Encrypted Cell Phone Hits the Market 266
notshannon writes "Reuters
reports
about a new cell phone which automatically
encrypts communications. Of course, the
matching handset will decrypt the message.
Security doesn't come cheap, around $4000
per pair, but it's probably as reliable as anyone
in these parts could wish. Favorite quote:
'We allow everyone to check the security for themselves, because we're the only ones who publish the source code,' said Rop Gonggrijp at Amsterdam-based NAH6.
Amusingly, the article cites government.nl and not
nsa.gov as the world's most prolific phone tapper."
Do what I do... (Score:4, Funny)
Re:Do what I do... (Score:3, Funny)
I have a better idea: let's attack the decryptor's business model. Talk, talk, talk (especially if you've got those free evenings and weekends). They'll have so much to listen to, they won't be able to sort out anything from the noise.
Even better, use your time to call up spammers who are dumb enough to put 1-800 numbers in their mailings and chat them up for hours.
Re:Do what I do... (Score:2)
I would say that Project ECHELON [aclu.org] is doing a pretty good job of filtering information. The entire purpose behind the project is to collect as much data as possible and filter through it using advanced AI systems. I don't think a few extra phone calls are going to bother them.
Gotta start somewhere (Score:2, Interesting)
Re:Gotta start somewhere (Score:4, Informative)
For example, the RSA algorithim is available. But currently most people do not have the computing power necessary to decipher the keys to the transmission.
Keep Secrets Secret (Score:2, Informative)
Actually, the algorithm might be secret, but in that case it has to be:
So in other words, if you have a secret algorithm you have to handle it just like the keys, i.e. distribution of such an algorithm as part
Responsibility (Score:3, Funny)
I am a little concerned, though, that this kind of technology might fall into the wrong hands. For instance, have the manufacturers considered the applications for which terrorists might use these? I hardly think that the NAH6 would like to see their products used to slaughter innocent Americans, or even Amsterdaminians. Encryption is certainly a worthwhile tool, but I think it's far more likely to be exploited by the wicked than the virtuous, as it's the bad guys who've got something to hind.
Perhaps I would be more supportive of NAH6 if they were to provide a backdoor for the NSA [nsa.gov], FBI [fbi.gov], CBS [cbs.com] and the ALF [alf.org]. These organizations, then, could catch evil-doers in the act before they can inflict massive damage to our American way of life. Truly, the only way to secure our liberty is government supervision of the most invasive sort.
Re:Responsibility (Score:2)
I find it funny that the Netherlands tap more phones a year. I wonder if that is true or just because half of what agencies do over here is classified. There no oversight of how ma
Terrorists? Give it a rest. (Score:2, Insightful)
Look.. law enforcement snoops on phones because they can, not because from day 1 it was required by law to let them. Yes, there are rules in the US and elsewhre that require companies to make it easier for law enforcement to snoop.. but still.
Just because some form of communication exists does NOT mean you need to make it's contents available to the government upon request.
You have the RIGHT to encrypt your communications, and keep them private, as do terrorists.
I think maybe you are a troll, th
It was a joke. Laugh! (Score:2)
[Long, cogent answer to "what about terrorists" and assertion of the right to encrypt communications deleted.]
I think maybe you are a troll, though.
As I read it, the part about terrorists was obviously a subtle satire. Note the links to the four agencies he proposes should have a back door to let them tap phones and stage preemptive strikes (spoofing the original article's linking to, rather than naming, the NSA and the Netherlands government). The four agencies are:
- NSA: The National Sec
Re:Responsibility (Score:5, Informative)
Some quotes from Phil Zimmerman, author of PGP (emphasis mine):
Re:Responsibility (Score:2)
I am a little concerned, though, that this kind of technology might fall into the wrong hands. For instance, have the manufacturers considered the applications for which terrorists might use these? I hardly think that the NAH6 would like to see their products used to slaughter innocent Americans...
..and the really bad thing? It took me way to long to figure out you were joking, I've been hearing far to much of that line of arguement for real lately. *sigh*
Al.Re:Responsibility (Score:3, Insightful)
For instance, have the manufacturers considered the applications for which terrorists might use these?
Terrorists tend to use more secure methods, like meeting out in the middle of nowhere and talking face to face.
Re:Responsibility (Score:4, Informative)
I am a little concerned, though, that this kind of technology might fall into the wrong hands. For instance, have the manufacturers considered the applications for which terrorists might use these? I hardly think that the NAH6 would like to see their products used to slaughter innocent Americans, or even Amsterdaminians. Encryption is certainly a worthwhile tool, but I think it's far more likely to be exploited by the wicked than the virtuous, as it's the bad guys who've got something to hind.
Real criminals have had access to, say, laptops connected to gsm phones that run speakfreely [speakfreely.org] or simply any voip product over-ssh/ipsec/pptp/whatever for years..
Most importantly though, this cryptophone does nothing to conceal traffic data; i.e. "who's calling who". This information is not much use in corporate espionage, but worth its weight in gold in criminal investigations (and much easier to sort through than voice calls).
Props to NAH6... (Score:4, Interesting)
The patch file [nah6.com] alone is 56 KB... looks like they put in some effort on that one. Pretty cool.
Re:Props to NAH6... (Score:4, Informative)
PGPi itself always had the PGPFone module, which can either encrypt a telephone line (your modem dials their modem) or handle internet calls (useful for people whose families are abroad)
Download it here [pgpi.org], including source-code.
can you hear me now? (Score:5, Funny)
Re:can you hear me now? (Score:3, Interesting)
Re:can you hear me now? (Score:2)
Re:can you hear me now? (Score:2)
In GSM phones it's already being done in the tiny, tiny chipcard. But that encryption is only between handset and basestation (the main ISDN/POTS network is not encrypted), it's not particularly good (can be decrypted and tapped with a 100K machine - if not (much) cheaper), and of course the telco has the key (so, so does your government, among others).
This is end-to-end using Diffie-Hellman
nah (Score:5, Funny)
Re:nah (Score:2, Funny)
no (Score:5, Funny)
Re:nah (Score:3, Funny)
in my head.
now that is l33t.
real programmers (Score:3, Funny)
Real programmers don't use compilers. Good old
c:\>copy con program.exe
works just fine.
Limited Use? (Score:4, Insightful)
I mean if it only encrypts for other cellphones of it's type on it's network the usability is rather limited.
You might as well use encrypted walkie talkies, it's not too different when you think about it.
Re:Limited Use? (Score:2)
Re:Limited Use? (Score:2)
give it time (Score:2)
GSM is encrypted (Score:2)
Re:GSM is encrypted (Score:2)
The encryption of GSM phones is only between the handset and the base station that you are currently connected to. The data is decrypted at the base station to be injected raw into what is typically digital packet switched PSTN nowdays.
The telco has the keys to your encryption with GSM, but does not need to go out of their way to actively use them to eavesdrop on you, because decryption is *requ
Yikes! Tubgirl! (Score:2)
So, er... +1: tubgirl
Re:Yikes! Tubgirl! (Score:2)
Key Demographic (Score:2)
Dont let this prevent you from sleeping at night!
Re:Limited Use? (Score:2)
Re:Limited Use? (Score:2)
Ahh, I get it. Next time try enclosing your posts in <sarcasm> brackets. Otherwise some humour deficient reader might come along and believe you.
Re:Limited Use? (Score:2)
How's it work? (Score:3, Interesting)
Re:How's it work? (Score:2)
I for one welcome our new cryptographic overlords! (Score:2)
For that matter the ability of any kid with the right equipment to pick phone conversations out of the air, like that record that got released a few years back...
Re:I for one welcome our new cryptographic overlor (Score:2)
Nothing prevents people from meeting in parks or isolated areas and planning out a crime in private. If you send out a coded message it doesn't matter if it's encrypted or unencrypted, no one but your target party is going to understand what you're talking about.
Outlawing crypto will not prevent crimes from taking place and it will not help law enforcement stop those crimes. It will just stop the use of cryptographic methods
Call for legislature to outlaw these phones (Score:3, Funny)
Oh yes, I'm being sarcastic...
Why not sooner? (Score:4, Insightful)
Re:Why not sooner? (Score:2)
what country are you living in?
i look around my daily life and see most people having little concern with 'privacy', aside from something like id-theft. even then they just want 0 liability, not elimination of things that make id theft easy. get a capital one no hassel card!
Re:Why not sooner? (Score:2)
Not to mention, some people really just believe in unrestricted government wiretapping the "Ive got nothing to hide" attitude or are too apathetic to care.
More information (Score:5, Informative)
Available in U.S.? (Score:5, Interesting)
Re:Available in U.S.? (Score:5, Funny)
Amazon.com
People who brought these also purchased:
900Mhz GSM network to run them on. $1,000,000.
The Microsoft-based XDA handheld computer phone (Score:5, Funny)
Well, since Bill IS focusing so strongly on security, I feel comfortable relaying most personal, intimate, potentially volatile information over these phones.
I also wear my Social Security number on a t-shirt, yell out the numbers of my PIN at ATMs and throw my credit cards at little children as if they were candy.
US most prolific phone tapper? (Score:4, Insightful)
NSA vs. the Dutch (Score:3, Interesting)
The article states "one of the world's most active phone tappers" not "the world's most active phone tappers". The US had fairly stringent policies against phone tapping citizens (ie the police and FBI, not the NSA). I'm sure the NSA is not giving out statistics on how many wiretaps it does a year, but the NSA is (supposedly) forbidden from investigating within the US.
Does anyone else find it weird that its collectively called "the Dutch police?" Are they referring to all local law officials or some national law enforcement agency? Just curious...
Re:NSA vs. the Dutch (Score:3, Interesting)
They get around the prohibition on spying on citizens by hiring other governments, such as the Brits and Australians to do it for them. That's the big reason we gave them access to Eschelon to begin with.
And Eschelon isn't used for anti-terrorism nearly as much as it is used for economic, and industrial espionage. So the target market for these phones might be trade commissions, corporations, and other groups that have business secrets the US government might want to pass along to companies they are frie
Re:NSA vs. the Dutch (Score:4, Insightful)
I often hear claims about nefarious activity by NSA, but considering the level of security, I am rather dubious of these claims because it leads to the question of how people broke NSA security enough to find out about this stuff.
If you want industrial espionage, check the French. Air France was discovered to have bugged every seat in first class on every flight for the French security agency. Why first class? Industrial espionage seems an obvious reason, although again, how would you know.
The government doesn't have time to spy on ordinary citizens. Unless it is doing a criminal investigation or a national security (i.e. counter-intelligence/counter-terrorism) case, it isn't going to pay attention to you.
If the rumored key phrase sniffers are out there, then they no doubt have listened to a few of mine and lots of other conversations, just to be annoyed at the waste of time.
Oh, and NSA is allowed to operate inside the US. It is the agency responsible for communications security for the US military, and as such monitors US military communications in the US in addition to providing secure systems.
Many years ago, when I was a radio operator in P-3 Orions, another radio operator in my squadron sent a false MAYDAY as if he were a ship (not aircraft) in distress. A few days later he was in the brig. Can you say "signature analysis" and "broadband recorders"? This was in the late '60s, btw, so you can imagine what sort of technology was used to be able to go back to an arbitrary frequency, pull out the false MAYDAY, and subject it to signal analysis.
The same technique is almost certainly how the KAL-007 shootdown was recorded. Basically, at least in the past and no doubt now, NSA records and archives a whole lot of spectrum in a whole lot of places.
Pictures of the phone.... (Score:3, Informative)
looks like one of those phone/PDA's in one.
I think the most prolific phone tapper is... (Score:5, Interesting)
Re:I think the most prolific phone tapper is... (Score:2)
Too bad the use of cryptography (except for the government-approved algorithms) is not allowed in Russia.
sounds like total BS to me. To the best of my knowledge, it has never been outlawed (in fact, I believe cryptography hasn't beed specifically addressed in any laws), and, even if it were, it is most certainly not enforced. And, as we know, a non-enforceable law is as good as no law at all.
How is it non-enforceable? (Score:2)
OT: The FSB is only half of the former KGB (Score:4, Informative)
Secure Cellular Phones (Score:2)
I'm waiting for VOIP to become ubiquitous. Then there will be no carrier or FCC type acceptance to stand in the way of encryption.
Uh oh (Score:3, Funny)
Re:Uh oh (Score:3, Funny)
Key Exchange; Stego? (Score:2)
It wasn't clear to me if these phones were simply hardwired pairs, which would mean if you lost a phone that your security would be compromised.
If each phone saved a cache of public keys from potential correspondents, and the user needed to key-in a private key to authenticate, then it would be more intersting.
Lastly, there should be a stegospeech option where the encrypted channel overlays some uninteresting drivel conversation (you know, the kind of conversation that occupies 90% of cellphone bandwidth
Their concerns about Windows (from the FAQ) (Score:5, Informative)
I noticed that your CryptoPhone is based on Windows CE / PocketPC. Isn't this a security risk?
The current version of the CryptoPhone runs on top of a heavily modified and stripped down Microsoft PocketPC2002 ROM. The reason is that we wanted an affordable and well researched platform that offered sufficient performance for the speech encoding and crypto functions.A Pocket PC based system was chosen as the first platform for CryptoPhone because it was the only sufficiently fast device allowed us to do software integrity protection in ROM and the stripping of unnecessary functions.
The only commercially available alternative at the time of the necessary development decision was Symbian. Symbian is even more closed source (Windows CE is open source for developers in most parts) and was available only on a more expensive hardware platform. There was (and still is) no viable mass-market Embedded Linux based hardware with sufficient performance, stability, hardware integration and availability on the market at decision time, so we were not able to pursue this alternative.
We are aware that there are risks associated with using any Windows platform and we have taken a number of measures to mitigate these risks as best we could. We removed applications, communication stacks and system parts that are unnecessary for the CryptoPhone operation and which may cause potential security problems. You should not install third party software on the CryptoPhone to prevent software based attacks on the firmware integrity. The firmware update mechanism is cryptographically secured.
Re:Their concerns about Windows (from the FAQ) (Score:2)
Interesting. They are misusing the term "open source," though. Open source doesn't just mean you get to look at the source code, although that is valuable.
By the open source definition [opensource.org], you can't have such a thing as "open source for developers." An open source license must not discriminate against fields of endeavor.
Re:Their concerns about Windows (from the FAQ) (Score:2)
They are not using "Open Source", which would
be an incorrect use. ESR does not get to
redefine the English language for his personal
political purposes, sorry.
Re:Their concerns about Windows (from the FAQ) (Score:2, Insightful)
*yawn* so what? (Score:3, Insightful)
Ok... let's say you're not happy with the encryption. This product will have use in every part of the world *except* the US because, I believe, encrypted voice transmission is illegal. Heck, there have even been home cordless phones available for years that would encrypt only between the handset and the base station... and you're not allowed to have them in the US for that same restriction.
So... either you're going to spend a lot of money to gain encrypted communication that you could more cheaply acquire with other technologies, or you won't be allowed to use it (in the US) without giving the government a backdoor to listen in. For $4K? Forget it.
Encryption (Score:4, Informative)
Re:*yawn* so what? (Score:2)
Actually, A5/1 and A5/2 (the GSM algorithms) can be cracked in real-time.
What about GSM? (Score:3, Insightful)
How long until that happens with these technologies? I'd hope a long time, for $4000/pair.
It'll secure my business! (Score:2)
Re:It'll secure my business! (Score:2)
Here is the URL of the company (Score:2)
It's actually a division of a privately held German company called GSMK.
Same thing could be done for hybrid phones (Score:2)
smartphones will eat these.. (Score:2)
How will you verify keys? (Score:5, Insightful)
The good news is that if people really understood crypto, key exchange would be easy. You meet in person, establish a bluetooth link, swap public keys and verify fingerprints.
The bad news is that nobody will do this, or the phone won't support it (article didn't say how key exchange happens)
So when Joe calls and it says "incoming encrypted call" are you going to answer it because you know and like Joe, even though you've never exchanged keys with him?
Key exchange can't be done through a trusted third party (except the company you work for) because there is no trusted third party. Even if you trust Bob, and he trusts Mary, you don't know where their dirty phones have been.
If your work is the trusted third party, they'll probably hold copies of your private keys so calls can be monitored later if needed. (Hopefully the phone ethier allows you to generate a new key whenever you want, or doesn't allow exporting of it's private key. Hopefully both)
Don't get me wrong, I want one. Real bad, but not $4k bad, not to test out someones (probably flawed) cryptosystem.
Even if they understand crypto and got it right, the user still has to understand it to make it all work.
If I had about 10 of these I'd give one to each of my friends and make sure they only accept encrypted calls from known keys. I'd also make the screen light up in red or green or something to show it's an encrypted call.
Then we could talk about Joe behind his back, with no chance of interception from governments.
So yeah, anyone got a real use for these?
Re:How will you verify keys? (Score:3, Interesting)
Nobody? Maybe the people who don't care. I use SSH for a reason. I never thought that someone would try to do anything malicious until a week ago. A week ago, someone in my dorm tookover my i.p. and had a sshd running. I was connecting to it from another computer in the same building, and I got PuTTy's friendly warning about the host key changing. Wha
Re:How will you verify keys? (Score:3, Informative)
Not really. You will still be vulnerable to man-in-the-middle attacks.
1. Some one calls you.
2. Evil person intercepts it. Decodes it, reads plain text. Encodes it with his own key.
3. You recieve message encoded from Evil person. You decode it, read it, encode it with your own key. You send it to who you recieved it from, Evil person.
4. see step 2.
As you can see Evil person can read everything you are transmitting and recieving, not m
Matching handset? (Score:3, Funny)
As opposed to those phones where the matching handset doesn't decrypt the message. Too bad the market for those isn't larger. I have quit a few algorithms that can encrypt voice into something that can never be decrypted.
"targeted at business executives" (Score:2, Insightful)
Don't get me wrong, I think personal privacy is very
important (for individuals as well as 'executives'), however
I think this technology is just begging to be abused.
just my 2 cents...
So what? (Score:2)
Steganography (Score:3, Interesting)
(And yes - if someone tries to patent this, this counts as prior art)
"I CAN'T HEAR YOU..." (Score:3, Funny)
A new commercial! (Score:2, Funny)
guy: "can you hear me now?"
phone: "!@$(U*HAa9810"
guy: "... good?"
Why terrorists won't use them (Score:2)
Mr. Terrorist gets a cell phone with the number 555-222-2048. He knows it could be tapped. But one day he gets a call and the person says "Oh...I was looking for 555-222-2084." "Sorry, you have a wrong number." Of course that's a pre-arranged signal, with the 2084 being agreed upon in advance.
Yes, encrypted cell phones c
Security on a cell phone? (Score:3, Funny)
(lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance, lameness filter avoidance)
PGPFone. (Score:3, Informative)
Where's the source again? (Score:2)
"We are currently performing a internal round of reviews with a expert group of security researchers and cryptographers. Depending on the results of this review and the time it takes us to implement the relevant recommendations, our current plan is to have the Source available for Download"
So it sounds like they plan to publish the source if no flaws are found, else they will not i.e. security though obscurity
Incidentally
Four years after Sectra (Score:2)
Re:Four years after Sectra (Score:2)
Unless you have a military alliance with
the U.S., that is.
I don't.
Hate to be voice of reason... (Score:2)
First, if you read their FAQ, they state embedded linux doesn't exist - yes it does, STFW.
Second, yes - it's cool, but this has been available [spylife.com] for a while, at a comparable price.
Blah.
Why so expensive? (Score:2)
I have no idea of the data format or
Gongrijp (Score:3, Interesting)
These guys have also organized some huge hacker conferences such as Hacking at the End of the Universe [well.com] in 1993 and Hacking In Progress [hip97.nl] in 1997 (I was there in '97). Later Hacktic professionalized and they became the first ISP in the Netherlands. Still later that turned into XS4ALL [xs4all.nl], probably the best ISP in the Netherlands.
Through everything, Gongrijp ("Public Enemy #1") was a driving force. If he says the phone is secure, then that's a pretty damn strong endorsement.
Mod me down... (Score:2)
Nevertheless, the relatively small population of the Netherlands skews these results.
Re:Phone Tappers (Score:2)
Re:Phone Tappers (Score:2)
Ha ha hahahahahaha .... hahahaha....ha ha hooooooo.....
But seriously. The NSA isn't the world's most prolific phone tapper ... hahahaha hhaha ha ha.... That's a good one. They probably only listen in to several hundred million cell phone calls a day. That's not so much. Of course most of that is automated listening for keywords, so maybe that doesn't count.
Re:The NSA Kids Page? (Score:2)
>
> NSA Kids page? WTF??
>
> Mommy, I want to be a spook when I grow up.
My favorite .sig of all time reads:
"NSA is now funding research not only in cryptography, but in all areas of advanced mathematics. If you'd like a circular describing these new research opportunities, just pick up your phone, call your mother, and ask for one."
Re:Something to Consider (Score:2)
From an open/free software view this is a wonderful announcement (an obvious role-model for the e-voting devices), but from a security perspective the issue you bring up is important.
Of course with the software (or in fact with just complete specs) you could build your own phone (or simulation of one) which you could then use for interoperability testing with a real phone. This could verify that the phone at least appeared to operate as the code specifies...black box testing.
It's also not mandatory tha
Re:Wow! They invented GSM! (Score:3, Informative)
Not only that, but also a pseudo-random frequency hopping feature is also included in the scheme, so that recording a conversation from the radio waves in order to perform a later brute-force attack on it could be made impossible.
There are, however, several problems when coming down to reality in the application of the
Re:Wow! They invented GSM! (Score:2)
The GSM mobile telephony system (used everywhere but except in USA and colonies, may God protect their industries from competition), does indeed support cryptography since its very design.
AT&T Wireless, and Cingular and several small companies will be supprised to learn that their cell phone networks don't exist. One of the reasons that cell phone coverage in the U.S. is fairly poor is that there are 3 major competing and incompatable cell phone networks (strictly speaking there are several more be