amsco ltd presents the xaos gamma encrypting phone the answer for secure communication. amsco...

31
AMSCO Ltd AMSCO Ltd PRESENTS PRESENTS THE XAOS GAMMA THE XAOS GAMMA ENCRYPTING PHONE ENCRYPTING PHONE THE ANSWER FOR SECURE THE ANSWER FOR SECURE COMMUNICATION. COMMUNICATION. Amsco Limited all rights reserved 2011 Amsco Limited all rights reserved 2011

Upload: cora-guptill

Post on 01-Apr-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

AMSCO LtdAMSCO Ltd PRESENTSPRESENTS

THE XAOS GAMMATHE XAOS GAMMA ENCRYPTING PHONEENCRYPTING PHONE THE ANSWER FOR SECURE THE ANSWER FOR SECURE

COMMUNICATION.COMMUNICATION.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 2: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Did you know that Did you know that smartphones are being hacked smartphones are being hacked

into?into? Spyware, malware and multiple variants Spyware, malware and multiple variants

of Android viruses are making their way of Android viruses are making their way onto smartphones!onto smartphones!

““Spy.Felxispy”, the latest has affected Spy.Felxispy”, the latest has affected over 150,000 smartphones in a short over 150,000 smartphones in a short time.time.

They are working their way onto They are working their way onto smartphones via alternate application smartphones via alternate application market places.market places.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 3: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

How are they installed into How are they installed into smartphones?smartphones?

Privacy stealers usually install the Privacy stealers usually install the spyware in your phone.spyware in your phone.

They send MMS containing the They send MMS containing the spyware to you to lure you to clickspyware to you to lure you to click..

As the spyware is artfully disguised, As the spyware is artfully disguised, you will be easily trapped.you will be easily trapped.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 4: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Once installed…Once installed… The spyware can remotely turn on the The spyware can remotely turn on the

speaker of your phone to monitor sounds speaker of your phone to monitor sounds around you without the you being aware.around you without the you being aware.

The spyware will turn on the Conference The spyware will turn on the Conference Call feature of your device without you Call feature of your device without you being aware, and eavesdrop on all your being aware, and eavesdrop on all your conversations.conversations.

The spyware is also capable of The spyware is also capable of synchronizing the messages you received synchronizing the messages you received and delivered to the monitoring phone.and delivered to the monitoring phone.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 5: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Your security is Your security is compromised!compromised!

These performances will compromise These performances will compromise your privacy.your privacy.

smartphone users are exposed to smartphone users are exposed to more mobile security threats than more mobile security threats than ever before and you should always ever before and you should always be cautious whenever performing be cautious whenever performing operations on your mobile devices. operations on your mobile devices.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 6: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

To stay safeTo stay safe and have secure and have secure communicationscommunications

There is only one answer:There is only one answer:

THE XAOS GAMMA THE XAOS GAMMA Encrypting Mobile PhoneEncrypting Mobile Phone

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 7: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

AMSCO Ltd BRINGS TO YOUAMSCO Ltd BRINGS TO YOU THE ULTIMATE SOLUTIONTHE ULTIMATE SOLUTION

For Safe GSM For Safe GSM CommunicationCommunication

The The χaos χaos gamma™gamma™ Encrypting Mobile Encrypting Mobile PhonePhone

in collaboration with in collaboration with Techlab2000 R&D C°Techlab2000 R&D C°

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 8: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Xoas Gamma Encrypting Xoas Gamma Encrypting Mobile PhonesMobile Phones

Unlike smartphones the XG is a GSM, a Unlike smartphones the XG is a GSM, a GPRS/EDGE and an Encrypting machine all in GPRS/EDGE and an Encrypting machine all in one.one.

Unlike software, it is a hardware device which Unlike software, it is a hardware device which cannot be attacked by external software.cannot be attacked by external software.

The χaos gamma encrypting phone belongs The χaos gamma encrypting phone belongs to SYLAN “family”to SYLAN “family” of telecom devices and is of telecom devices and is designed to work in any standard GSM designed to work in any standard GSM network.network.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 9: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The User of χaos gamma is given the The User of χaos gamma is given the opportunity to:opportunity to:

1.1. Make encrypted (only among SYLAN Make encrypted (only among SYLAN system devices) and plain calls, locally system devices) and plain calls, locally and internationally,and internationally,

2.2. Send encrypted and plain text Send encrypted and plain text messages, locally and internationallymessages, locally and internationally

3.3. Store up to 5000 recordsStore up to 5000 records4.4. All of the data stored in the device is All of the data stored in the device is

encrypted, and the device is protected encrypted, and the device is protected against manipulation and against manipulation and replacement.replacement.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 10: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The χaos gamma phone offers The χaos gamma phone offers advanced cryptographic solutions, advanced cryptographic solutions,

an extremely short time of an extremely short time of establishing an encrypted call (1,5 - establishing an encrypted call (1,5 - 2 seconds), 2 seconds),

very short voice transmission delay very short voice transmission delay (less than 0,5 second) (less than 0,5 second)

and excellent voice quality. and excellent voice quality. There is There is nono comparable device with comparable device with

such parameters.such parameters.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 11: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Main featuresMain features//principals of the principals of the Sylan system applied in Xaos Sylan system applied in Xaos

Gamma phones.Gamma phones.Advanced cryptographic mechanism additionally Advanced cryptographic mechanism additionally boosted by hardware accelerators assuring not only boosted by hardware accelerators assuring not only the highest level of security but incorporating speed the highest level of security but incorporating speed of operation.of operation.

Full interoperability allowing to maintain secrecy and Full interoperability allowing to maintain secrecy and safety, regardless of the stage of the transfer (Xaos to safety, regardless of the stage of the transfer (Xaos to base station, base station to operator, operator to base station, base station to operator, operator to base station, and base station to another Xaos base station, and base station to another Xaos Gamma phone or Sylan protected landline phone).Gamma phone or Sylan protected landline phone).

Uses standard services provided by telecom providers, Uses standard services provided by telecom providers, but secures independence from local providers.but secures independence from local providers.

Simplicity of use, user-friendly (no technical Simplicity of use, user-friendly (no technical knowledge expected from the user)knowledge expected from the user)

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 12: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Application of the Sylan system on the Application of the Sylan system on the Xaos Gamma mobile phoneXaos Gamma mobile phone

XG uses AES up to 256 bits strength XG uses AES up to 256 bits strength analysed and positively recognised analysed and positively recognised algorithm.algorithm.

When calling from one Xaos Gamma phone When calling from one Xaos Gamma phone to another Xaos Gamma phone, the first to another Xaos Gamma phone, the first part is the unique sending and receiving of part is the unique sending and receiving of a unique encrypted key for only this call. a unique encrypted key for only this call.

Each part of the conversation is encrypted Each part of the conversation is encrypted before it is sent. before it is sent.

Once the conversation is ended the Once the conversation is ended the encrypted key is erased. encrypted key is erased.

It is impossible for wire tapping even by It is impossible for wire tapping even by the GSM system operator.the GSM system operator. Amsco Limited all Amsco Limited all

rights reserved 2011rights reserved 2011

Page 13: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Secure XG communication Secure XG communication versus easily tapped gsm versus easily tapped gsm

communicationcommunication

Page 14: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

GSM telecommunication is GSM telecommunication is based on two media:based on two media:

radio waves radio waves and standard telecommunication network using and standard telecommunication network using

cable connections and switching stations (central cable connections and switching stations (central offices).offices).

In plain (non-encrypting) phones the radio wave part In plain (non-encrypting) phones the radio wave part of transmission is protected using standard of transmission is protected using standard cryptography cryptography algorithms that are known as very naive, easy to algorithms that are known as very naive, easy to overcome and finally were broken many years ago.overcome and finally were broken many years ago.

Hence interception of GSM calls is very simple on the Hence interception of GSM calls is very simple on the radio wavelengths and trivial on the cable part of the radio wavelengths and trivial on the cable part of the network.network.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 15: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Among numerous attacks on Among numerous attacks on GSM calls, the most dangerous GSM calls, the most dangerous

are:are: 1. Interception in the switching station 1. Interception in the switching station

(central office) based on standard functions (central office) based on standard functions present in every device of this type. The only present in every device of this type. The only obstacle is access to the station, which is obstacle is access to the station, which is easily overcome as it concerns the human easily overcome as it concerns the human factor.factor.

2. Interception on standard 2. Interception on standard telecommunication cables. To accomplish this telecommunication cables. To accomplish this kind of interception one has to invest in a kind of interception one has to invest in a special device valued at only a few thousand special device valued at only a few thousand US dollars. Access to the cables is easy as US dollars. Access to the cables is easy as they are generally not protected.they are generally not protected.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 16: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

3. Real time direct interception on the radio 3. Real time direct interception on the radio transmission is also possible thanks to a transmission is also possible thanks to a very weak cryptographic algorithms used. very weak cryptographic algorithms used. The investments is also very modest – only The investments is also very modest – only a few hundreds of dollars. a few hundreds of dollars.

4. The GSM calls can also be attacked using 4. The GSM calls can also be attacked using a special mobile device which simulates the a special mobile device which simulates the network to the attacked GSM phone and the network to the attacked GSM phone and the attacked phone to the network. This kind of attacked phone to the network. This kind of device also costs only a few thousand US$.device also costs only a few thousand US$.

Methods of overhearing mentioned above Methods of overhearing mentioned above are very hard to discover. They hardly are very hard to discover. They hardly interfere with the telecommunication interfere with the telecommunication network and, what is more important, they network and, what is more important, they do not leave any traceable signs.do not leave any traceable signs.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 17: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The only way to avoid eavesdropping The only way to avoid eavesdropping

is to is to use a pair of special GSM phones.use a pair of special GSM phones. In this case, whole voice path, phone-to-phone is In this case, whole voice path, phone-to-phone is

encrypted. encrypted. Encrypted calls are performed differently than Encrypted calls are performed differently than

plain ones. plain ones. They use a CSD mode of network, which is They use a CSD mode of network, which is

covered by the GSM standard but is seldom used. covered by the GSM standard but is seldom used. When an encrypted call takes place, additional When an encrypted call takes place, additional

information is transferred, so there is less space information is transferred, so there is less space for voice data on the radio channel. for voice data on the radio channel.

Hence an encrypting phone has to use more Hence an encrypting phone has to use more efficient voice encoder and error correction efficient voice encoder and error correction algorithms. algorithms.

Encryption does not tolerate bit errors. Encryption does not tolerate bit errors.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 18: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

There are two classes of There are two classes of encrypting phones on the encrypting phones on the

market now:market now: Typical Smart GSM phones running Typical Smart GSM phones running

Symbian, Linux or Windows Mobile Symbian, Linux or Windows Mobile operating systems, where encrypting operating systems, where encrypting functions are performed by add-on functions are performed by add-on software applications – this is software applications – this is targeted mainly for business userstargeted mainly for business users

GSM devices designed especially for GSM devices designed especially for professionals: police, military and professionals: police, military and secret services. secret services.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 19: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

IN TERMS OF SECURITYIN TERMS OF SECURITY

The specially designed GSM The specially designed GSM phones for professionals phones for professionals exhibit numerous advantagesexhibit numerous advantages

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 20: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Most common flaws in regular & Most common flaws in regular & smartphones are as follows:smartphones are as follows:

Lack of computational power and necessary modes of data Lack of computational power and necessary modes of data transmission in smartphones leads to very long delays in transmission in smartphones leads to very long delays in connections (e.g. 30sec) and to weakness of cryptographic connections (e.g. 30sec) and to weakness of cryptographic algorithms. Furthermore there is an increased delay (over algorithms. Furthermore there is an increased delay (over 1sec) in voice transmission.1sec) in voice transmission.

Encrypting software in the smartphone is only an Encrypting software in the smartphone is only an application, which is awkward and inconvenient to use. application, which is awkward and inconvenient to use. Often requiring additional operations before the user can Often requiring additional operations before the user can perform an encrypted call.perform an encrypted call.

Multi-function, commonly known and open source operating Multi-function, commonly known and open source operating systems used in smartphones are very susceptible to virus systems used in smartphones are very susceptible to virus and Trojan attacks. and Trojan attacks.

In practice, they have no chance to resist or even detect In practice, they have no chance to resist or even detect external manipulations of its code. This fact and bugs in external manipulations of its code. This fact and bugs in software are the most common methods to break even the software are the most common methods to break even the most powerful cryptography.most powerful cryptography.

In business solutions, cryptographic keys are often created In business solutions, cryptographic keys are often created by primitive, pseudo-random series software generators. It by primitive, pseudo-random series software generators. It greatly weakens the power of encrypting algorithms by greatly weakens the power of encrypting algorithms by reducing the available key space.reducing the available key space. Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 21: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

In an open application environment, it is very easy In an open application environment, it is very easy to intercept plain voice data just before encrypting to intercept plain voice data just before encrypting algorithm covers it by cryptography. In the case of algorithm covers it by cryptography. In the case of secure calls, the smart GSM device could be the secure calls, the smart GSM device could be the threat rather than the solution.threat rather than the solution.

There are applications for smartphones that There are applications for smartphones that transmit the voice from the microphone even transmit the voice from the microphone even when the GSM phone appears to be powered off.when the GSM phone appears to be powered off.

smartphones lack prevention from unauthorized smartphones lack prevention from unauthorized reading of information such as contacts, call reading of information such as contacts, call registers or texts.registers or texts.

Applications downloadable to typical phones are Applications downloadable to typical phones are slow, awkward and unstable. slow, awkward and unstable.

In a Symbian phone the user is not able to verify In a Symbian phone the user is not able to verify authenticity of his phone. authenticity of his phone.

When there is a risk of replacement or When there is a risk of replacement or manipulation in the smartphone, the possibility to manipulation in the smartphone, the possibility to test if it is original and unmodified is crucial.test if it is original and unmodified is crucial.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 22: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The Xaos Gamma Mobile The Xaos Gamma Mobile Phone has the advantage!Phone has the advantage!

A lot of cheap spying applications A lot of cheap spying applications exist on the market, which are exist on the market, which are capable of voice and SMS invisible capable of voice and SMS invisible interception. These applications can interception. These applications can be installed without the knowledge of be installed without the knowledge of the user and runs in stealth mode.the user and runs in stealth mode.

It is impossible to run such an It is impossible to run such an application on XGapplication on XG..

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 23: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Smart GSM handsets can be Smart GSM handsets can be reconfigured or uploaded via OTA reconfigured or uploaded via OTA (over the air) mechanism which is (over the air) mechanism which is invisible to the user.invisible to the user.

It is impossible to modify XG this It is impossible to modify XG this wayway..

The GSM standards make provision for The GSM standards make provision for remote microphone activation.remote microphone activation.

No one can remotely activate XG's No one can remotely activate XG's microphonemicrophone..

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 24: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

To have secure communications you need to To have secure communications you need to limit the access. limit the access. The XG reduces communications to its The XG reduces communications to its essentials by maintaining high levels of essentials by maintaining high levels of security.security.

Encrypting systems should be easy to use, Encrypting systems should be easy to use, otherwise users will take short cuts and open otherwise users will take short cuts and open themselves to intrusion. themselves to intrusion. The XG is user friendly and simple to The XG is user friendly and simple to use.use.

Pure software can never provide the security Pure software can never provide the security level available in hardware. level available in hardware. The XG has a The XG has a hardware encrypting device. hardware encrypting device.

When it comes to secure communication, When it comes to secure communication, The Xaos Gamma outperforms the The Xaos Gamma outperforms the encrypting smartphoneencrypting smartphone

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 25: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

For Secure Communication, which should I use, For Secure Communication, which should I use, the GE Sectéra smartphones, the Ancort A-7 the GE Sectéra smartphones, the Ancort A-7

krypto smartphones or the Xaos Gamma krypto smartphones or the Xaos Gamma Encrypting mobile phonesEncrypting mobile phones??

You may opt for the GE Sectéra gsm or the Sectéra You may opt for the GE Sectéra gsm or the Sectéra Edge smartphone, which offers you many features Edge smartphone, which offers you many features with internet access, using encrypting software and with internet access, using encrypting software and proprietary system;proprietary system;

Or the Russian Ancort A-7 kryto smartphone, which Or the Russian Ancort A-7 kryto smartphone, which offers you many features with internet access, using offers you many features with internet access, using encrypting software and proprietary system;encrypting software and proprietary system;

As mentioned before the As mentioned before the moremore applications your applications your Smart phone has the Smart phone has the moremore it reduces the security. it reduces the security.

If you use software protection, you are open to If you use software protection, you are open to hacking. hacking.

If you use proprietary systems, someone else may If you use proprietary systems, someone else may access your phone.access your phone.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 26: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

For Secure Communication, which should I For Secure Communication, which should I use,use,

the GE Sectéra smartphones, the Ancort A-7 the GE Sectéra smartphones, the Ancort A-7 krypto smartphones or the Xaos Gamma krypto smartphones or the Xaos Gamma

Encrypting mobile phone?Encrypting mobile phone?

XG Encrypting Phones do not have internet XG Encrypting Phones do not have internet access so as not to compromise the security access so as not to compromise the security of your voice and text transmissions.of your voice and text transmissions.

XG Encrypting Phones are hardware XG Encrypting Phones are hardware encryption machines, impossible to hack into.encryption machines, impossible to hack into.

XG does not use a proprietary system, even XG does not use a proprietary system, even Techlab’s technicians can’t decode your calls.Techlab’s technicians can’t decode your calls.

You want real and genuine security for your You want real and genuine security for your voice and text communication Xaos Gamma voice and text communication Xaos Gamma Encrypting Phone is the only one for you!Encrypting Phone is the only one for you!

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 27: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Can I have an email Option for Can I have an email Option for my XG phones?my XG phones?

Yes you may.Yes you may. Without compromising your security in Without compromising your security in

communication and maintaining it at the communication and maintaining it at the same level as for voice and text, the XG same level as for voice and text, the XG may be upgraded to include email only may be upgraded to include email only accessibility.accessibility.

This is a special option and may be taken This is a special option and may be taken at an extra cost of €425.00.at an extra cost of €425.00.

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 28: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The XG More SECURE & The XG More SECURE & CHEAPERCHEAPER

Your XG only costs you €2,000.00*Your XG only costs you €2,000.00* Whereas the GE Sectéra National Gsm Whereas the GE Sectéra National Gsm

costs €3,645.00costs €3,645.00 And the Ancort A-7 costs €2,850.00And the Ancort A-7 costs €2,850.00 You get three + XG Encrypting You get three + XG Encrypting

phones for two smartphones, with phones for two smartphones, with faster transmission and more secure faster transmission and more secure communication.communication.

* ask for promotional price only valid for Europe March to May 2011* ask for promotional price only valid for Europe March to May 2011 Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Page 29: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

The Xaos Gamma is a fully The Xaos Gamma is a fully professional encrypting GSM professional encrypting GSM

phone.phone. • The XG hardware and software architecture is optimized for protection and cryptography. • Encrypting standards and restrictive development flow and testing mechanisms guarantee absolute confidentiality of voice and data transfers. Even TechLab development team is unable to intercept the call organized by χaos gamma.•The χaos gamma is highly manipulation proof. •XG’s software is also protected against disintegration. •The XG is user friendly and has very efficient contacts data base engine. •The XG responds quickly to user commands.•The χaos gamma is very fast. It arranges an encrypted call in no more than 2s. That is over 10 times quicker than competitors. Amsco Limited all rights reserved Amsco Limited all rights reserved

20112011

Page 30: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Every connection is encrypted using independent Every connection is encrypted using independent keys, which are derived from random data using keys, which are derived from random data using elliptic Diffie-Hellman scheme. The key is then elliptic Diffie-Hellman scheme. The key is then destroyed after disconnection. destroyed after disconnection.

The key digest presented on LCD protects against The key digest presented on LCD protects against 'man-in-the-middle' attack.'man-in-the-middle' attack.

The voice stream is encrypted using well-known The voice stream is encrypted using well-known and powerful AES-256 algorithmand powerful AES-256 algorithm

The delay time in transmission does not exceed The delay time in transmission does not exceed 450 ms, which is comparable to voice delay in 450 ms, which is comparable to voice delay in standard GSM connection. standard GSM connection.

Voice has excellent quality and communication is Voice has excellent quality and communication is made with ease. made with ease.

The χaos gamma implements an encrypted file The χaos gamma implements an encrypted file system which makes all user data confidential system which makes all user data confidential and safe, even if the phone is lost or stolen. and safe, even if the phone is lost or stolen.

Every χaos gamma phone has an unique identity, Every χaos gamma phone has an unique identity, which allows to determine device authenticity. which allows to determine device authenticity.

Page 31: AMSCO Ltd PRESENTS THE XAOS GAMMA ENCRYPTING PHONE THE ANSWER FOR SECURE COMMUNICATION.  Amsco Limited all rights reserved 2011

Amsco Limited all rights reserved 2011Amsco Limited all rights reserved 2011

Xaos Gamma is THE ultimate Xaos Gamma is THE ultimate solution for your secure solution for your secure

communication.communication.

Thank You.Thank You.