• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

Cellcrypt Launches Encrypted Voice for Android Smartphones

June 14, 2011 By ECN Staff

Cellcrypt, the leading provider of encrypted voice calling on mobile phones, today announced that it has launched Cellcrypt Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks.

Cellcrypt Mobile provides encrypted voice calling for off-the-shelf cell phones using government-certified security in an easy-to-use downloadable application that makes highly secure calling as easy as making or placing a normal phone call. It is a software-only solution that uses the IP data channel of cellular (2G, 3G, 4G), Wi-Fi and satellite networks and can be deployed to personnel anywhere in the world in as little as 10 minutes.

Cellcrypt Mobile is in use by governments and corporations globally, uses cryptography certified to U.S. government National Institute of Standards and Technology FIPS 140-2 security standards and has been awarded the CESG Claims Tested Mark (CCTM) from the U.K. government’s information assurance authority.

The interception threat level increased during 2010 as hackers developed, demonstrated and published details of low-cost air-interface interception equipment that uses open source software freely downloadable from the internet and a generic off-the-shelf radio transceiver costing less than $2,000. Another group of hackers demonstrated interception in December 2010 using four modified cell phones as transceivers each costing $15 (interception was filmed in London by the BBC in April 2011 https://www.bbc.co.uk/news/technology-13013577). At least one top-tier European University has added practical lessons in GSM interception to its curriculum.

“Cellular voice interception is different from other types of data breach,” said Nigel Stanley, Practice Leader, Security at Bloor Research, “if you lose a laptop, USB stick or disk drive it can be fairly obvious that the data has gone missing. But with voice, a successful interception can leave no physical trace so there is little chance of realizing your data has actually been intercepted resulting in disastrous consequences. If you can compromise a cell phone then you are more or less assured that you can collect the most relevant, current and damaging data possible about a user, their business or their private life. By supporting Android devices, Cellcrypt is providing enhanced security for one of the world’s most popular mobile platforms.”

At the same time as the threat level is increasing, the use of cell phones for discussing sensitive and confidential information has also increased, even among government employees, due to the ease of use, ubiquity and interoperability of mobile phones. This leads to an increased need for government-grade end-to-end protection that provides assurance that call security is controlled along all points of the call path between caller and recipient and risks are adequately mitigated in compliance with internal security policies.

“We are seeing a growing tension between organizational security requirements and personal convenience requirements with people often discussing sensitive issues on mobile phones to get their jobs done faster or because they have no other practical choice.” said Richard Greco, CEO of Cellcrypt, continuing, “With Cellcrypt’s support of Android we are meeting the usability demands of a fast-growing user base whilst continuing to help organizations meet their operational security requirements.”

Cellcrypt Mobile for Android is available immediately on devices supporting Android 2.3 and is interoperable with Cellcrypt running on other devices such as Nokia and BlackBerry smartphones.

For more information please visit: www.cellcrypt.com.

You Might Also Like

Filed Under: Fiber Optics

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

zonal architecture

Addressing zonal architecture challenges in the automotive industry

zonal architecture

Addressing zonal architecture challenges in the automotive industry

A2L refrigerants drive thermal drift concerns in HVAC systems

Why outdoor charging demands specialized battery connectors

How Li-ion batteries are powering the shift in off-highway equipment

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Designing for Serviceability: The Role of Interconnects in HVAC Maintenance

From Control Boards to Comfort: How Signal Integrity Drives HVAC Innovation

Built to Withstand: Sealing and Thermal Protection in HVAC Sub-Systems

Revolutionizing Manufacturing with Smart Factories

Smarter HVAC Starts at the Sub-System Level

Empowering aerospace E/E design and innovation through Siemens Xcelerator and Capital in the Cloud

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Earth leakage circuit with TL071
  • Step Up Push Pull Transformer design / construction
  • CT
  • current distribution on resonant mode in anapole resoantor question
  • Snooping Around is All

RSS Current Electro-Tech-Online.com Discussions

  • More fun with ws2812 this time XC8 and CLC
  • I Wanna build a robot
  • Pickit 5
  • Pic18f25q10 osccon1 settings swordfish basic
  • The Analog Gods Hate Me
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy