With the launch of our new website platform, TCC's CipherONE blog will now be hosted at https://www.tccsecure.com/NewsResources/CipherONEBlog.aspx
Please bookmark this link and also visit us to check out our new mobile responsive site.
Information and news on secure voice, data and video encryption technology, information security industry developments, cryptography, products, services and training to protect communications in transit. Covers government, military and business communications from mobile phone and land line phones, to radio and LAN or wide area network security spanning IP, satellite, microwave, fiber optic and more.
Search This Blog
Friday, July 8, 2016
Thursday, April 21, 2016
Phone Hacking Is Easy and All Phones Are Vulnerable
With just a phone number, hackers can hear and
record voice conversations, track a person’s whereabouts, read text messages,
spy on a person, and steal information — such as contacts data, giving hackers
the phone numbers of others for additional malicious actions.
In the investigation conducted by the CBS News
Network, which aired "Hacking Your Phone" on the 60 Minutes television program, hackers quickly and without detection intercepted and recorded a congressman’s phone conversation by just knowing his phone number.
TCC’s CipherTalk® secure smartphone protects
against all of these threats. It doesn’t use the SS7 global phone network protocol,
provides end-to-end military-grade encryption, encrypts stored data like
contacts, and makes communications anonymous, while functioning just like a
typical easy-to-use smartphone.
View the video of
the investigation report to understand firsthand the vulnerabilities of mobile
phone communications. Politicians, business executives, military/paramilitary organizations, law firms, financial, industrial utility, and pharmaceutical operations are just some high-risk areas.
Next, contact TCC to secure your mobile phone — and all
your phone communications: landline, VoIP and smartphone, as they all use the
SS7 network and are all at risk.
'Hacking Your Phone' Video Report by 60 Minutes
TECHNICAL COMMUNICATIONS CORPORATION | www.tccsecure.com | Subscribe to TCC News
Friday, March 25, 2016
TCC’s CipherTalk® Makes Mobile Voice and Text Communications Anonymous
The CipherTalk secure smartphone provides military-grade full-circle protection for all aspects of mobile phone talk and text communications, including an innovative ability to ensure user anonymity. The entire voice and text messaging connection procedure is hidden, and no user data or call logs are generated, collected or stored. Whom and when a user is calling, and where they are calling from, is only known by the user.
To ensure full anonymity of communications the secure CipherTalk infrastructure includes three information gaps. The first gap is between the CipherTalk phones, where the CipherONE® Secure Connect Network isolates the CipherTalk phone initiating the call from the answering CipherTalk phone terminating the call. The CipherONE Secure Connect Network securely authenticates and IP connects the CipherTalk phones, and maintains the CipherTalk IP connections worldwide. The CipherTalk phones communicate only with the CipherONE Secure Connect Network. The CipherONE Network securely relays the encrypted talk or text between the CipherTalk phones, providing anonymity of who is calling whom and their locations. This relay process does not affect the encrypted talk or text communications, which are encrypted and decrypted by the CipherTalk phones only.
The second information gap to ensure anonymity is between the CipherTalk phones and the end-users. The end-user does not have to provide any personal or subscriber information to make a secure call even when using GSM data services. This allows an organization to hide the end-users of the CipherTalk phones, separating the users of the phones from the procurement of the phones, which provides invisibility and anonymity of the end-user.
The third information gap is that TCC’s technology hides the encrypted communications. As the encrypted communications are undetectable, they cannot be seen and therefore intercepted or blocked by the outside world. See Figure 1
To ensure full anonymity of communications the secure CipherTalk infrastructure includes three information gaps. The first gap is between the CipherTalk phones, where the CipherONE® Secure Connect Network isolates the CipherTalk phone initiating the call from the answering CipherTalk phone terminating the call. The CipherONE Secure Connect Network securely authenticates and IP connects the CipherTalk phones, and maintains the CipherTalk IP connections worldwide. The CipherTalk phones communicate only with the CipherONE Secure Connect Network. The CipherONE Network securely relays the encrypted talk or text between the CipherTalk phones, providing anonymity of who is calling whom and their locations. This relay process does not affect the encrypted talk or text communications, which are encrypted and decrypted by the CipherTalk phones only.
The second information gap to ensure anonymity is between the CipherTalk phones and the end-users. The end-user does not have to provide any personal or subscriber information to make a secure call even when using GSM data services. This allows an organization to hide the end-users of the CipherTalk phones, separating the users of the phones from the procurement of the phones, which provides invisibility and anonymity of the end-user.
The third information gap is that TCC’s technology hides the encrypted communications. As the encrypted communications are undetectable, they cannot be seen and therefore intercepted or blocked by the outside world. See Figure 1
Figure 1:
Three information-gap infrastructure for anonymous secure CipherTalk call/text
communications. Click image to enlarge
Learn more about the military-grade CipherTalksecure smartphone or contact us at www.tccsecure.com/sales.
TECHNICAL COMMUNICATIONS CORPORATION | www.tccsecure.com | Subscribe to TCC News
Subscribe to:
Posts (Atom)