Take a few minutes to read this page
If you need to ensure your messages, especially emails, reach the recipient without being intercepted, what follows below will help. No flashy website, no fantastic claims, just information.
What are the problems?
Essentially recent revelations from Wikileaks, the NSA whistleblower Edward Snowden as well as information of the Heathrow arrest of Brazilian David Miranda, partner of American Guardian journalist Glenn Greenwald, have completely exposed the extent of the interception of email and text traffic by government security departments. This comes on top of the exposure of hacking episodes by Rupert Murdoch's journalists as well as the revelations that scores of "blue-chip" British companies have employed rogue private detectives to pry into the private lives and messages of individuals.
Although insiders and specialists within the IT security industry have long known that email and text traffic are not secure, the general public have bought this fallacy which has been perpetuated by the big boys of the internet age such as Google, Microsoft and Yahoo among others. They told the public that their encryption methods ensured security. SSL, data encryption, 32, 64 & 128 bit security and public/private keys are among the names used to fool the general public that their emails were safe. That is not to say the creators of such systems were defrauding the business community and general public.
Far from it, they worked from the best of motives and with the use of the best mathematical and computer expertise available as well as creating new systems.
Similar claims were made for some smart phone and text providers, most famously Blackberry. - NSA Can Spy on Smart Phone Data
The most recent publicity has been aimed at the American NSA and British GCHQ, although they are not the only groups digging into private information.
The NSA and GCHQ are part of what is popularly known as the ECHELON system which processed intelligence reliant on multiple sources of information, the intelligence shared is not restricted to signals intelligence which was begun at the start of the cold war, originally set up between the USA and the UK and expanded to include as its core the USA - National Security Agency (NSA), U K - Government Communications Headquarters (GCHQ), Canada - Communications Security Establishment (CSE), Australia - Defence Signals Directorate (DSD) and New Zealand - Government Communications Security Bureau (GCSB).
Other systems identified by name associated with the ECHELON network are PRISM and XKeyscore. All are connected with the interception of messages.
The above are those methods of (and by whom) message interception the general public are aware of because of the revelations.
There are others less well known. The Russian FSB, successor to the KGB along with the GRU (Russian Military intelligence) who also engage in commercial espionage. The French DGSE, the Chinese MSS along with intelligence arms of the Peoples Liberation Army along with Israel's Mossad are all known to have indulged in commercial intelligence gathering. These are not the only governments involved in interception of emails and texts.
Then there are commercial snoopers. The most well known are those of the News International group, and in very recent news, several banks, insurance companies, law firms and others revealed through a report by Britain's Serious Organised Crime Agency (SOCA) and handed to the British Parliament's Home Affairs Committee. These are just the tip of the iceberg.
In the past ten years computer power has expanded exponentially, so that what was within very recent memory only available to those with deep pockets and budgets, is now in easy reach of virtually everyone. Computers can now be bought over the counter for less than £1,000 with 3 and 4 GHz processors, 16 GB memory with 8 MB cache and hard drives of 1 TB. That is serious computing power on a limited budget, so it can be seen that the threats to internet security are not limited to government spies.
What is the solution?
Contact AT Encoding, you will then be called at which a short discussion will see if we can assist. After that a consultation will be arranged which should take approximately one and a half to two hours. Everything will be gone into, including all the processes.
This will give you all the information needed to set in motion your own security system for message transmission.
After that, whether you use AT Encoding on a consultancy basis or use your own resources is up to you as the customer.
FAQ's
What is the cost? Assessment which is by phone is free. This will ascertain whether we can assist. If it is agreed for the next stage to go ahead it is £500GBP for the consultation which should take no more than two hours. At this time you will be given all necessary information to set in place systems to protect your message transmission.
Technical knowledge needed? The ability to use a computer to send an email, to be literate and numerate and to type using Word or ODT - no programming skills are required.
Where will consultation take place? In London or Dublin on a face-to-face basis. This can be at your premises or a mutually convenient place. For customers elsewhere a consultation could be made via Skype.
Levels of security available?
Stage 1 - 100% security against all threats of interception
Stages 2 to 4 - 95% against all threats - 100% against non-state threats of interception
To begin, phone 07712 898179 if in the UK - +447712 898179 if outside the UK or fill out the form on the FEEDBACK page