Cryptophone CryptoPhone 220 User Manual Download Page 1

USER MANUAL SUPPLEMENT  

for the CryptoPhone 220 

 
 
 
Dear CryptoPhone customer, 
 
thank you  very  much  for purchasing  the 
latest  generation  of  secure  voice 
communication  devices,  powered  by 
GSMK  CryptoPhone™  technology:  the 
CryptoPhone 220.  
 
The  smaller  form  factor  and  the 
technological  advances  incorporated  in 
the  underlying  hardware  platform  have 
allowed  us to  introduce certain technical 
improvements,  which  result  in  some 
minor  changes  to  the  user  manual.  This 
user manual supplement describes these 
changes. 

Speaker

 

Talk

 

Contacts

 

Calendar

 

Hang up

 

Center

 

Delay indicator

 

Line type indicator

 

Security code (Hash)

 

Battery meter

 

GSM signal strength

 

Mute button

 

Configuration menu

 

Up / down buttons

 

Summary of Contents for CryptoPhone 220

Page 1: ...form factor and the technological advances incorporated in the underlying hardware platform have allowed us to introduce certain technical improvements which result in some minor changes to the user m...

Page 2: ...n making encrypted calls Inserting your SIM card page 6 The CryptoPhone 220 s back cover can be removed by carefully sliding the lower part of the back cover downwards It is no longer necessary to pre...

Page 3: ...t might otherwise disturb your conversation when not using a headset the CryptoPhone 220 features a Push to Talk option If the Push to Talk option is activated the microphone is switched off by defaul...

Page 4: ...rst use might require a bit of force to move Inside the carrying case you will find your CryptoPhone packaged in a security sealed transparent plastic film nested in the foam pad Please also verify th...

Page 5: ...ly the original PocketPC2003 manuals license sticker and CD with the GSMK CryptoPhone 200 but you need to be aware that some functionality of the PocketPC OS have been disabled by us for security reas...

Page 6: ...rom normal GSM phones Also please note that these times may vary depending on your distance to the nearest GSM base station the further away the base station the more power your phone needs to use to...

Page 7: ...e back cover of the device by pressing the silver button on the backside and sliding the cover downwards back cover 6 You will see the SIM card slot in the upper right corner of the device SIM card sl...

Page 8: ...Manager will boot up Security Profile Manager The CryptoPhone is based on the Windows Mobile PocketPC 2003 operating system which contains some potentially vulnerable yet convenient features and appli...

Page 9: ...operating system New threats against any system are discovered from time to time and we feel selecting No Added Security exposes the CryptoPhone to unneccessary risk Choose this setting only if you re...

Page 10: ...not save contacts or calendar appointments for permanent storage to flash Extreme Security This setting is intended for customers who only use the CryptoPhone and normal unsecure call functionality bu...

Page 11: ...tallation if we receive information that indicates a higher vulnerability of these components than originally assumed Please check the CryptoPhone website for details Booting After pressing OK in the...

Page 12: ...Enter your PIN Most GSM SIM cards require you to enter a PIN number After you have initialized the CryptoPhone the application for unencrypted phone calls shows up and asks you to enter your PIN After...

Page 13: ...enter an airplane hospital or other no phone area with the GSMK CryptoPhone switched on or in standby mode To ensure the radio is off you need to enter flight mode To enter flight mode hold the volum...

Page 14: ...tions Power down To completely power down the CryptoPhone open the back cover and push the red battery lock downwards to the Open position and remove the battery Since the CryptoPhones memory is buffe...

Page 15: ...he Standby button Cold Boot 14 Note no key material that might compromise the security of your past calls is stored anywhere on your device Upon completion of a secure call all key material for the ca...

Page 16: ...end not to store any potentially compromising information on Flash Storage if there is a risk that the device may fall into the hands of an adversary You should store sensitive information in volatile...

Page 17: ...her end picks up so please let it ring After your partner has pressed the Talk button on his end you will hear a ditt dutt ditt dutt sound that signals to you that the key setup procedure for the secu...

Page 18: ...s unexpectedly in the middle of your call again and ask him to verify Call Quality during Secure Calls The call delay indicator changes color in five steps between green over yellow to red Green indic...

Page 19: ...roviders or while driving fast in a car or train If the Delay indicator becomes reddish or red Indicator a 18 please try to find a place with better GSM coverage Use the signal strength indicator on t...

Page 20: ...yptoPhones As a work around if you are roaming try switching providers If secure calling only works in one direction you could use an unencrypted call to tell the other party to call you using CryptoP...

Page 21: ...d back into your microphone In noisy environments the use of the included headset is recommended With the headset you can set the volume to any desired level without experiencing noticeable echo When...

Page 22: ...hone You can plug it in any time before or during a call The headset cable connector socket is on the lower right side of the device You will notice that the headset is connected through a small adapt...

Page 23: ...ection We recommend using a wire based headset when placing secure calls Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degradatio...

Page 24: ...moving and thereby causing more disturbances Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and r...

Page 25: ...irst need to copy them into the main contacts database on the CryptoPhone To do so switch to the unencrypyted phone mode by pressing the Center Key Center Key then click on the CryptoPhone symbol in t...

Page 26: ...well as a detailed and honest report on the possible security impact As bad as security problems with cryptographic products can be we believe the only way to handle them properly is open and transpar...

Page 27: ...ly signed CryptoPhone updates will be accepted by your CryptoPhone If you receive suspicious communication regarding CryptoPhone updates such as an e mail with an update file as attachment please info...

Page 28: ...elligence agencies are known for a wide variety of hightech manipulation methods that are impossible to detect without a massive scientific effort several months of analysis at the cost of several 100...

Page 29: ...lease mail us at service cryptophone de so we can instruct you about the proper shipping and security procedures Shipments that arrive for repair without prior acknowledgement and or in ignorance of t...

Page 30: ...integrity and security of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is abso...

Reviews: