• Policy Topics

    Cybersafety and Cybersecurity

    Today's wireless ecosystem is dramatically different from what it was only five years ago with the constant introduction of a variety of new players and technologies. In order to protect the wireless industry from cybercriminals and cyberthreats, the wireless ecosystem – network operators, device manufacturers and application/content developers – must work together. When you add the number of companies, along with the more open and diverse mobile industry, cybersecurity is a challenge. In June 2012, CTIA developed its Cybersecurity Working Group (CWG) for industry players to work together as much as possible to identify potential problems and determine the best course of action to minimize the impact of cyberthreats on consumers and companies.

  • Press Releases
    Feb 12, 2014

    CTIA Statement After the National Institute of Standards and Technology Released its Voluntary Cybersecurity Framework

    CTIA statement After NIST released its voluntary cybersecurity framework.

  • Events
    Nov 14, 2013

    Communications Law in the Digital Age 2013

    Practicing Law Institute is holding an event that will cover a wide array of topical issues in media, digital communications, First Amendment, intellectual property, and ...

  • Events
    Nov 19, 2013

    Internet of Things - Privacy & Security in a Connected World Workshop

    The Federal Trade Commission will hold a public workshop on Tuesday, November 19, 2013 in Washington, DC, to explore consumer privacy and security issues posed ...

  • Glossary

    Virtual Private Networks (VPN)

    A VPN allows a user to conduct secure transactions over a public or unsecure network. By encrypting messages sent between devices, the integrity and confidentially ...

  • Glossary

    NAM (Number Assignment Module)

    The NAM is the electronic memory bank in the wireless phone that stores its specific telephone number and electronic serial number.

  • Glossary

    Adware

    On its own, adware is harmless software that automatically displays advertisements. Unfortunately, some bad actors may choose to integrate spyware and other privacy-invasive software in ...

  • Glossary

    Cloud

    Cloud computing allows users and enterprise companies to store and process data and deliver applications on the network. In traditional architectures, most of the data ...

  • Glossary

    Digital

    Technological approach that converts signals (including voice) into the binary digits '0' and '1'. This data is compressed, and then transformed into electronic pulses for ...

  • Glossary

    Encryption

    Digitally scrambling information so it can be transmitted over an unsecure network. At the other end, the recipient typically uses a digital "key" to unscramble ...

  • Glossary

    Hacking

    Illicitly exploiting a weakness in a networked information system to access or alter data or interfere with network or device functions. A hacker may be ...

  • Glossary

    Jailbreaking

    Involves removing software controls imposed by the operating system by manipulating the hardware and/or software coded onto the device.

  • Glossary

    Malware

    Malicious Software is computer language codes created by hackers to access or alter data or interfere with network functions. It may manifest itself as worms, ...

  • Glossary

    Rooting

    Rooting allows a device owner to obtain full privileged control within the operating system to overcome any software parameters or other limits on the device. ...

  • Glossary

    Spyware

    A type of malware that functions without a user's knowledge or permission. Spyware frequently captures user activity and data, either storing it in obscure file ...

Resource Library Search Tips

To assist you with the latest facts and info about the wireless industry, CTIA developed the Resource Library.

Learn more

Click for more facts and figures about the benefits wireless provides!

How Wireless Works

A wireless phone is a very sophisticated and versatile radio. Similar to a walkie-talkie, a cellphone receives and sends radio waves. Those radio waves, traveling through spectrum, are used to transmit voice calls and data to your mobile device anywhere, anytime.

Learn more

Latest Tweets

Growing Wireless

Get the knowledge and resources to provide a safe and rewarding wireless experience for kids.

Visit Site

Go Wireless Go Green

Thanks to wireless technology, Americans and businesses across the world are reducing their environmental impact. Learn how to "go green."

Visit site
    • Live for Super - Super Mobility Week

      Super Mobility Week

      September 9, 10 & 11, 2014
      Las Vegas, Nevada USA
      40,000 Qualified Professionals
      1,100 Exhibitors
      1,000+ Reporters & Analysts
Back to top