dss - itsec conference - cellcrypt - making secure voice calls - riga nov2011

16
© 2011 Cellcrypt. All rights reserved. Slide 1 www.cellcrypt.com COMPANY CONFIDENTIAL RTN Introduction to Cellcrypt 24 th November 2011 Steve Rogers Director of Sales - Europe

Upload: andris-soroka

Post on 27-May-2015

768 views

Category:

Business


3 download

DESCRIPTION

Presentation from "DSS" organized ITSEC conference on 24th of November, RIga, Latvia.

TRANSCRIPT

Page 1: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 1 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Introduction to

Cellcrypt

24th November 2011

Steve Rogers

Director of Sales - Europe

Page 2: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 2 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Secure Calling: As Easy as Making a Regular Call

• Choose a name from the address list, or

• Enter a number manually

• Phone’s UI indicates secure call setup, or

• Advises if busy, unavailable

• Secure call in progress

Page 3: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 3 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Intuitive GUI - appears like native address book

• Above example - Blackberry

Page 4: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 4 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cell Phone Calls Are Vulnerable

Mobile Carrier Fixed Line Network

Active Radio Attack • ‘Man in the middle’ pretends to be

a cell phone base station • Instructs phone to turn off

encryption

Insider Attacks • No/weak encryption on backhaul • Bribed or coerced employees subvert

internal systems including lawful intercept

Network Attacks • Exploits network hardware such as base

stations or microwave repeaters where encryption is not used

Device Attacks • Hardware or software

listening/recording device is placed on device to bypass call encryption

• Requires device access so can be foiled by device management

Passive Radio Attack • Undetectable, listens passively to calls • Decrypts calls if encryption is turned on

by carrier

Page 5: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 5 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Why do You Need to Protect Your Calls ?

1. Espionage: Foreign State and Industrial In 2010, a technician who worked in a

Lebanese mobile phone operator was arrested for being an Israeli spy and giving access to phone calls for 14 years.

2010: Indian parliament disrupted over alleged widespread unauthorized government wiretapping.

2010: Pirelli accused of tapping Michelin & Yokahoma in an industrial espionage allegation via insider attack at Telecom Italia.

2010: Global internet data (including voice) were twice redirected through China after a Chinese telecommunications company re-programmed routing tables around the world. Included 8000 US networks including Apple, Dell and CNN.

2010: National carrier pushed hidden software update to all subscribers, Written by surveillance company, the update secretly accesses phone data.

2009: Turkey Prime Minister declares he has been a victim of phone-tapping for six years. Led to revelations of over 50 leading members of judiciary also tapped.

2009: Dominican Republic presidential accuses opponent of electoral fraud and publishes wire-tapping transcripts.

2005: The annual report to the US Congress on Foreign Economic Collection and Industrial Espionage, stated that 108 countries were involved in collection efforts against sensitive and protected US technologies. 40% of global R&D is US, $1Trillion worth of IP lost in 2008. IN 2007 the UK’s MI5 sent a letter to 300 CEO’s warning of attacks from “Chinese state organizations”.

2004: Eavesdroppers tapped the mobile phones of Greek Prime Minister, cabinet ministers and security officials between June 2004-Mar 2005 around the Athens Olympics. About 100 people, whose ranks include journalists and Arabs living in Greece, as well as the country's political and security elite and a US embassy worker, were monitored after snooping software was illegally installed on the systems of Vodafone Greece. Vodafone were fined £51m.

2. Organized Crime

In 2010, Romanian law enforcement authorities arrested 50 people for allegedly using off-the-shelf software to monitor other people's cell phone communications.

2010: Mexican spy centre discovered, including mobile van unit, alleged to be used for intercepting politicians, businessmen and journalists.

Risk of kidnapping of international business executives (estimated 9000 total kidnappings in Venezuela in 2009).

3. Investigative Journalism

2011: UK police re-open investigation into widespread cell phone voicemail hacking by British tabloid News of the World. Allegation is that practice is widespread practice amongst many newspapers. (News of the World is part of media conglomerate News Corp who own The Times, The Sunday Times, The Sun, New York Post, The Wall Street Journal, Dow Jones, Fox and many others).

2010: Ex-girlfriend of England Football captain sues against alleged mobile phone interception.

2008: James Pellicano “P.I. to the stars” was jailed for 3 ½ years for wiretapping activities that he performed on demand against a large number of celebrities and C-level executives. FBI found recordings of conversations that stretched back almost ten years.

Page 6: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 6 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Traditional equipment

Jet-990 Mobile Phone Intercept System: Tactical off air GSM, AMPS, HCMTS, CDMA , TDMA ,TACS , PCS , mobile phone intercept system, designed to intercept all cellular telephone. A passive system, it is undetectable and does not interfere with the network.

GSM 3060TP: GSM interceptor tracks GSM cellular telephone traffic in a local area. No hard wired connection to the cellular provider is necessary, as the GSM Interceptor can intercept GSM signals off the air. CDMA version available.

Comstrac: Both fully passive and hybrid active systems for the intercept of GSM cellular communications. For any frequency across 850/900/1800/1900Mhz and from 4 channels up to vehicle installed 128 channel systems. 2G GSM, UMTS and CDMA Protocols are all covered by the range of CTS systems.

Endoacustica GSM 007A: To intercept all cellular systems and transmission. Description: 'a system for receiving digital multi-channel program for the monitoring of mobile communications.

Ability GTReS, AGIS-51, IBIS & ACIS: passive & active cellular interception for GSM & CDMA. Records hundreds of simultaneous calls, SMS, DTMF tones.

Dataforce NDR-320 GSM Interceptor / NDR-330 CDMA Interceptor: provides fully passive (non-detectable) off-air interception of GSM communications in both non-encrypted and encrypted GSM networks.

Traditional commercial equipment used for routine active and passive radio interception

Page 7: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 7 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Attacks Are Becoming More Widespread

NEW AND EMERGING THREAT – INTERCEPTION FOR $1,400

Standard Laptop Free, open source software All-purpose radio

transmitter ($1400)

Page 8: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 8 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Wireless Arial Surveillance Platform (W.A.S.P)

Altitudes up to 22,000 Feet

Autopilot

GPS

Multiple Options including Wi-Fi and Cellular

Capable of Faking a Base Station & Call Recording

$6,000

Page 9: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 9 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Ease of Use combined with Strong Security

Cellcrypt Mobile™

Standard downloadable app for commercial off-the-shelf smartphones

Entirely software-based solution, deployable over-the air in minutes

IP-based running on GSM/CDMA 2G, 3G, 4G, Wi-Fi® and satellite

Certified to US NIST FIPS 140-2 security standard, validated to UK CESG Claims Tested Mark

Nokia

Android BlackBerry

iPhone

Interoperability

Page 10: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 10 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt Encrypted Voice Service

Cellcrypt™ Mobile

Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite

Cellcrypt Encrypted Content Delivery Network™ Management Console Signaling Server and globally distributed media servers

Page 11: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 11 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt Gateway

Cellcrypt™ Mobile

Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite

PBX Landlines

Voicemail

Cellcrypt™ Gateway

Conference Call

Any phone connected to

PSTN

PSTN

Cellcrypt Encrypted Content Delivery Network™ Management Console Signaling Server and globally distributed media servers

Customer-controlled Office Phone System

Server-based endpoint encrypts/decrypts 50 concurrent calls Interfaces to PBX, passes plaintext calls Leverages PBX functionality

Page 12: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 12 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt Private Switch

Cellcrypt™ Mobile

Cellular (CDMA, GSM, 2.5G, 3G), Wi-Fi & Satellite

PBX Landlines

Voicemail

Cellcrypt™ Gateway

Conference Call

Any phone connected to

PSTN

PSTN

Cellcrypt Encrypted Content Delivery Network™

Globally distributed media servers

Management Console Signaling

Cellcrypt Private Switch™

Access to ECDN

Customer-controlled Servers

Customer-controlled Office Phone System

Page 13: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 13 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt Solutions for Satellite

Uses standard satellite IP channel (VSAT, BGAN) with no additional hardware

Background IP and Streaming IP modes

Low latency (1000ms) & low bandwidth (24kbps)

Supports multiple, concurrent devices:

Multiple smartphones connected directly to satellite terminal (via Wi-Fi)

Multiple landlines connected directly to Cellcrypt Gateway which is connected to satellite terminal via Ethernet

Benefits

Concurrent callings (eg up to 20 Nokia smartphones on Explorer 700 BGAN (492kbps))

Lower cost than standard satellite call (depending on data plan)

Same device for calling over satellite as well as cellular and Wi-Fi

Page 14: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 14 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt: Ease of Use + Strong Security

Downloadable app, no hardware, deployable over-the air in minutes

End-to-end encryption

IP-based running on 2G, 3G, 4G, Wi-Fi® and satellite

Government-grade security

» Certified to US NIST FIPS 140-2 security standard

» Validated to UK CESG Claims Tested Mark security scheme

Industry’s best performance

Nokia

Android BlackBerry

iPhone

Interoperable

Page 15: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 15 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Cellcrypt Company Overview

Leadership BlackBerry Alliance Partner: First BlackBerry secure

voice solution, preferred by RIM

Inmarsat Alliance Partner

Telefonica offering in Latin America.

Bid by Defence Contractors and Carriers globally

2010: SC Magazine Award Finalist “Best Encryption Product”

Technical Innovation: High Performance Encryption over variable

wireless networks: unique network

Software-only Encryption (high strength)

50 people, independent, privately owned. Business (offices) in: Europe (London, also HQ & Development)

North America (Washington DC)

Latin America (Miami)

Middle East, Africa & Asia (Dubai)

*Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones

History: founded 2005 2008: world’s first secure mobile-to-mobile IP-based

software-only solution demonstrated

2009: world’s first secure mobile-to-landline IP-based software-only solution

2009: Q2 world’s first BlackBerry® secure voice solution (and first IP call on BlackBerry®)

2009: Q3 world’s first secure calling via satellite from business cell phones*

2010: Q2 world’s first BlackBerry/CDMA secure voice call

2011: Q2 world’s first interoperable secure calls between BlackBerry, iPhone, Android, Nokia

R&

D

Co

mm

erc

ialis

atio

n

Page 16: DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011

© 2011 Cellcrypt. All rights reserved. Slide 16 www.cellcrypt.com COMPANY CONFIDENTIAL RTN

Thank You

www.cellcrypt.com