Presentation is loading. Please wait.

Presentation is loading. Please wait.

AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011.

Similar presentations


Presentation on theme: "AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011."— Presentation transcript:

1 AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

2 Did you know that smartphones are being hacked into? Spyware, malware and multiple variants of Android viruses are making their way onto smartphones! Spyware, malware and multiple variants of Android viruses are making their way onto smartphones! “Spy.Felxispy”, the latest has affected over 150,000 smartphones in a short time. “Spy.Felxispy”, the latest has affected over 150,000 smartphones in a short time. They are working their way onto smartphones via alternate application market places. They are working their way onto smartphones via alternate application market places.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

3 How are they installed into smartphones? Privacy stealers usually install the spyware in your phone. Privacy stealers usually install the spyware in your phone. They send MMS containing the spyware to you to lure you to click. They send MMS containing the spyware to you to lure you to click. As the spyware is artfully disguised, you will be easily trapped. As the spyware is artfully disguised, you will be easily trapped.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

4 Once installed… The spyware can remotely turn on the speaker of your phone to monitor sounds around you without the you being aware. The spyware can remotely turn on the speaker of your phone to monitor sounds around you without the you being aware. The spyware will turn on the Conference Call feature of your device without you being aware, and eavesdrop on all your conversations. The spyware will turn on the Conference Call feature of your device without you being aware, and eavesdrop on all your conversations. The spyware is also capable of synchronizing the messages you received and delivered to the monitoring phone. The spyware is also capable of synchronizing the messages you received and delivered to the monitoring phone.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

5 Your security is compromised! These performances will compromise your privacy. These performances will compromise your privacy. smartphone users are exposed to more mobile security threats than ever before and you should always be cautious whenever performing operations on your mobile devices. smartphone users are exposed to more mobile security threats than ever before and you should always be cautious whenever performing operations on your mobile devices.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

6 To stay safe and have secure communications There is only one answer: There is only one answer: THE XAOS GAMMA Encrypting Mobile Phone  Amsco Limited all rights reserved 2011

7 AMSCO Ltd BRINGS TO YOU THE ULTIMATE SOLUTION For Safe GSM Communication For Safe GSM Communication The χaos gamma™ Encrypting Mobile Phone The χaos gamma™ Encrypting Mobile Phone in collaboration with Techlab2000 R&D C° in collaboration with Techlab2000 R&D C°  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

8 Xoas Gamma Encrypting Mobile Phones Unlike smartphones the XG is a GSM, a GPRS/EDGE and an Encrypting machine all in one. Unlike smartphones the XG is a GSM, a GPRS/EDGE and an Encrypting machine all in one. Unlike software, it is a hardware device which cannot be attacked by external software. Unlike software, it is a hardware device which cannot be attacked by external software. The χaos gamma encrypting phone belongs to SYLAN “family” of telecom devices and is designed to work in any standard GSM network. The χaos gamma encrypting phone belongs to SYLAN “family” of telecom devices and is designed to work in any standard GSM network.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

9 The User of χaos gamma is given the opportunity to: The User of χaos gamma is given the opportunity to: 1. Make encrypted (only among SYLAN system devices) and plain calls, locally and internationally, 2. Send encrypted and plain text messages, locally and internationally 3. Store up to 5000 records 4. All of the data stored in the device is encrypted, and the device is protected against manipulation and replacement.  Amsco Limited all rights reserved 2011

10 The χaos gamma phone offers advanced cryptographic solutions, The χaos gamma phone offers advanced cryptographic solutions, an extremely short time of establishing an encrypted call (1,5 - 2 seconds), an extremely short time of establishing an encrypted call (1,5 - 2 seconds), very short voice transmission delay (less than 0,5 second) very short voice transmission delay (less than 0,5 second) and excellent voice quality. and excellent voice quality. There is no comparable device with such parameters. There is no comparable device with such parameters.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

11 Main features/principals of the Sylan system applied in Xaos Gamma phones. Advanced cryptographic mechanism additionally boosted by hardware accelerators assuring not only the highest level of security but incorporating speed of operation. Full interoperability allowing to maintain secrecy and safety, regardless of the stage of the transfer (Xaos to base station, base station to operator, operator to base station, and base station to another Xaos Gamma phone or Sylan protected landline phone). Full interoperability allowing to maintain secrecy and safety, regardless of the stage of the transfer (Xaos to base station, base station to operator, operator to base station, and base station to another Xaos Gamma phone or Sylan protected landline phone). Uses standard services provided by telecom providers, but secures independence from local providers. Uses standard services provided by telecom providers, but secures independence from local providers. Simplicity of use, user-friendly (no technical knowledge expected from the user) Simplicity of use, user-friendly (no technical knowledge expected from the user)  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

12 Application of the Sylan system on the Xaos Gamma mobile phone XG uses AES up to 256 bits strength analysed and positively recognised algorithm. XG uses AES up to 256 bits strength analysed and positively recognised algorithm. When calling from one Xaos Gamma phone to another Xaos Gamma phone, the first part is the unique sending and receiving of a unique encrypted key for only this call. When calling from one Xaos Gamma phone to another Xaos Gamma phone, the first part is the unique sending and receiving of a unique encrypted key for only this call. Each part of the conversation is encrypted before it is sent. Each part of the conversation is encrypted before it is sent. Once the conversation is ended the encrypted key is erased. Once the conversation is ended the encrypted key is erased. It is impossible for wire tapping even by the GSM system operator.  Amsco Limited all rights reserved 2011 It is impossible for wire tapping even by the GSM system operator.  Amsco Limited all rights reserved 2011

13 Secure XG communication versus easily tapped gsm communication

14 GSM telecommunication is based on two media: radio waves radio waves and standard telecommunication network using cable connections and switching stations (central offices). and standard telecommunication network using cable connections and switching stations (central offices). In plain (non-encrypting) phones the radio wave part of transmission is protected using standard cryptography algorithms that are known as very naive, easy to overcome and finally were broken many years ago. In plain (non-encrypting) phones the radio wave part of transmission is protected using standard cryptography algorithms that are known as very naive, easy to overcome and finally were broken many years ago. Hence interception of GSM calls is very simple on the radio wavelengths and trivial on the cable part of the network. Hence interception of GSM calls is very simple on the radio wavelengths and trivial on the cable part of the network.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

15 Among numerous attacks on GSM calls, the most dangerous are: 1. Interception in the switching station (central office) based on standard functions present in every device of this type. The only obstacle is access to the station, which is easily overcome as it concerns the human factor. 1. Interception in the switching station (central office) based on standard functions present in every device of this type. The only obstacle is access to the station, which is easily overcome as it concerns the human factor. 2. Interception on standard telecommunication cables. To accomplish this kind of interception one has to invest in a special device valued at only a few thousand US dollars. Access to the cables is easy as they are generally not protected.  Amsco Limited all rights reserved 2011 2. Interception on standard telecommunication cables. To accomplish this kind of interception one has to invest in a special device valued at only a few thousand US dollars. Access to the cables is easy as they are generally not protected.  Amsco Limited all rights reserved 2011

16 3. Real time direct interception on the radio transmission is also possible thanks to a very weak cryptographic algorithms used. The investments is also very modest – only a few hundreds of dollars. 3. Real time direct interception on the radio transmission is also possible thanks to a very weak cryptographic algorithms used. The investments is also very modest – only a few hundreds of dollars. 4. The GSM calls can also be attacked using a special mobile device which simulates the network to the attacked GSM phone and the attacked phone to the network. This kind of device also costs only a few thousand US$. 4. The GSM calls can also be attacked using a special mobile device which simulates the network to the attacked GSM phone and the attacked phone to the network. This kind of device also costs only a few thousand US$. Methods of overhearing mentioned above are very hard to discover. They hardly interfere with the telecommunication network and, what is more important, they do not leave any traceable signs. Methods of overhearing mentioned above are very hard to discover. They hardly interfere with the telecommunication network and, what is more important, they do not leave any traceable signs.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

17 The only way to avoid eavesdropping is to use a pair of special GSM phones. In this case, whole voice path, phone-to-phone is encrypted. In this case, whole voice path, phone-to-phone is encrypted. Encrypted calls are performed differently than plain ones. Encrypted calls are performed differently than plain ones. They use a CSD mode of network, which is covered by the GSM standard but is seldom used. They use a CSD mode of network, which is covered by the GSM standard but is seldom used. When an encrypted call takes place, additional information is transferred, so there is less space for voice data on the radio channel. When an encrypted call takes place, additional information is transferred, so there is less space for voice data on the radio channel. Hence an encrypting phone has to use more efficient voice encoder and error correction algorithms. Hence an encrypting phone has to use more efficient voice encoder and error correction algorithms. Encryption does not tolerate bit errors. Encryption does not tolerate bit errors.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

18 There are two classes of encrypting phones on the market now: Typical Smart GSM phones running Symbian, Linux or Windows Mobile operating systems, where encrypting functions are performed by add-on software applications – this is targeted mainly for business users Typical Smart GSM phones running Symbian, Linux or Windows Mobile operating systems, where encrypting functions are performed by add-on software applications – this is targeted mainly for business users GSM devices designed especially for professionals: police, military and secret services. GSM devices designed especially for professionals: police, military and secret services.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

19 IN TERMS OF SECURITY The specially designed GSM phones for professionals exhibit numerous advantages The specially designed GSM phones for professionals exhibit numerous advantages  Amsco Limited all rights reserved 2011

20 Most common flaws in regular & smartphones are as follows: Lack of computational power and necessary modes of data transmission in smartphones leads to very long delays in connections (e.g. 30sec) and to weakness of cryptographic algorithms. Furthermore there is an increased delay (over 1sec) in voice transmission. Lack of computational power and necessary modes of data transmission in smartphones leads to very long delays in connections (e.g. 30sec) and to weakness of cryptographic algorithms. Furthermore there is an increased delay (over 1sec) in voice transmission. Encrypting software in the smartphone is only an application, which is awkward and inconvenient to use. Often requiring additional operations before the user can perform an encrypted call. Encrypting software in the smartphone is only an application, which is awkward and inconvenient to use. Often requiring additional operations before the user can perform an encrypted call. Multi-function, commonly known and open source operating systems used in smartphones are very susceptible to virus and Trojan attacks. Multi-function, commonly known and open source operating systems used in smartphones are very susceptible to virus and Trojan attacks. In practice, they have no chance to resist or even detect external manipulations of its code. This fact and bugs in software are the most common methods to break even the most powerful cryptography. In practice, they have no chance to resist or even detect external manipulations of its code. This fact and bugs in software are the most common methods to break even the most powerful cryptography. In business solutions, cryptographic keys are often created by primitive, pseudo-random series software generators. It greatly weakens the power of encrypting algorithms by reducing the available key space.  Amsco Limited all rights reserved 2011 In business solutions, cryptographic keys are often created by primitive, pseudo-random series software generators. It greatly weakens the power of encrypting algorithms by reducing the available key space.  Amsco Limited all rights reserved 2011

21 In an open application environment, it is very easy to intercept plain voice data just before encrypting algorithm covers it by cryptography. In the case of secure calls, the smart GSM device could be the threat rather than the solution. In an open application environment, it is very easy to intercept plain voice data just before encrypting algorithm covers it by cryptography. In the case of secure calls, the smart GSM device could be the threat rather than the solution. There are applications for smartphones that transmit the voice from the microphone even when the GSM phone appears to be powered off. There are applications for smartphones that transmit the voice from the microphone even when the GSM phone appears to be powered off. smartphones lack prevention from unauthorized reading of information such as contacts, call registers or texts. smartphones lack prevention from unauthorized reading of information such as contacts, call registers or texts. Applications downloadable to typical phones are slow, awkward and unstable. Applications downloadable to typical phones are slow, awkward and unstable. In a Symbian phone the user is not able to verify authenticity of his phone. In a Symbian phone the user is not able to verify authenticity of his phone. When there is a risk of replacement or manipulation in the smartphone, the possibility to test if it is original and unmodified is crucial. When there is a risk of replacement or manipulation in the smartphone, the possibility to test if it is original and unmodified is crucial.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

22 The Xaos Gamma Mobile Phone has the advantage! A lot of cheap spying applications exist on the market, which are capable of voice and SMS invisible interception. These applications can be installed without the knowledge of the user and runs in stealth mode. A lot of cheap spying applications exist on the market, which are capable of voice and SMS invisible interception. These applications can be installed without the knowledge of the user and runs in stealth mode. It is impossible to run such an application on XG. It is impossible to run such an application on XG.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

23 Smart GSM handsets can be reconfigured or uploaded via OTA (over the air) mechanism which is invisible to the user. Smart GSM handsets can be reconfigured or uploaded via OTA (over the air) mechanism which is invisible to the user. It is impossible to modify XG this way. It is impossible to modify XG this way. The GSM standards make provision for remote microphone activation. The GSM standards make provision for remote microphone activation. No one can remotely activate XG's microphone. No one can remotely activate XG's microphone.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

24 To have secure communications you need to limit the access. To have secure communications you need to limit the access. The XG reduces communications to its essentials by maintaining high levels of security. Encrypting systems should be easy to use, otherwise users will take short cuts and open themselves to intrusion. Encrypting systems should be easy to use, otherwise users will take short cuts and open themselves to intrusion. The XG is user friendly and simple to use. Pure software can never provide the security level available in hardware. The XG has a hardware encrypting device. Pure software can never provide the security level available in hardware. The XG has a hardware encrypting device. When it comes to secure communication, When it comes to secure communication, The Xaos Gamma outperforms the encrypting smartphone  Amsco Limited all rights reserved 2011

25 For Secure Communication, which should I use, the GE Sectéra smartphones, the Ancort A-7 krypto smartphones or the Xaos Gamma Encrypting mobile phones ? You may opt for the GE Sectéra gsm or the Sectéra Edge smartphone, which offers you many features with internet access, using encrypting software and proprietary system; You may opt for the GE Sectéra gsm or the Sectéra Edge smartphone, which offers you many features with internet access, using encrypting software and proprietary system; Or the Russian Ancort A-7 kryto smartphone, which offers you many features with internet access, using encrypting software and proprietary system; Or the Russian Ancort A-7 kryto smartphone, which offers you many features with internet access, using encrypting software and proprietary system; As mentioned before the more applications your Smart phone has the more it reduces the security. As mentioned before the more applications your Smart phone has the more it reduces the security. If you use software protection, you are open to hacking. If you use software protection, you are open to hacking. If you use proprietary systems, someone else may access your phone. If you use proprietary systems, someone else may access your phone.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

26 For Secure Communication, which should I use, the GE Sectéra smartphones, the Ancort A-7 krypto smartphones or the Xaos Gamma Encrypting mobile phone? XG Encrypting Phones do not have internet access so as not to compromise the security of your voice and text transmissions. XG Encrypting Phones do not have internet access so as not to compromise the security of your voice and text transmissions. XG Encrypting Phones are hardware encryption machines, impossible to hack into. XG Encrypting Phones are hardware encryption machines, impossible to hack into. XG does not use a proprietary system, even Techlab’s technicians can’t decode your calls. XG does not use a proprietary system, even Techlab’s technicians can’t decode your calls. You want real and genuine security for your voice and text communication Xaos Gamma Encrypting Phone is the only one for you! You want real and genuine security for your voice and text communication Xaos Gamma Encrypting Phone is the only one for you!  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

27 Can I have an email Option for my XG phones? Yes you may. Yes you may. Without compromising your security in communication and maintaining it at the same level as for voice and text, the XG may be upgraded to include email only accessibility. Without compromising your security in communication and maintaining it at the same level as for voice and text, the XG may be upgraded to include email only accessibility. This is a special option and may be taken at an extra cost of €425.00. This is a special option and may be taken at an extra cost of €425.00.  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

28 The XG More SECURE & CHEAPER Your XG only costs you €2,000.00* Your XG only costs you €2,000.00* Whereas the GE Sectéra National Gsm costs €3,645.00 Whereas the GE Sectéra National Gsm costs €3,645.00 And the Ancort A-7 costs €2,850.00 And the Ancort A-7 costs €2,850.00 You get three + XG Encrypting phones for two smartphones, with faster transmission and more secure communication. You get three + XG Encrypting phones for two smartphones, with faster transmission and more secure communication. * ask for promotional price only valid for Europe March to May 2011 * ask for promotional price only valid for Europe March to May 2011  Amsco Limited all rights reserved 2011  Amsco Limited all rights reserved 2011

29 The Xaos Gamma is a fully professional encrypting GSM phone. The XG hardware and software architecture is optimized for protection and cryptography. Encrypting standards and restrictive development flow and testing mechanisms guarantee absolute confidentiality of voice and data transfers. Even TechLab development team is unable to intercept the call organized by χaos gamma. The χaos gamma is highly manipulation proof. XG’s software is also protected against disintegration. The XG is user friendly and has very efficient contacts data base engine. The XG responds quickly to user commands.  Amsco Limited all rights reserved 2011The χaos gamma is very fast. It arranges an encrypted call in no more than 2s. That is over 10 times quicker than competitors.  Amsco Limited all rights reserved 2011

30 Every connection is encrypted using independent keys, which are derived from random data using elliptic Diffie- Hellman scheme. The key is then destroyed after disconnection. Every connection is encrypted using independent keys, which are derived from random data using elliptic Diffie- Hellman scheme. The key is then destroyed after disconnection. The key digest presented on LCD protects against 'man- in-the-middle' attack. The key digest presented on LCD protects against 'man- in-the-middle' attack. The voice stream is encrypted using well-known and powerful AES-256 algorithm The voice stream is encrypted using well-known and powerful AES-256 algorithm The delay time in transmission does not exceed 450 ms, which is comparable to voice delay in standard GSM connection. The delay time in transmission does not exceed 450 ms, which is comparable to voice delay in standard GSM connection. Voice has excellent quality and communication is made with ease. Voice has excellent quality and communication is made with ease. The χaos gamma implements an encrypted file system which makes all user data confidential and safe, even if the phone is lost or stolen. The χaos gamma implements an encrypted file system which makes all user data confidential and safe, even if the phone is lost or stolen. Every χaos gamma phone has an unique identity, which allows to determine device authenticity. Every χaos gamma phone has an unique identity, which allows to determine device authenticity.

31  Amsco Limited all rights reserved 2011 Xaos Gamma is THE ultimate solution for your secure communication. Xaos Gamma is THE ultimate solution for your secure communication. Thank You. Thank You.


Download ppt "AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011."

Similar presentations


Ads by Google