June 22, 2012

Highly secure mobile phones

(Updated: April 9, 2016)

In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Therefore, special devices are designed to keep conversations safe. Here we will list a range of mobile phones, which offer a high level of security and are therefore suited for top level telecommunications.

The following information is gathered from the internet, only to provide a general overview. For more information, provided by the manufacturer, please click the yellow section title or the fact sheet.



- For government and military use -


General Dynamics: Sectéra Wireless GSM Phone

- Produced from 2002-2012 by the American company General Dynamics Corp.
- For GSM and GPRS networks.
- Ordinary Motorola Timeport GSM phone, with a special Security Module attached at the back side of the phone, replacing the battery cover.
- Approved by the NSA for conversations up to the level of TOP SECRET * and by NATO for up to COSMIC TOP SECRET. This phone is also used by the British government for mobile communications up to the level of SECRET.*
- Encryption with US Type 1 and approved Suite B (including AES and ECDH) encryption algorithms.
- There are slightly modified modules for the UK, Canada, Australia and New Zealand. There's also a version, using the AES algorithm only, which is exportable to other countries.
- The price of this phone is 2.095,- US dollar.
- More details in the factsheet (pdf)

> As of 2013, General Dynamics replaces this phone by GD Protected, a platform for securing high-end Samsung and LG smartphones.



Sectra: Tiger XS

- Produced since 2005 by the Swedish company Sectra AB.
- For GSM and UMTS networks.
- This is a personal encryption device, which is connected in between a headset and an ordinary mobile phone (via Bluetooth). Voice data are encrypted by the device, before going into the non-secure telephone.
- Two factor user authentication with SIM-sized access card and PIN code.
- Approved in the Netherlands, by the European Commission and by NATO for conversations up to the level of SECRET. In 2011, the Tiger XS was used in 17 European countries.
- Since 2007, a sligthly modified version of this device is used by Dutch cabinet ministers and high-level officals of government departments and the Dutch armed forces.*
- More details in the factsheet (pdf)



Sectra: Tiger 7401

- Produced since 2012 by the Swedish company Sectra.
- For GSM, GPRS, EDGE and UMTS networks.
- Custom made mobile telephone with TEMPEST verified design and tamper response, providing Red and Black interfaces for secure and non-secure connections.
- Two factor user authentication with SIM-sized access card and PIN code.
- Approved in the Netherlands for conversations up to the level SECRET (STG GEHEIM), approvement for the European Union and NATO is pending.
- For Dutch high-level military officials this phone will replace the Tiger XS device in the course of 2014.*
- More details in the factsheet (pdf)



Rohde & Schwarz: TopSec Mobile

- Produced since 2008 by the German company Rohde & Schwarz GmbH.
- For GSM and UMTS networks.
- This is a separate encryption device, which is connected in between a headset and a smart phone (both iPhone and Android) with Bluetooth connection. Voice data are encrypted by the device, before going into the non-secure telephone.
- Approved in Germany for conversations up to the level of RESTRICTED (Verschlusssache/Nur für den Dienstgebrauch).
- The device secures the key exchange with a 384-bit key ECC algorithm and encrypts the voice data with AES, using a 256-bit key.
- More details in the factsheet (pdf)



Secusmart: SecuVOICE

- Produced since 2008 by the German company Secusmart GmbH.
- For GSM and UMTS networks. There are separate solutions for voice, SMS and e-mail communications.
- Common high-end Nokia phones are secured by a tamper proof chip on the format of a microSD Card, which is inserted in the memory card slot of the phone.
- Approved by German, Dutch and NATO agencies for conversations up to the level of RESTRICTED.
- Communications are secured by 128-bit AES encryption and keys are exchanged using the Elliptic Curve Diffie Hellman (ECDH) protocol.
- This solution was implemented for securing voice communications of the German federal government in 2009, including those through the Nokia 6260 Slide phone of chancellor Angela Merkel.
- More details in the Secusmart overview (pdf)

> Secusmart provided a similar security solution for the BlackBerry 10 smartphones, which became available for German government officials in 2013. See: How secure is the Merkel-Phone?



Thales: Teorem

- Produced since 2008 by the French company Thales Group SA.
- For GSM, GPRS, EDGE and UMTS networks.
- Custom made handset, with a second display, showing whether the call is secure or not.
- Approved in France for conversations up to the level of SECRET (Secret Défense).
- In 2010, the French government ordered over 14.000 of these phones, to be used by the president, ministers and high officials of the armed forces and the various ministries that deal with classified defence information.*
- The price of this phone is said to be around 1.500,- euros.
- More details in the factsheet (pdf)



Telsy: TSM T3

- Produced since 2009 by the Italian company Telsy S.p.A.
- For GSM and UMTS networks.
- Custom made telephone handset, with proprietary hardware and software design.
- Encryption with AES, using 256-bit keys and asymmetric ECCDH key exchange, or, on demand, proprietary and custom made algorithms. Interoperable with CryptoPhone equipment.
- Also sold by the Scottish company Bridge Systems Ltd.
- More details in the factsheet (pdf)



- For government and commercial use -


Omnisec: Secure Mobile Phone Omnisec 230

- Produced by the Swiss company Omnisec AG.
- For GSM, EDGE and UMTS networks.
- Common HTC smart phone with hardened Android operating system. The encryption engines are stored on a single chip, which is inserted into the phone like a SIM-card.
- Encryption with Omnisec proprietary algorithms using 256-bit keys.
- The price of this phone is said to be around 25.000,- Swiss franks (although 2500,- franks seems te be more realistic).
- More details in the factsheet (pdf)

> For a demonstration, see: Swiss video on mobile phone security



Crypto AG: Crypto Mobile HA-2400

- Produced by the Swiss firm Crypto AG.
- For EDGE and UMTS networks.
- Common high-end Nokia smart phone from the E-series, with Symbian operating system. The crypto capabilities are provided by a single tamper proof chip (the Crypto Mobile HC-9100) on the format of a microSD Card, which is inserted in the memory card slot of the phone.
- Encryption with a customer specific cipher algorithm HCA-820, using 128 or 256-bit keys.



Tripleton: Enigma E2

- Produced since 2012 by the British company IntSec Ltd.
- For GSM and GPRS networks.
- The phone uses the Enigma encryption system developed by the T-Systems/T-TeleSec division of Deutsche Telekom. This was following a request from former German Chancellor Gerhard Schröder, after he was hacked in the 1990s.*
- This Enigma system was first used in a mobile phone, which is sold since 2002 (for 3.200,- euro) in Germany by the Beaucom Group.*
- Encryption with AES, using a 256-bit key, which is exchanged via 1024-bit RSA.
- The price of this phone is 1.320,- pound sterling.



GSMK: CryptoPhone 400

- Produced by the German company Gesellschaft für Sichere Mobile Kommunikation mbH (GSMK).
- For GSM and UMTS networks.
- Customized HTC mobile phone, with the operating system being a stripped down version of Windows Mobile. There are various other models available.
- Encryption with Twofish and AES in parallel, both with 256-bit key length, exchanged using a 4096-bit key Diffie-Hellman algorithm.
- In 2001, the Dutch hacker and digital rights activist Rop Gonggrijp started to work on highly secure phone, which was eventually launched in 2003 as the CryptoPhone 100.
- For the United States, the GSMK CryptoPhones are manufactured and sold by the Las Vegas based company ESD America Inc.
- The price of this phone is 2.618,- euros.



Other manufacturers

Some other, predominantly commercial secure mobile voice solutions are also provided by companies like SecurDigital in the US, Nabishi in the UK, PrivateWave from Switzerland, CasperTech from Italy, GeeksPhone from Spain, SecurStar from Germany, Compumatica from The Netherlands, and Gold Lock from Israel. Encrochat is also a highly secured and customized cell phone, made by a small company from Canada.


Encryption methods

All these phones use a hybrid cryptosystem, in which the conversation is encrypted with a very strong symmetrical cipher, often AES with 256-bit key. This key is then encrypted with a public-key cryptosystem, like RSA or ECC, and transmitted together with the encrypted message. Only the intended recepient can then decrypt the key and henceforth the message. By this method, end-to-end security all the way through the public telephone network is provided.


Security considerations

The most secure mobile phones are made by defense contracters, often primarily for being used by national government and military officials. This is because using telephones, or any other communication device, made by a foreign company always bears the risk of secret backdoors, allowing easy access to the encrypted conversation.

Countries, and also international organisations, without their own production facilities for military grade encryption equipment often go to companies in small or neutral nations, where they expect to have the least damage in case there would be a hidden backdoor.

Another inevitable risk of mobile phones is using them in (public) places where conversations can easily be overheard by other people or by listening devices. Secure wireline desk top phones can counter this threat by installing them in rooms which are secured against eavesdropping.

This is also one of the reasons why conversations at the highest level (TOP SECRET/SCI in the United States, TOP SECRET elsewhere) are often restricted to dedicated wireline circuits.


> See also: How Obama's BlackBerry got secured



Links
- Motherboard.Vice.com: Canada Bought $50 Million Worth of 'Secure' Phone Systems from the NSA
- OSNews.com: The second operating system hiding in every mobile phone

11 comments:

Anonymous said...

How about Phil Zimmerman's secure phone?

P/K said...

The secure phones from Phil Zimmerman, Zfone and the Silent Circle products, are actually software solutions for Voice over IP clients. This article is mainly about hardware secured phones for GSM and UMTS networks.

Australian telecom company said...

Communication has really evolved into something great. :)

Anonymous said...

Thanks for this note. Omnisec is a partner with Gretag AG; InfoGuard is a partner with Crypto AG.

Anonymous said...

Wasn't Crypto AG supposed to be a front for NSA?

Wayne Madsen called it NSA's Trojan Whore

Anonymous said...

It is notable that GSMK was founded as NAH6 Strong Crypto Products by members of the Chaos Computer Club. It was meant to be open and used by regular people. Now they are a closed and secretive defence contractor and people who work there are tight lipped about things.

amanfromMars said...

It is notable that GSMK was founded as NAH6 Strong Crypto Products by members of the Chaos Computer Club. It was meant to be open and used by regular people. Now they are a closed and secretive defence contractor and people who work there are tight lipped about things.

Ye olde poacher turned gamekeeper/crack hacker turned smarter contractor root and route to untold riches and Great Game Command and Control. It is nothing new though, that sort of major minor miner role reversal, as it has been around for centuries, if not millennia.

However, the one significant difference in the particular and peculiar case of cryptography, is the power and energy that one can then deliver ….. for oneself and others, of course, with there always being a question mark hanging over who really knows what information and intelligence is being shared, and what has been done with it …… and also very valid concerns about what may be done with it by others who be determined to remain ever present and watchful and informed in the shadows ….. the really clever known unknowns who can virtually lead and/or collapse everything with the simple sharing of what is known.

Koby Pigdon said...

Appreciate it because of this notice . Omnisec can be a spouse having Gretag AG

Unknown said...

compare mobile recycling
Your site is actually special. I've discovered your site revolutionary. You've chosen really amazing style for the drawing. We valued this.

Najwa said...

Seriously, LEO Privacy is perfect. All for free, LEO Privacy can check to see if your phone is safe. It can also put a lock on apps and a chosen cover like a fake "LEO Privacy isn't working" with a secret touch to take it away. Plus, it can take a picture of the person taking the phone if they get the password wrong between 1 and 5 times (you choose), still much more! Very simple to use too. Very recommended. There's still so much more!!!!
https://goo.gl/rl0dX8

Jhon said...

Very informative blog site.I find something new in here.I will visit your blog every week .Keeps sharing your new ideas and thoughts.

In Dutch: Meer over het wetsvoorstel voor de Tijdelijke wet cyberoperaties