The Register® — Biting the hand that feeds IT

Feeds

Unrootable: Mash these bits together to get a CLASSIFIED spyphone

Someone kind of already has - but who?

Sysadmin blog What does it take to build a classified smartphone? Demand clearly exists Given how readily every iPhone and Android device is rooted, infected, and otherwise compromised, the answer isn't simply "better software." In the battle to secure our mobile endpoints, operating system tricks and mobile device management will only take us so far.

To build a powerful, capable smartphone that can be trusted with classified documents, but used by personnel in the field takes the perfect marriage of hardware, software and expertise. To start with, we obviously need sealed storage – nothing on or off that device unless both the hardware and the software agree that this is allowed. Memory curtaining is also vital; technologies like Intel's TXT enable segmentation of system memory such that not even the OS can see all of it.

Signed everything will be part of our classified smartphones – the bootloader, the OS, every single app, patch, and the communications. In some cases, you can let local hardware like Intel's Trusted Platform Module handle verification of signatures for items like the bootloader. In others you need to use hardware and software to do remote attestation: verifying a package (or communication) is allowed against a centrally controlled authority.

This classified smartphone needs to be able to encrypt not only every bit of data on the device, but every bit of data shuffled off of it. It may even need to secure every screen displayed. Storage encryption is old hat. Secure communications is harder, but doable. Encrypting display output, meanwhile, is even trickier – we're probably headed into the realm of wearable communications there, with headsets that verify the iris prints of the user. We've been a while getting there, but these technologies are now all doable in the real world, not just the lab.

On the software side, a classified smartphone can't rely on post-event detection. It needs to prevent data compromise before it happens. Packets or phone calls can't go "anywhere by default". They go to whitelisted destinations only, or get forwarded through a centralised IDS with the knobs turned to 11. The phone should have heuristic software looking for deviations from expected operation. In a "classified smartphone", the hardware and software are not only known, they're signed.

This is Trusted Computing Group's Trusted Computing (TC) taken to its logical conclusion. The main complaints about TC to date have been the lack of control the end user has over their device combined with privacy and even ethical concerns regarding the creation and adoption of such technologies. Classified systems users are not expected to have control over their systems nor are their interactions with said classified systems expected to contain any form of privacy whatsoever.

This is what the acquisition of McAfee by Intel was all about. This is why Intel feels there is a market for Medfield-descendant phones, despite them offering nothing obvious beyond compatibility issues to those who adopt them. This is part of the reason Intel keeps its fingers in Tizen, and why it tried repeatedly at all those predecessors.

Let's not forget Wind River, either. It might seem reaching to drag that acquisition into my prognosticating, but the talent and expertise within Wind River would certainly lend itself nicely to a classified Smartphone project.

Intel has a combination of talent and the technologies that nobody else on Earth can match. Sources within Intel tell me the firm is preparing to broach the "classified smartphone" topic in a big way; paving the road for porting its significant investment in TC technologies into the mobile sphere. If this is true - and I suspect we'll know very soon - Intel will become one of the biggest players in mobile overnight. Classified smartphones, tablets and even Ultrabooks would be the only viable choice for billions of units shipped each year into government, military and high-security corporate markets.

Intel's mobile strategy has seemed chaotic (at best) for years. It seems now that they were merely biding their time and they are ready to make their play.

Mobile is just the beginning. Systems like this could power a new generation of "smart radios;" extended functionality radios for the military, emergency services or civilian uses. They could power unmanned aerial vehicles, your self-driving car or your high-end eco-friendly smart-meter-enabled home appliances. So what does it take to make a classified smartphone? The first ingredient is Intel Inside. ®

Whoa

Did I just read an Intel commercial?

7
2

Re: No

Indeed, the question remains for everyone outside the USA (and hopefully some inside) is do you trust Intel/McAfee?

If it can hide stuff from the OS, how do you check what is there and who put it there?

4
0
Anonymous Coward

How about Greenhills?

Greenhills do a nice little OS called Integrity, and is probably one of the very few out there that stands a chance of actually passing anything like a serious standards-based accreditation.

Blackberry seem to have done a reasonably good job, with governments every seemingly trusting them to a limited extent. Any additional tech from Intel, Greenhills or whoever would probably be able to improve on Blackberry's security, but there's an elephant in the room. It doesn't really solve the biggest issue out there regarding improved mobile security: who the hell is using this device? And just who is looking at the screen anyway? There's been many a thing tried (passwords, biometrics, secure tokens, you name it) but none of them really cut the mustard.

The biggest stumbling block for a secure mobile device is getting it to recognise when it's being used and/or looked at by someone other than the authorised holder. If you don't solve that problem then we'll just have repeats of the usual 'left it on a train' stories, appended with 'forgot to screen lock it...'. Passwords will get written down, secure tokens will get lost, and you're biometrics aren't exactly private either unless you wear a rubber gloves, a false mustache and funny glasses all the time.

Nothing in Intel's toolbox (nor in any one else's toolbox either) seems able to solve that.

5
1

Re: Whoa

Nononono.... if it was an Intel advert it would say "the first ingredient is Intel Inside" rather than the far more balanced "right now, the only available option is Intel". Because that's what it said, right?

3
0

So much promise yet the end result will be smartphones that you cant remove the shitty operator crippled firmware from and computers that nickel and dime you for every little function because you cant install anything except through their app store, it may involve increased risk but ill take freedom over security.

3
0

More from The Register

Fanbois vs fandroids: Punters display 'tribal loyalty'
Buying a new mobe? You'll stick with the same maker - survey
iPhone 5 totters at the top as Samsung thrusts up UK mobe chart
But older Apples are still holding their own
Google to Glass devs: 'Duh! Go ahead, hack your headset'
'We intentionally left the device unlocked'
Japan's naughty nurses scam free meals with mobile games
Hungry women trick unsuspecting otaku into paying for grub
 breaking news
Turn off the mic: Nokia gets injunction on 'key' HTC One component
Dutch court stops Taiwanese firm from using microphones
Next Xbox to be called ‘Xbox Infinity’... er... ‘Xbox’
We don’t know. Maybe Microsoft doesn’t (yet) either
Sord drawn: The story of the M5 micro
The 1983 Japanese home computer that tried to cut it in the UK
Nudge nudge, wink wink interface may drive Google Glass
Two-finger salutes also come in handy, as may patent lawyers
Black-eyed Pies reel from BeagleBoard's $45 Linux micro blow
Gigahertz-class pocket-sized ARM Ubuntu rig, anyone?