Professional Documents
Culture Documents
internet in our computers, wireless remotes for our car locking mechanisms
and, arguably the most popular, cell phone communications. The problem
with all wireless technology, though, is its insecurity and its ability to be
traced, hacked and interfered with. In previous papers, I have explored the
insecurity and ease that comes with Bluetooth technology. Bluetooth, being
equipped on almost every cell phone on the market today, is a security risk
in and of itself. But what about cell phone technologies? Consider the
following: President Elect Barack Obama had his cell phone records snooped
second-science/post.cfm?id=obamas-cell-phone-hacked-privacy-is-2008-11-
21). The most protected person in the United States, who is constantly
covered by secret service agents with fully automatic weapons and rides in
bomb proof cars, had his one vulnerability exploited without even knowing it.
been done. He will also have his Blackberry taken away once he takes office
on January 20th.
(http://www.economist.com/world/unitedstates/displaystory.cfm?
story_id=12865117)
For exactly these reasons, General Dynamics and C4 systems have created
the first ever fully secured smart phone for use by government agencies and
address the need for secure smart phones, how the Sectera Edge works, and
some other products similar to the Sectera Edge, also developed by General
On March 6th , 2008, General Dynamics issued a press release about its
newest product, the Sectera Edge smart phone. The Edge was developed in
what is called a KSD-64A or a key shaped piece of plastic with a Read Only
Memory chip installed in it. This memory chip is assigned and programmed
Ignition Key which is similar to a digital password which allows for the key to
be used within the STU-III device. This key is provided by the National
Security Agency through the Electronic Key Management System, who also
maintains a list of keys that may have been compromised. In general, the
way that a device utilizing the STU-III technology works is by the operator
asking the other party to “go secure” at which time a button is pushed which
transmits the device’s key to the other device. The keys are then compared
to a “key revocation list” which the devices compare the age of to one
verified and key revocation lists updated accordingly, the phones are in an
The greatest asset to the STU-III technology is that it allows for the device to
place both unsecured calls to other unsecured lines under the Plain Old
Telephone System (POTS), and also that it allows for secured calls to be
made as well. Because of this fact, STU-III systems can be used by any
if the device is used over Voice Over IP (VOIP) communications, in which the
(http://www2.hawaii.edu/~wes/ICS623/Reports/WYip.html).
With this in mind, General Dynamics C4 Systems created the Sectera Edge,
the first smart phone to be classified by the NSA as Top Secret voice enabled
and Secret data enabled. The phone, in its most basic sense, is a Motorola
phone with GSM (Global System for Mobile communications) technology built
into its architecture. Therefore, it is able to place unsecured calls over the
GSM system in both the United States and any other country which allows
access to the GSM system. It can also be used on any wireless carrier which
utilizes GSM, specifically AT&T and T-Mobile in the United States, as well as
Sprint which utilizes the CDMA (Code Division Multiple Access) system for
cellular phones.
The Edge is quite different than many other devices that came before it. As
one of the first of its kind in that it is a wireless device which does not need
first of its kind because instead of merely a cellular phone which allows for
Though the Edge is touted as being similar to most other wireless phones,
operate. The first is the standard voice number that all cell phones are
issued and is used for unsecured operations. The second, is “for secure
switched data service, with mobile originate (MO) and mobile terminate
(MT)” (http://www.gdc4s.com/content/detail.cfm?item=97aef0a4-96e4-4ab2-
b33b-eb832c4bb4c2). To simplify this explanation a bit, secured
conversations and data transfers that take place on the Sectera Edge are
done so over the data portion of the cell phone, similar to accessing the
The features of the Sectera Edge are plentiful, and make for a phone that
than happy to have. It is generally network neutral, so long as the cell phone
popular in the United States. Unlike many other phones used on these
Unlike other models that have been rated for secured wireless
has a PDA built into it, also containing the ability to store and view classified
materials on it. The phone has two separate screens for exactly this reason:
one being used for unsecured wireless technologies, utilizing Windows Mobile
for an operating system and allowing for basic internet browsing, calendar
operations and common smart phone usage, and the other being a black and
(http://www.ruggedpcreview.com/3_handhelds_gd_sectera_edge.html) for
secured messaging and viewing. The Edge also has a full 47 key QWERTY
key pad, similar to most other smart phones, allowing for full messages to be
Similar to the separate screens that the Edge has for the two different modes
of data, it also has two separate USB ports for the same reason. This allows
secured storage versus a regular storage chip. The phone also contains the
Common Access Card (CAC) card reader slot for verification of identity,
public key signing and to access secured government websites and portals.
As can be seen, the Sectera Edge is one of a kind and one of the few
solutions that can be used for a fully secured mobile work environment for
functional PDA built in, it is exactly what is needed for any government
contractor.
http://www.gdc4s.com/content/detail.cfm?item=82337f34-170b-4d11-8e5d-
83e7e5299918
http://www.reuters.com/article/pressRelease/idUS201411+06-Mar-
2008+PRN20080306
http://www.policeone.com/police-products/communications/secure/press-
releases/70138/
http://www.ruggedpcreview.com/3_handhelds_gd_sectera_edge.html
http://www2.hawaii.edu/~wes/ICS623/Reports/WYip.html
http://www.tscm.com/STUIIIhandbook.html
http://www.sciam.com/blog/60-second-science/post.cfm?id=obamas-cell-
phone-hacked-privacy-is-2008-11-21
http://www.economist.com/world/unitedstates/displaystory.cfm?
story_id=12865117