LinkedIn Tracking

Encrypted Secure Communications


NSI Global Counter Intelligence can secure that right.


Over the past two decades, telecommunications interception has developed into a major industry. Intelligence agencies, private organisations, criminal elements, and competitors within all countries routinely intercept calls that may yield sensitive political, military, corporate, or economic information.

NSI Encrypted Communication Devices have encryption you can trust. Using 4096 bit Diffie-Hellmann (Key Exchange) and AES 256 and Twofish for Voice and Data. There are no backdoors, verifiable by independent researches.

The use of wiretapping has become so widespread, simple, and uncontrolled that you must assume that records of your private calls and SMS end up in the wrong hands. Equipment for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently even in comparatively small business conflicts. Encryption is approved by the National Institute of Standards and Technology (NIST) of the USA and is FIPS 140-2 Certified. NSI Encrypted Communication Devices are easy to use and a trustworthy solution for confidential phone calls and messages and includes a secure phone book container.

But protecting your information with strong and trustworthy encryption has become difficult. “Proprietary” or “secret” algorithms of dubious quality and encryption that is too weak to protect against modern computing power are commonplace in the telecommunications market. These weaknesses are masked by marketing efforts, suggesting that you need to rely on “the secrecy of the algorithm” or “government classification” – certified by the same intelligence agencies that are actually in charge of telecommunications interception.

Now there is a solution that you can trust, because it can be verified by you or by your experts. NSI Encrypted Communication Devices come with full source code available for independent review. Finally, you can perform an independent assessment to ensure that there is no weak encryption and no backdoors in the device you entrust your telecommunications security to. You don’t have to believe us when we say it is secure – you can verify that claim yourself.

NSI Encrypted Communication Devices are not black-box-devices with scarce technical information, like other products in the market. NSI Encrypted Communication Devices enable you to put the trust where it belongs – in a trustworthy, open, and scientific verification process.

The NSI Encrypted Communication Devices technology is based on well-researched algorithms for both encryption and voice processing: The strongest encryption available combined with key lengths that provide peace of mind today and in the future. NSI Encrypted Communication Devices encrypt your calls with the two algorithms that are regarded as the strongest by the cryptographic community – AES and Twofish.