Hi, James,

A mobile device which is never synced to anything, wirelessly
connected to anything, only allows the user to see the screen while
it's being used, and is electromagnetically shielded is secure
while it's under the owner's control.  Does that help? ;-)

Can you elaborate more on the threat that's expected, and what the
value of the data is which will be installed on the device?

For example, I did a project for a Major Auto Manufacturer where the
threat was defined as "casual perusal of a lost Palm, Windows CE, or
RIM Blackberry device".  We proposed solving it by using an escrow
service and whole-device screen-locking software.  A random person
finding it in an airport restroom would not know that the device
belonged to Big Time Auto Executive, but would see the sticker that
said "Turn this into Joe Blow Services and get $100!".  They couldn't
get into the apps on the device, but $100 in the hand is worth more
than finding out who the device belonged to.  And they'd never know
that there was valuable information about the Big Time Auto
Executive's meetings with a company they were about to acquire in the
Memo Pad, Datebook and Phonebook...

So, let's define the threats and the value of the data...

>>>>> On Mon, 25 Mar 2002 11:44:19 -0500, "Meritt James" <[EMAIL PROTECTED]> said:
    Meritt>  As contradictory as this intuitively seems, is anyone
    Meritt> aware of anything that even ADVERTISES itself as a secure
    Meritt> mobile device?  I've been asked about a 'secure' (whatever
    Meritt> that means) mobile (say, wear on belt size, 6 oz or so)
    Meritt> unit.  Haven't been able to find out if voice, IP or what.
    Meritt> So far, I'm flexible.  ;-)
    Meritt> 
    Meritt> Thanks!  -- James W. Meritt CISSP, CISA Booz | Allen |
    Meritt> Hamilton phone: (410) 684-6566
    Meritt> 
    Meritt> 
-- 
John Karabaic
3545 Zumstein Ave, Cincinnati OH 45208-1309
513.321.3221


When in doubt, use brute force.
                -- Ken Thompson 

Reply via email to