Overview
  
  All image, text and file data used within a Photophone Session is encrypted 'over the wire' when sending data from and to clients (Desktop / Laptop and PDA). The image, text and file data is also
  held on the server in the same encrypted form. Industry standard 256bit encryption is used. Each session has its own encryption key which has been derived from the session password, thus only those
  who have been entrusted with the password can view the above data whilst in a session. The session password (and the derived key) is not stored on any computer, nor ever sent 'over the wire' - it
  is only known to authorised users. In addition to the data encryption, Photophone incorporates its own certificate protection using 128-bit encryption for securing the various modes of
  communication over which it operates. Therefore, the Photophone is now transmitting 256-bit encrypted data over a 128-bit encrypted line.
  
  
  Technical
  
  256bit AES (Rijndael) Encryption is used on Sessions. Each session encryption key (256bit) is cryptographically random generated when each session is created using RNGCryptoServiceProvider. A
  randomly generated salt is used to ensure that encrypting the same data twice results in a different encryption stream. This is to prevent against Dictionary attacks. The session encryption key
  itself is protected by encryption - again 256bit AES (Rijndael). This uses the Session Password as a seed to create a 256bit key using RFC 2898 which implements 'PBKDF2 / PKCS #5' based on HMACSHA1
  with 1000 iterations.
  
  
  Additional
  
  It is also recommended that all Photophone XT clients (Desktop and PDA) are protected using an approved method such a BeCrypt for hard drives and storage cards. This is to mitigate problems that
  might occur if the Laptop or PDA was lost or stolen.
  
  Applications:
  
  Surveillance operations
  Kidnap/Extortion operations
  Airport/Port X-ray examination
  Counter-Terrorist operations
  Emergency Response
  Scene of Crime
  Football Policing Support
  Air Support imagery
  Map Tracking Broadcast
| Surveillance operations Kidnap/Extortion operations |