us one, so they probably do not think to much about these issues
  • 15.
    Until clients askfor usage of this, we will not buy it. (E&Y lawyer)
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
    Not use atall: 15%Strong acceptance of the needDon’t know how to fulfilBUTSource: Eisfor Market Research
  • 29.
    Corporate Market Requirements+HighPerformanceModerate PricesSource: Eisfor Market Research
  • 30.
  • 31.
    Initial primary marketingresearchEisfor Ltd
  • 32.
    Purpose To gain better knowledge of corporate market for voice encryption products, in terms of: - current awareness in the corporate sector about voice encryption products - probable usage of the products - expressed need for encryption - pricing preferences
  • 33.
    MethodologyMethodologyTelephone survey: Called40 senior managers in different industries living in 12 EFTA countriesDuration: approx. 30 minStructured questions: Asked all persons the same 15 questions
  • 34.
    Methodology (continued)Management of responses: Some of the question were unprompted, but most of them were prompted.Description of respondents: All the persons interviewed are employed in middle/senior management positions
  • 35.
    ConclusionCorporate market largelyunaware of voice encryption productsThere is a sizeable demand for voice encryptionGreatest demand is to encrypt Voice and data
  • 36.
    Research questions andindicative responses
  • 37.
    When you thinkabout confidential call, what are your concerns?Who are listening to us and what will they use the information forI need secure communicationIs it safe to use GSM or fixed phone for confidential conversationNeed to be very carefulDifficult to do business when you are never sure if someone is listening to youWhat to say and not to sayIs it to day possible to make a secure conversation over GSM/Fixed lineIs anybody listening to us?People have eavesdropping as a profession. It is big businessHow can I make my call secure?
  • 38.
    I’d like youto think about a confidential phone call that you have made recently. Describe your thoughts and emotions.Before:Do not think to much about it.Who needs this information that I am in a process of communicating?Concerned that the message goes through in the manner that I wantLess concerned now than beforeNo secure phone today, so what can I do?I always plan my phone calls in advance, what to say and not to sayIt is a part of my daily businessI need to be very careful, not mention names and numbersI stand in places where nobody can hear what I am saying