The Register® — Biting the hand that feeds IT


Air-to-ground rocket men flog top-secret mobe-crypto to Brad in accounts

US Army supplier touts spy-phone tech to suits

Cloud storage: Lower cost and increase uptime

MWC 2013 Don’t believe what you see at the cinema - James Bond doesn’t use a Sony mobile. Today’s British spies are kitted out with a BlackBerry for email and a Motorola for voice. The Motorolas use a protocol called Sectéra for scrambling which comes from General Dynamics, which does stuff for the US military, including system integration.

GD, which yesterday announced it had won a $224m contract from the US Army to supply and maintain Hydra-70 air-to-ground rockets, built the clunky-looking Sectéra Edge, a hardware carbuncle tacked onto the Motorola handset. But the defence contractor is now offering something more modern: two solutions based on Samsung and LG hardware.

The Samsung version is a custom version of Jellybean built on the US National Security Agency's security-enhanced Linux. The aerospace and defence contractor installs it on one of a range of Samsung phones using a special General Dynamics root.

Every Galaxy S3 shipped has two root keys - one for Samsung and one for General Dynamics. When the user installs the secure version, they overwrite the Samsung root so that only General Dynamics can issue upgrades. This puts a secure and controlled environment on the phone using the Open Kernel Labs software. The contractor bought Open Kernal Labs last year.

To log into the device, the demonstrator from General Dynamics used a US Department of Defense-issued security card. The reflashed Galaxy then becomes a secure trusted platform with government-level encryption. There is also remote management so the device remains secure if lost or stolen.

Having the hardware enabler, in the form of the root key, makes the General Dynamics system something which will be rated by the security services as more secure than the current BlackBerry solution.

The second solution from General Dynamics uses an LG handset. This is fundamentally different from the Samsung solution in that it doesn’t have the root, but instead is dual boot. You can have two Android environments: one for normal consumer use - with the ability to do whatever you might do on a standard Android handset - and the other a secure environment. The secure version - like that of the Samsung - can only make secure SIP calls and won’t allow you to do anything the company or government policy might block.

When the phone is in standard mode the screen is edged in green, and while it's in secure mode it has a red border. The dual-boot LG Optimus is in use by US marines and you can see how they might want to use Facebook and Foursquare when away from their families but that those things might raise some eyebrows if they were to be linked to a secure operation.

A sophisticated set of controls can be installed as a security policy, so for instance the camera might not work in certain locations, and Wi-Fi might be switched on and off by the security policy. To switch between the secure and insecure phone, General Dynamics has hijacked the camera button.

Real-life James Bonds might appreciate using the same phone they play Angry Birds on to make top-secret calls to government headquarters... And, after all, it must be hard to be a secret agent man when you're walking around carrying this. ®

Cloud storage: Lower cost and increase uptime

James Bond..

would use a Sony mobile..hesitantly... after it's been "improved" by Q.

The whole idea of proper spy equipment is that it looks like a duck, sounds like a duck, and in reality is something else entirely.


Yes ill email the corrections as well but in the meantime

"The Samsung version is a custom version of Jellybean built on the US National Security Association Agency’s secure security enhanced Linux"



Re: Does it need pointing out.

You probably pick it up from the Embassy, it having beed delivered via diplomatic bag.

But getting stopped with it by the police could be uncomfortable...



Cloud based data management
Frost and Sullivan confirms the complexity of backup/recovery due to heterogeneity of devices, etc and details how Asigra is addressing these issues.
Big Data Demands Big Changes to Legacy Backup
View the Storage Switzerland report on backup software licensing placing undue burden on enterprises and the new era of licensing to improve efficiencies and costs.
Agentless Backup is Not a Myth
Read this white paper to learn about the seven benefits agentless backup and recovery software delivers to complex enterprise environments.
Cloud storage: Lower cost and increase uptime
This Aberdeen Analyst report presents results from IT experts on their cloud initiatives & benefits cloud storage users recognize upon adoption.
Ensure Ease of Recovery with Asigra’s Agentless Software
This customer success story details how backup/recovery is meeting the organization's business needs while providing a solid return on investment.

More from The Register

next story
 breaking news
PHWOAR! Huh! What is it good for? Absolutely nothing, Prime Minister
Why I BACK Cameron's War on Porn, by Reg chap Bill Ray
Android MasterKey found buried in kiddie cake game on Google Play - report
Send for nurse for fear of something much, much worse
 breaking news
You've got 600k+ customers on 4G... but look behind you, EE
Rest of market about to open up to rivals
Hotshots' hotchpotch hotspots: Office Wi-Fi is a great big botch
Do you bung wireless points around the place willy-nilly? You're not alone
What did the Romans ever do for us? Packet switching...
And the railways, morse code. Sort of
T-Mobile US: Go ahead, PAY NOTHING up front for any device
Summer promotion bids adieu to down payments
 breaking news
Sky falling: 119,000 Brits flee O2, Be after Murdoch broadband gobble
Whiff of octogenarian media lord sends 1 in 5 running
The FLOATING mobile phone shop on the edge of the Internet
Reg man splashes down amid Asia's smartphone shift
prev story