Cellcrypt launches Android encrypted voice calling
Cellcrypt, the leading provider of encrypted voice calling on mobile phones, today announced that it has launched Cellcrypt Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks.
Cellcrypt Mobile provides encrypted voice calling for off-the-shelf cell phones using government-certified security in an easy-to-use downloadable application that makes highly secure calling as easy as making or placing a normal phone call. It is a software-only solution that uses the IP data channel of cellular (2G, 3G, 4G), Wi-Fi and satellite networks and can be deployed to personnel anywhere in the world in as little as 10 minutes.
Cellcrypt Mobile is in use by governments and corporations globally, uses cryptography certified to US government National Institute of Standards and Technology FIPS 140-2 security standards and has been awarded the CESG Claims Tested Mark (CCTM) from the U.K. government's information assurance authority.
The interception threat level increased during 2010 as hackers developed, demonstrated and published details of low-cost air-interface interception equipment that uses open source software freely downloadable from the internet and a generic off-the-shelf radio transceiver costing less than $2,000. Another group of hackers demonstrated interception in December 2010 using four modified cell phones as transceivers each costing $15 (interception was filmed in London by the BBC in April 2011 http://www.bbc.co.uk/news/technology-13013577). At least one top-tier European University has added practical lessons in GSM interception to its curriculum.
"Cellular voice interception is different from other types of data breach," said Nigel Stanley, Practice Leader, Security at Bloor Research, "if you lose a laptop, USB stick or disk drive it can be fairly obvious that the data has gone missing. But with voice, a successful interception can leave no physical trace so there is little chance of realizing your data has actually been intercepted resulting in disastrous consequences. If you can compromise a cell phone then you are more or less assured that you can collect the most relevant, current and damaging data possible about a user, their business or their private life. By supporting Android devices, Cellcrypt is providing enhanced security for one of the world's most popular mobile platforms."
At the same time as the threat level is increasing, the use of cell phones for discussing sensitive and confidential information has also increased, even among government employees, due to the ease of use, ubiquity and interoperability of mobile phones. This leads to an increased need for government-grade end-to-end protection that provides assurance that call security is controlled along all points of the call path between caller and recipient and risks are adequately mitigated in compliance with internal security policies.
"We are seeing a growing tension between organizational security requirements and personal convenience requirements with people often discussing sensitive issues on mobile phones to get their jobs done faster or because they have no other practical choice." said Richard Greco, CEO
of Cellcrypt, continuing, "With Cellcrypt's support of Android we are meeting the usability demands of a fast-growing user base whilst continuing to help organizations meet their operational security requirements."
Cellcrypt Mobile for Android is available immediately on devices supporting Android 2.3 and is interoperable with Cellcrypt running on other devices such as Nokia and BlackBerry® smartphones.
Source: Cellcrypt
More from Digital Battlespace
-
AUSA 2024: General Micro Systems adds four new products to the X9 Spider family
The airborne three-domain, the two ground-based and the ¼ ATR OpenVPX-based cross-domain systems were engineered to provide real-time security across multi-domain operations.
-
BAE Systems gets go-ahead for second phase of mission communications programme
DARPA’s Mission-Integrated Network Control (MINC) programme was set up to develop an autonomous tactical network and enable critical data flow in contested environments.
-
Just Released: Space Technology Report
Why space is an essential part of modern military capabilities
-
Work-from-home warfare: the power of mixed reality
Defence-secure mixed reality headsets can save hours, or even weeks, of travel time to fix defunct equipment or get subject experts effectively “on-site” where they are needed.
-
Northrop Grumman receives follow-on contract for CUAS and C-IED systems
The Joint Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (JCREW) counter-improvised explosive device (C-IED) and Drone Restricted Access Using Known Electromagnetic Warfare (DRAKE) counter-UAS (CUAS) systems are mounted and dismounted RF jammers.
-
Adarga’s Vantage AI software selected for UK Strategic Command’s Defence Support
Adarga’s Vantage information analysis tool is in service with the UK MoD and individual UK forces. It builds on the company’s Knowledge Platform which processes, organises and analyses open source material, as well as information held by the user’s military, security and intelligence services.