HOLISTIC COMMUNICATIONS SECURITY BLACK TIGER COUNTERING CYBER TERRORISM
HOLISTIC COMMUNICATIONS SOLUTION LACSMI is leading vendor in telecommunications since 1992 promoting set of security solutions worldwide under the BLACK TIGER brand. Many years of experience of the international team of experts in the area allows us develop not only a set of solutions but solutions integrated into one holistic approach. Telecommunication companies are facing numerous IT threats and a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service and even data centers, the telecom industry is working in an environment that requires proven cyber security and information assurance. Communications became essential now not only for passing information but as they became part of Internet of Things. So protection of communication lines is now essential part of modern security. Trusted solutions of the LACSMI are ready to become a reliable support and guarantee of protection of your production. Our specialists will be happy to assist and conduct necessary audit and develop holistic protection
1 HOLISTIC APPROACH TO COMMUNICATIONS SECURITY Telecom security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a communication networks and networkaccessible resources. Modern telecommunication networks include number of different tools starting from GSM technologies and up to IP messengers. Number of attacks through telecom networks hit mobile phones of VIPs all over the world, became most common hacker step towards targeted attack on banks or industrial enterprises. Securing all types of telecom infrastructure became essential for government and organizations and requires holistic approach. BlackTiger has developed such holistic approach that protects whole infrastructure of your possible telecom networks and introduced first in the world unique solutions and services. 1 2 3 4 5 TRAINING Specialists training is the first and fundamental step towards ensuring cybersecurity. BlackTiger provides training for IT-officers, CTO's, telecom teams, government cybersecurity bodies. АUDIT AND CYBER SURVEILLANCE AUDIT AND CYBER SURVEILLANCE BlackTiger provides complex telecom operators SS7 infrastructure audit, buildings and offices GSM-bugs audit and networks security audit. Audit results with detailed infrastructure flaws report and security system design. SECURE LOCAL CELLULAR OPERATOR Local cellular telecom operator is innovative telecom security approach that works only inside a designated buildings. All calls are carried out without the external cellular operator. That is very important when one takes into account that cellular providers have many security flaws. SECURE AND PRIVATE MESSAGING Messages sent via our software are end-to-end encrypted and are unavailable for man-in-the-middle attack TELECOM SECURITY OPERATION CENTER Security Operations Center for telecom operators, governments or organizations allows to control all communication channels and have holistic understanding of security state.
TRAINING TELECOM SECURITY SPECIALISTS TRAINING NON TELECOM SECURITY SPECIALISTS TRAINING During training sessions telecom security specialists will get practical knowledge how to detect and protect telecom infrastructure from SS7 attacks. Non telecom security specialists will get skills on detection of an unauthorized modems that are sending information from organizations infrastructure. MOST COMMON INSIDE/OUTSIDE ATTACKS: PENETRATION TESTS TRAINING Discovering a subscriber s location Voice call redirection and interception Disrupting a subscriber s service Recording a conversation SMS interception Disrupting the availability of a mobile switch Unstructured Supplementary Service Data (USSD) forgery requests (and transfer of funds as a result of this attack) 2 Specialists skills after training will involve understanding of common vulnerabilities, detection of vulnerabilities, understanding evolving telecom hackers targeted attacks. During training sessions telecom security specialists will get practical knowledge how to detect and protect telecom infrastructure from SS7 attacks.
АUDIT AND CYBER SURVEILLANCE Audit for telecom involves complex audit of telecom infrastructure Audit of IT infrastructure for Mobile operator Recommendations to secure found vulnerabilities Penetration test SECURITY-LEVEL MANAGEMENT SYSTEM 1 Performs constant monitoring for vulnerabilities in primary and secondary software/hardware components of the system 2 Identifies the level of threat and the possibility to use it 3 Recommends protective measures 4 Performs trending of threats for personal to make preventive actions BENEFITS FOR COMPANY: Increases the cybersecurity protection of network Simplifies the work for security officers and communication with IT department Reduces a number of cybersecurity violation incidents Makes a clear scaled protection picture for particular divisions and the whole company AUDIT FOR ORGANIZATIONS AND COMPANIES 3 SECURITY AUDIT OF CELLULAR NETWORK Security analysis of radio interface Security analysis of cellular infrastructure Security analysis of network core Security analysis of data storages and payment systems SECURITY ANALYSIS OF RADIOCHANNELS AND CELLULAR DEVICES Detection of an unauthorized modems which are sending information about the target object Protocols recovery Cellular assets phase-testing
SECURE LOCAL CELLULAR OPERATOR We have developed a special range of devices to ensure the security of wireless communications. Our solution is based on limitation of access rights to various communication channels, independence from cellular operators and the smooth cancellation of prohibited radio signals. The wireless communications security system consists of three devices: BASE STATION SELECTIVE BLOCKING OF INDIVIDUAL ROOMS AND SUBSCRIBERS Using our devices allows us to develop and implement a wireless access rights policy by creating black and white lists. Lists contain access permissions of individual rooms and subscribers. All information about compliance or violation of the security policy rules is aggregated in the situation center, ensuring instant response to incidents. allows you to provide an independent cellular connection in the selected location. CELLULAR BLOCKER allows you to limit the use of cellular communication in the selected location. INTELLECTUAL WIRELESS NETWORKS SUPPRESSOR allows you to selectively limit the use of wireless radio links: Wi-Fi, ZigBee, Bluetooth and other. On black list: complete communication block 4
5 PERIMETER PROTECTION SYSTEMS The use of our devices will help create a perimeter security system that works on the principle of determining the unique characteristics of cellular devices and comparing them with the policy of black and white lists. CONNECTION OF TERRITORIALLY DISTRIBUTED OBJECTS Secure communication channel Protection of telecommunications allows you to scan the phones of all persons entering the protected perimeter. In combination with video surveillance systems, this makes perimeter protection more efficient Base station subscriber 1 Base station subscriber 2 Security Officer сan see all IMSI / IMEI phone codes passing through security checkpoints The advantages of using our base station are not limited to the location in which it is installed. You can contact via secure channel with users of our base stations located at significant distances (in another city, another country or even on another continent). Our base station creates its own network, independent from external operators. The rules for using the internal network can be flexibly configured to meet all customer requirements. In particular, it may be possible to connect subscribers of the internal network to subscribers of cellular networks of other operators.
SECURE AND PRIVATE MESSAGING We have developed a set of solutions for messaging that is both secure and private. The difference is simple and obvious - the first generation of messaging services (like SMS) was both not secure (it could be easily intercepted) and not private (when message is intercepted, it s easy to understand, who s the sender and who s the receiver). The second generation is secure (messages can t be decrypted in reasonable amount of time), but not private. Black Tiger provides new generation of messaging solutions - both secure and private. It has been achieved by both unique network protocols and careful server infrastructure design. We ve re-invented messaging privacy, implementing: direct connections (peer-to-peer) for texting and calls, which not only provide a direct channel for session, but also able to adapt these channels according to network conditions. Thanks to TrickleICE, we have industry-leading connection establishment time blockhain-based protocol for texting - Black Tiger team has created the first mobile-friendly pseudorandom routing protocol based on blockchain traditional client-server protocol with end-to-end encryption and anonymous server chats (no personal information, suitable for identification, is stored on server) Meeting the demands of tomorrow, we also created a unique server infrastructure: High-load server, developed on C++ Infrastructure is ready for horizontal scaling Infrastructure is ready to be geographically spread thanks to unique 100G encryption module that can provide datacenter synchronization 6
7 ADDITIONAL SECURITY FEATURES Encryption during data storage Forget about Dropbox & Google Drive, we took care about documents - they are sent as securely, as messages, and they are saved with strong encryption on the device! Messenger is not tied to mobile number We know, that users can stay invisible only when they doesn t need to share any personal information at all. Unlike most of messengers, messenger user doesn t bind his account to a phone number. It protects our users from SIM clonning attack via SS7 - when another device claims to have the same number as yours and can pass phone number authentication. Secured contacts exchange We belive, that both your message and contacts list are significant to your confidentiality, so we store your contacts, their names and photos securely encrypted and provide most secure ways to exchange them - using QR codes, as a message attachment or send a encrypted file. Messenger is high-load ready Messenger is based on industry-leading technologies of Server development for high-load systems. We took the positive experience of heaviest loaded Internet Statistics tracking servers and implemented Messenger server using them. REAL-LIVE SOLUTIONS: National messenger Corporate messenger B2C Messaging system, suitable for texting, calls, file sharing, capable for heavy-loads thanks to BlackTiger unique server infrastructure. It supports payments, including cryptocurrencies, and can be integrated with any crypto-exchange service, too. National messenger is ready to support local regulations and laws on legal wiretapping. National messenger is implemented in a traditional look-and-feel, making it easier for people who got used with other messengers, keeping the highest level of security. To comply local regulations, national messenger can be also not-anonymous. B2B messaging system, suitable for texting, calls, file sharing, which can be integrated in corporate IT infrastructure. It supports advanced documents management and additional security layers like Contact Genuine Check. Also it has account revocation feature and best-effort remote data wipe. Of course, all server infrastructure can be provided as a Cloud service or as a distribution to be deployed on corporate s dedicated servers.
TELECOM SECURITY OPERATION CENTER Holistic communications security approach is based on constant monitoring of telecom infrastructure security stated that is done in Telecom Security Operations Centre. Collecting multiple data and artificial intelligence tools allow to detect and prevent telecom crimes before they happen. 8 SS7 infrastructure Messenger alert SS7 infrastructure system Detects SS7 attacks and fraud. Monitoring hacckers SS7 activities is essential for telcos, banks, IOT dependent infrastructure Detects malicious information in corporate messengers or information leakages through messenger system GSM-bugs detection SS7 infrastructure Detection of unauthorized modems that are sending information from organization infrastructure.
BLACK TIGER COUNTERING CYBER TERRORISM info@blacktg.com www.blacktg.com +971 4 313 2071 Level 41, Emirates Towers, Sheikh Zayed Road, Dubai, UAE PO Box 31303 BLACK TIGER is worldwide brand of the Laboratory for cyber security methods implementa on LACSMI