• Glossary

    Mobile Identification Number (MIN)

    The MIN, more commonly known as a wireless phone number, uniquely identifies a wireless device within a wireless carrier's network. The MIN is dialed from ...

  • Glossary


    For consumers, it's proactively installing, using or visiting available applications, software or trustworthy content to protect or prevent unauthorized use of personal information that is ...

  • Glossary


    Protection from unauthorized access or malicious use of information in the mobile or telecom ecosystem, which may include networks, devices, software, applications or content.

  • Glossary


    Potential vulnerabilities that bad actors can exploit to compromise data, extract information or interrupt services.

  • Press Releases
    May 21, 2013

    Consumer Choice, Apps and Virtualization Impact Mobile Cybersecurity

    Thanks to innovative solutions and proactive companies throughout the U.S. wireless ecosystem, our country’s wireless industry is one of the most secure in the world ...

  • Press Releases
    Mar 5, 2012

    CTIA Announces John Marinho as Vice President of Technology and Cybersecurity

    WASHINGTON – CTIA-The Wireless Association® announced today John Marinho will be its Vice President of Technology and Cybersecurity effective March 12. In the newly created ...

  • Press Releases
    Apr 26, 2012

    CTIA Statement After the U.S. House of Representatives Passed the Cyber Information Sharing and Protection Act

    WASHINGTON – In response to the U.S. House of Representatives passing the Cyber Information Sharing and Protection Act (H.R. 3523), CTIA–The Wireless Association® President and ...

  • Press Releases
    Apr 18, 2013

    CTIA Statement After the U.S. House Passed Cyber Intelligence Sharing and Protection Act (CISPA)

    WASHINGTON – After the U.S. House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA), CTIA-The Wireless Association® Vice President of Government Affairs ...

  • CTIA Blog Posts
    Jan 23, 2013

    Survey Shows IT Pros Want More Collaboration on Cybersecurity

    IT professionals are working on the frontlines of mobile cybersecurity, which is why they are calling for more collaboration between government and industry so they ...

  • CTIA Blog Posts
    Aug 7, 2013

    OpenPeak: How to Secure Apps and Devices for Enterprise: August WOW Insider Interview

    BYOD represents a security challenge for IT professionals, but OpenPeak EVP of Strategy and Business Development David Barclay discusses the balance between user convenience and keeping applications and devices secure.

  • CTIA Blog Posts
    Aug 27, 2013

    What the Wireless Industry Learned from PC Security: Attack Threats Top Down

    Tasked with keeping consumers’ information safe at the highest level, the network, AT&T Assistant Vice President of Public Policy Chris Boyer discusses the lessons learned from PC security. As mobile threats emerge, U.S. carriers are using research to apply preventative measures instead of just reacting. To maintain this successful proactive approach, Boyer discusses the need [...]

  • Video
    Jun 3, 2013

    Consumers Critical Line of Cyber Defense

    Due to the industry's focus on cybersecurity, the U.S. is among the world's best in protecting mobile devices.

  • Policy Topics

    Cybersafety and Cybersecurity

    Today's wireless ecosystem is dramatically different from what it was only five years ago with the constant introduction of a variety of new players and technologies. In order to protect the wireless industry from cybercriminals and cyberthreats, the wireless ecosystem – network operators, device manufacturers and application/content developers – must work together. When you add the number of companies, along with the more open and diverse mobile industry, cybersecurity is a challenge. In June 2012, CTIA developed its Cybersecurity Working Group (CWG) for industry players to work together as much as possible to identify potential problems and determine the best course of action to minimize the impact of cyberthreats on consumers and companies.

  • Events
    Nov 14, 2013

    Communications Law in the Digital Age 2013

    Practicing Law Institute is holding an event that will cover a wide array of topical issues in media, digital communications, First Amendment, intellectual property, and ...

  • Events
    Nov 19, 2013

    Internet of Things - Privacy & Security in a Connected World Workshop

    The Federal Trade Commission will hold a public workshop on Tuesday, November 19, 2013 in Washington, DC, to explore consumer privacy and security issues posed ...

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. Next

2014 CTIA Annual Industry Survey Results

Want to know how much voice, data and texts consumers used? Do you know how many wireless subscribers connects are in the U.S.? Review the latest CTIA survey results now.

Learn more

Click for more facts and figures about the benefits wireless provides!

How Wireless Works

A wireless phone is a very sophisticated and versatile radio. Similar to a walkie-talkie, a cellphone receives and sends radio waves. Those radio waves, traveling through spectrum, are used to transmit voice calls and data to your mobile device anywhere, anytime.

Learn more

Latest Tweets

Growing Wireless

Get the knowledge and resources to provide a safe and rewarding wireless experience for kids.

Visit Site

Go Wireless Go Green

Thanks to wireless technology, Americans and businesses across the world are reducing their environmental impact. Learn how to "go green."

Visit site
Back to top