How to avoid espionage on mobile phones
The military intelligence service MIVD warns large companies not to discuss sensitive topics during meetings where smartphones or tablets are on the table due to the risk of espionage. What else can you do to avoid espionage?
Interview with Gerben van der Lei, Manager Portfolio Fox Crypto @Fox-IT.
You can leave smartphones and tablets outside of the meeting room what the MIVD suggests. Or put the smartphones in a glass jar. Another option is using a Cryptophone. Cryptophones these days are often linked to organized crime as the preferred device for communication. Gerben van der Lei (Manager Portfolio Fox Crypto at Fox-IT) immediately emphasizes that the Bittium Tough Mobile solution is not designed for criminal purposes but for (the top management of) organizations using sensitive or highly competitive data.
How is the cryptophone different from regular smartphones?Most importantly: a cryptophone has a layered security design and can be configured to the desired level of isolation. Up to four containers can be configured that all run their own separate data and services. The hardware is also resistant to sabotage. Therefore, this solution enables safe storage and separate environments for private and business usage. We observed the need for portable yet secure workplaces and the Bittium Tough Mobile Phone provides such a solution – especially because it can be plugged into a docking station.
What does the partnership with Bittium entail?
Bittium is a tech firm with around 700 staff members, many of whom have previously worked for Nokia and have a high-level of specialism. They offer products that are complementary to Fox-IT’s portfolio with a focus on robustness and quality performance. We are now licensed to distribute the Tough Mobile Cryptophone and deliver services and maintenance to local customers, such as configuring it and integrating it in corporate networks and are looking towards the next step of closer collaboration.
How is this product tested?
We have spent quite a bit of time reviewing the Bittium production process, their way of working and design. The assembly takes place in Finland and Bittium is very careful in selecting their suppliers. We visited them on site a few times and see this as a start to a wider collaboration. From a security perspective we concluded that the Bittium Tough Mobile it is one of the best products on the market. Furthermore, the Finnish authority NCSA-FI has certified it. Important to say that in order for the Dutch government bodies to use the device, the NBV needs to do perform an evaluation. I am currently using it myself and if I were to lose it, I would not lose any sleep over the data safely stored on it.
Read more on cryptophones.