LinkedIn Tracking

CP500i Cryptophone Encrypted Communications

Authorised Australian Reseller


NSI Global Counter Intelligence is Australia’s Cryptophone reseller. Cryptophone offers voice and messaging encryption like no other. The CryptoPhone 500 is a highly secure mobile phone that comes with full source code available for independent review. Finally, you can perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust with your confidential data and telephone calls.

 

Equipment for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently, even in comparatively small business conflicts. So using encryption to protect your privacy is a wise choice. If you conduct business that is of high sensitivity; in conflict zones or a high security area, using secure communications such as an encrypted phone is a must.

By combining GSMK’s renowned end-to-end voice and message encryption with a highly sophisticated approach towards mobile device protection, the Cryptophone 500i offers a defence-grade mobile phone security solution with true 360° mobile device security.

The CP-500i has the following features:
  • Encrypted Storage System – Contacts, messages, and notes with smart folders protects data at rest against unauthorised access.
  • Secure Contacts and Call History – Your whole contact list and call history are kept secure. Protecting ‘when you called’ someone is as important as ‘who you called’.
  • Voice Encryption – Secure end-to-end encrypted voice over IP calls on any network – GSM, 3G, 4G, WLAN.
  • Secure Messaging – Based on the same strong encryption algorithms used for GSMK Cryptophone voice encryption.
  • Device Protection – Control access to the network, data, and sensors like the camera and microphone.
  • Verifiable Source Code – The only secure phone on the market with source code available for independent security assessments.
  • Android OS – Built from source code with granular security management, and security optimised components and communication stacks.

The latest Cryptophone mobile phone – the CP500i, offers Unique protection against over-the-air attacks with constant monitoring of baseband processor activity by detecting Signalling System 7 (SS7) paging requests and Silent SMS Tracking attempts. The Cryptophone can also quickly and easily advise you of any interception from rogue base stations/cell towers.

Baseband Firewall Features:
  • Detection of IMSI Catchers – IMSI Catchers, or Stinger Towers, are fake base stations or cell tower which are used to get mobile phones that are within range to register to it using the SS7 protocol. This is a major threat in that conversations may be read and listened to. This allows the attacker to force down the network from either 4G or 3G down to 2G, deactivate encryption, jamming and other active cellular interference.
  • Baseband Firewall – Unique protection against over-the-air attacks with constant baseband activity monitoring.
  • Baseband Attack Detection – Advanced heuristics allow the detection of suspicious activities and the initiation of countermeasures.

Contact us today to enquire about the Cryptophone suite of communications devices which include mobile phones, desk phones, servers, and satellite phones.

Contact