Safety on the Line Exposing the Myth of Mobile Communication Security

Total Page:16

File Type:pdf, Size:1020Kb

Safety on the Line Exposing the Myth of Mobile Communication Security Safety on the Line Exposing the myth of mobile communication security Prepared by: Supported by: Cormac Callanan Freedom House and Hein Dries-Ziekenheiner Broadcasting Board of Governors This report has been prepared within the framework Contacts of Freedom House/Broadcasting Board of Governors funding. The views expressed in this document do not FOR FURTHER INFORMATION necessarily reflect those of Freedom House nor those of PLEASE CONTACT: the Broadcasting Board of Governors. Mr. Cormac Callanan July 2012 Email: [email protected] Mr. Hein Dries-Ziekenheiner Email: [email protected] 2 Safety on the Line Exposing the myth of mobile communication security Authors CORMAC CALLANAN HEIN DRIES-ZIEKENHEINER IRELAND THE NETHERLANDS Cormac Callanan is director of Aconite Internet Solutions Hein Dries-Ziekenheiner LL.M is the CEO of VIGILO (www.aconite.com), which provides expertise in policy consult, a Netherlands based consultancy specializing development in the area of cybercrime and internet in internet enforcement, cybercrime and IT law. Hein security and safety. holds a Master’s degree in Dutch civil law from Leiden University and has more than 10 years of legal and Holding an MSc in Computer Science, he has over 25 technical experience in forensic IT and law enforcement years working experience on international computer on the internet. networks and 10 years experience in the area of cybercrime. He has provided training at Interpol and Hein was technical advisor to the acclaimed Netherlands Europol and to law enforcement agencies around the anti-spam team at OPTA, the Netherlands Independent world. He has worked on policy development with the Post and Telecommunications Authority, and frequently Council of Europe and the UNODC. advises on both technical and legal issues related to cybercrime. He was responsible for the first fine ever In 2008 he completed a study of best practice to be issued to a spammer under the EU anti-spam guidelines for the cooperation between service legislation while at OPTA and as lead investigator, he providers and law enforcement against cybercrime was involved in many cybercrime related enforcement (www.coe.int/cybercrime). In 2009 he produced the actions and takedowns; including several malware cases 2Centre (Cybercrime Centres of Excellence Network and high profile international spam cases. for Training Research and Education) study profiling international best practices for IT forensics training to Hein served as legal and regulatory counsel and law enforcement (www.2centre.eu). representative of the Netherlands ISP Industry Association (NLIP) and delegate to the board of the Cormac was president and CEO of INHOPE – the European Internet Service Providers Association International Association of internet Hotlines (EuroISPA). (www.inhope.org) – co-ordinating the work of internet hotlines responding to illegal use/content on the He regularly presents and moderates technical training internet. He co-authored the first INHOPE Global sessions at international conferences on cybercrime and Internet Trend report in 2007, a landmark publication security and delivers training at both government and on internet child pornography. He also served president industry events. Hein regularly publishes and speaks on of the board of the European Internet Service Providers issues relating to law enforcement and cybercrime. Association (EuroISPA). 3 Table of Contents Authors 3 Table of Contents 4 Executive Summary 6 Introduction 7 Background 8 Technical Testing 10 Threat Assessment 11 Country Profiles 15 Conclusions 19 Recommendations 19 Introduction 23 Freedom House 24 Broadcasting Board of Governors 24 Structure of This Report 25 Evolution of Mobile Markets 26 Market Actors 27 Blocking and Monitoring 29 Mobile Threats and Risk 31 Conclusion 37 Background 39 Smartphones 40 Hardware and OS layers 40 APIs and Security 41 Operating Systems: Differences in Architecture and Security 41 Mobile Networks 46 Conclusions 57 Technical Testing 58 Introduction 59 Selecting Applications 59 Testing 60 Set Up 60 Testing Criteria 61 Forensic Data Extraction 63 Selected Results 63 Results of Forensic Extraction 67 Conclusion 68 4 Safety on the Line Exposing the myth of mobile communication security Threat Assessment 69 Introduction 70 Modeling the Mobile Environment 71 Types of Applications 71 Target Audience and Target Use Case 73 Phases of Mobile Phone Usage/Threats 74 Mitigating Threats 78 Countermeasures 79 Interim Conclusions 83 Developments 89 Conclusions 90 Country Profiles 91 Country Overview 93 In-Country Mobile Users 97 Republic of Azerbaijan 104 Republic of Belarus 109 People’s Republic of China 113 Arab Republic of Egypt 116 Islamic Republic of Iran 120 Libya 125 Sultanate of Oman 127 Kingdom of Saudi Arabia 132 Syrian Arab Republic 136 Tunisian Republic 141 Republic of Uzbekistan 144 Socialist Republic of Vietnam 148 Findings 154 Conclusions 155 Recommendations 157 Appendix I Methodology 162 Appendix II Broadcasting Board of Governors Broadcasting Principles 167 Glossary of Terms 168 Information Sources 170 Developers 172 5 Chapter 1: Executive Summary 6 Safety on the Line Exposing the myth of mobile communication security Executive Summary INTRODUCTION There are many stakeholders with different areas of This report evaluates the risks and vulnerabilities responsibility in the mobile market. At the state level, of mobile phone services and apps in 12 specified a government’s department for information and countries: the Republic of Azerbaijan, the Republic communications technologies (ICT) is responsible of Belarus, the People’s Republic of China, the Arab for implementing government policy as well Republic of Egypt, the Islamic Republic of Iran, Libya, as setting and developing telecom strategy. A the Sultanate of Oman, the Kingdom of Saudi Arabia, separate telecommunications regulator is usually the Syrian Arab Republic, the Tunisian Republic, the independent of direct political control and regulates Republic of Uzbekistan, and the Socialist Republic of the TV and radio sectors, fixed line telecoms, mobile Vietnam. Rather than focus on a single innovation, this telecoms, and the airwaves over which wireless study analyzes multiple mobile technologies – including devices operate. The telecommunications regulators operating systems, applications and mobile protocols in the countries appearing in this report are not – to determine their capacity to protect security and sufficiently independent from political influence. privacy and to combat censorship and surveillance. Individual companies called telecom operators – or a Throughout this study the protection of mobile phone telecommunications service provider (TSP) – provide users was of paramount importance. telecommunications services, such as telephony and data communications access, to consumers This project was managed by Freedom House and and businesses. Mobile handset manufacturers supported by the Broadcasting Board of Governors. are responsible for the design, development, and manufacture of devices, in compliance with mobile This study is divided into several sections. The standards. These are then, subject to state approval, Introduction outlines this research initiative and sold in different mobile markets around the world. its methodology. It also justifies the need to focus Often manufacturers adapt handsets for different attention on specific mobile phone environments. markets depending on the requirements of the The Background section provides a comprehensive state in which they are sold. Mobile OS developers description of mobile phone technologies with create the interface installed on mobile handsets. particular emphasis on smartphones. Technical Testing Smartphone operating systems combine many of outlines an analysis of the five primary platforms for the attributes of a personal computer operating smartphone usage: Apple iOS, Google Android, Nokia system with touchscreen, radio cell communications, Symbian, Microsoft Windows Phone, and RIM BlackBerry Bluetooth, WiFi, GPS mobile navigation, camera, video OS. A Threat Assessment analyzes security and privacy camera, speech recognition, voice recorder, music challenges facing citizens who own and use a mobile player, near-field communication, personal digital phone, as well as obstacles confronting mobile internet assistant (PDA), and other features. Application (app) users. The assessment confirms that various platforms developers design and craft software applications can be used to overcome some threats particularly for mobile devices. These applications are either pre- when blocking and circumvention technology is installed on handsets during manufacture or can used. The Country Profiles evaluate 12 countries be downloaded by customers from various mobile predetermined by the BBG for investigation. Data points software distribution platforms. in the analysis include the most recent key performance indicators for each national mobile market, various This report analyzes mobile technologies – including mobile operators, the range of handsets in use and the operating systems, applications, and mobile protocols scale of mobile penetration for each country. The report – to determine how they may work to combat is completed with a short section of Findings and a list censorship and surveillance. The report also provides of Recommendations for the future. an overview of the security and privacy challenges posed by mobile technologies. 7 The global adoption of mobile technologies has
Recommended publications
  • Using a Mobile Device Or Tablet to Take Online Training Courses
    Using a Mobile Device or Tablet to Take Online Training Courses ClickSafety online training courses run using Adobe Flash and need a web browser that supports Adobe Flash Player. Customers have the best experience when using the Mobile/Tablet Web Browser PUFFIN. Puffin Browser is available FREE for both Apple iPad/iPhone and Android mobile and tablet devices. Puffin Mobile App Installation Instructions APPLE iOS (iPad) Puffin Web Browser Free is the fastest free mobile browser. Download now and you can enjoy free Flash support 24/7 (this app is supported by Ads*). TO INSTALL, CLICK APP STORE ICON BELOW to download the app from the Apple App Store: ONCE INSTALLED on your iPad: • Go to your iPad home screen and find the Puffin App Icon • Open the Puffin App by clicking on the Icon • Locate the Website URL Bar at Top of App • Enter: www.iftilms.org • Enter USERNAME (Member ID) and PASSWORD CLICK LOG IN • Locate the OSHA 30 course and CLICK the GO button to start the course. ANDROID (Mobile Devices & Tablets) Puffin Web Browser Free is the fastest free mobile browser. Download now and you can enjoy free Flash support 24/7 (this app is supported by Ads*). TO INSTALL, CLICK APP STORE ICON BELOW to download the app from the Apple App Store: ONCE INSTALLED on your Android Mobile Device or Tablet: • Go to your Android device home screen and find the Puffin App Icon • Open the Puffin App by clicking on the Icon • Locate the Website URL Bar at Top of App • Enter: www.iftilms.org • Enter USERNAME (Member ID) and PASSWORD CLICK LOG IN • Locate the OSHA 30 course and CLICK the GO button to start the course.
    [Show full text]
  • Webrtc IP Address Leaks Nasser Mohammed Al-Fannah Information Security Group Royal Holloway, University of London Email: [email protected]
    1 One Leak Will Sink A Ship: WebRTC IP Address Leaks Nasser Mohammed Al-Fannah Information Security Group Royal Holloway, University of London Email: [email protected] Abstract—The introduction of the WebRTC API to modern browsers and mobile applications with Real-Time Commu- browsers has brought about a new threat to user privacy. nications (RTC) capabilities1. Apparently, identifying one or WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Com- more of the client IP addresses via a feature of WebRTC was 2 munications (RTC) capabilities over peer-to-peer connections. first reported and demonstrated by Roesler in 2015. In this The WebRTC API causes a range of client IP addresses to paper we refer to the WebRTC-based disclosure of a client IP become available to a visited website via JavaScript, even if a address to a visited website when using a VPN as a WebRTC VPN is in use. This is informally known as a WebRTC Leak, Leak. and is a potentially serious problem for users using VPN services The method due to Roesler can be used to reveal a for anonymity. The IP addresses that could leak include the client public IPv6 address and the private (or local) IP address. number of client IP addresses via JavaScript code executed The disclosure of such IP addresses, despite the use of a VPN on a WebRTC-supporting browser. Private (or internal) IP connection, could reveal the identity of the client as well as address(es) (i.e. addresses only valid in a local subnetwork) enable client tracking across websites.
    [Show full text]
  • Symbian OS Platform Security Model
    THE SYMBIAN OS BECAME FULLY OPEN sourced in February 2010, which opens even BO LI, ELENA RESHETOVA, AND T U O M A S A U R A more possibilities for application develop- ers to understand and analyze its security Symbian OS solution. We present a short introduction to the software features of Symbian plat- platform form security: three trust tiers, capability model, data caging, and the Symbian signed security model process. We also try to compare the security Bo Li is a second-year student in the master’s solution with the classical design principles program in security and mobile computing in this area, as well as briefly discuss gen- at Aalto University, Finland. He got his bach- elor’s degree in communications engineering eral design challenges and potential weak- in 2008 from Fudan University, China. nesses. [email protected] Elena Reshetova is a senior security engineer Introduction at Nokia, as well as a postgraduate student at Aalto University. She is interested in With the development of mobile devices and mo- various research areas related to platform bile computers, more and more people rely strongly security, security aspects of networking, and on them. People use mobile devices and mobile cryptography. computers to arrange their schedules, contact each [email protected] other, process emails, and share rich media con- tent. People believe it is safe to do so because it Tuomas Aura is a professor at Aalto Uni- versity, Finland. His research interests are feels secure just knowing it is “right there with security and privacy in communications you” [8].
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • 1921 Tulsa Race Riot Reconnaissance Survey
    1921 Tulsa Race Riot Reconnaissance Survey Final November 2005 National Park Service U.S. Department of the Interior CONTENTS INTRODUCTION 1 Summary Statement 1 Bac.ground and Purpose 1 HISTORIC CONTEXT 5 National Persp4l<live 5 1'k"Y v. f~u,on' World War I: 1896-1917 5 World W~r I and Postw~r ( r.: 1!1t7' EarIV 1920,; 8 Tulsa RaCR Riot 14 IIa<kground 14 TI\oe R~~ Riot 18 AIt. rmath 29 Socilot Political, lind Economic Impa<tsJRamlt;catlon, 32 INVENTORY 39 Survey Arf!a 39 Historic Greenwood Area 39 Anla Oubi" of HiOlorK G_nwood 40 The Tulsa Race Riot Maps 43 Slirvey Area Historic Resources 43 HI STORIC GREENWOOD AREA RESOURCeS 7J EVALUATION Of NATIONAL SIGNIFICANCE 91 Criteria for National Significance 91 Nalional Signifiunce EV;1lu;1tio.n 92 NMiol\ill Sionlflcao<e An.aIYS;s 92 Inl~ri ly E~alualion AnalY'is 95 {"",Iu,ion 98 Potenl l~1 M~na~menl Strategies for Resource Prote<tion 99 PREPARERS AND CONSULTANTS 103 BIBUOGRAPHY 105 APPENDIX A, Inventory of Elltant Cultural Resoun:es Associated with 1921 Tulsa Race Riot That Are Located Outside of Historic Greenwood Area 109 Maps 49 The African American S«tion. 1921 51 TI\oe Seed. of c..taotrophe 53 T.... Riot Erupt! SS ~I,.,t Blood 57 NiOhl Fiohlino 59 rM Inva.ion 01 iliad. TIll ... 61 TM fighl for Standp''''' Hill 63 W.II of fire 65 Arri~.. , of the Statl! Troop< 6 7 Fil'lal FiOlrtino ~nd M~,,;~I I.IIw 69 jii INTRODUCTION Summary Statement n~sed in its history.
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Parental Control – Whatsapp
    Parental controls guide WhatsApp privacy guide Parental Controls information Type of guide Social media privacy guides Features and Benefits WhatsApp privacy settings allow you to restrict who can see your child’s messages and location. There are also ways to block delete or report users on the platform. Please note, WhatsApp new privacy policy has come into effect starting May 15. What specific content can I restrict? Chatting Downloading file sharing Location sharing Privacy Privacy and identity theft What do I need? A WhatsApp account WhatsApp privacy guide Step by step guide 1 Control who sees your information You can set your last seen, profile photo and/or status to the following options: Everyone, My Contacts and Nobody: 1. Open WhatsApp and go to your Settings, tap Account, then tap Privacy. 2. Next, tap your selected option, then choose from either option: ‘Everyone’, ‘My Contacts’ or ‘Nobody’. 3. The changes will be applied automatically. 1 WhatsApp privacy guide 2 3 WhatsApp privacy guide Step by step guide 2 How to block contacts You can stop receiving messages, calls and status updates from certain contacts by blocking them. Open WhatsApp, choose the person you want to block either by searching or scrolling through your chat list. 2. Tap on their name, then scroll down and tap Block Contact. 1 2 WhatsApp privacy guide WhatsApp privacy guide Step by step guide 3 How to report contacts 1. Open WhatsApp, choose the person you want to report either by searching or scrolling through your chat list. 2. Tap on their name, then scroll down and tap Report or Report and Block Contact.
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • Song, State, Sawa Music and Political Radio Between the US and Syria
    Song, State, Sawa Music and Political Radio between the US and Syria Beau Bothwell Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2013 © 2013 Beau Bothwell All rights reserved ABSTRACT Song, State, Sawa: Music and Political Radio between the US and Syria Beau Bothwell This dissertation is a study of popular music and state-controlled radio broadcasting in the Arabic-speaking world, focusing on Syria and the Syrian radioscape, and a set of American stations named Radio Sawa. I examine American and Syrian politically directed broadcasts as multi-faceted objects around which broadcasters and listeners often differ not only in goals, operating assumptions, and political beliefs, but also in how they fundamentally conceptualize the practice of listening to the radio. Beginning with the history of international broadcasting in the Middle East, I analyze the institutional theories under which music is employed as a tool of American and Syrian policy, the imagined youths to whom the musical messages are addressed, and the actual sonic content tasked with political persuasion. At the reception side of the broadcaster-listener interaction, this dissertation addresses the auditory practices, histories of radio, and theories of music through which listeners in the sonic environment of Damascus, Syria create locally relevant meaning out of music and radio. Drawing on theories of listening and communication developed in historical musicology and ethnomusicology, science and technology studies, and recent transnational ethnographic and media studies, as well as on theories of listening developed in the Arabic public discourse about popular music, my dissertation outlines the intersection of the hypothetical listeners defined by the US and Syrian governments in their efforts to use music for political ends, and the actual people who turn on the radio to hear the music.
    [Show full text]
  • Improving Signal's Sealed Sender
    Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuky, Adam Avivz, Dan Rochex, Eric Wustrow∗ ∗University of Colorado Boulder, fian.martiny, [email protected] yBoston University, [email protected] zGeorge Washington University, [email protected] xU.S. Naval Avademy, [email protected] Abstract—The Signal messaging service recently deployed a confidential support [25]. In these cases, merely knowing to sealed sender feature that provides sender anonymity by crypto- whom Alice is communicating combined with other contextual graphically hiding a message’s sender from the service provider. information is often enough to infer conversation content with- We demonstrate, both theoretically and empirically, that this out reading the messages themselves. Former NSA and CIA one-sided anonymity is broken when two parties send multiple director Michael Hayden succinctly illustrated this importance messages back and forth; that is, the promise of sealed sender of metadata when he said the US government “kill[s] people does not compose over a conversation of messages. Our attack is in the family of Statistical Disclosure Attacks (SDAs), and is made based on metadata” [29]. particularly effective by delivery receipts that inform the sender Signal’s recent sealed sender feature aims to conceal this that a message has been successfully delivered, which are enabled metadata by hiding the message sender’s identity. Instead of by default on Signal. We show using theoretical and simulation- based models that Signal could link sealed sender users in as seeing a message from Alice to Bob, Signal instead observes few as 5 messages. Our attack goes beyond tracking users via a message to Bob from an anonymous sender.
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • Symbian Foundation Press Conference
    Symbian Foundation Press conference M/C – Merran Wrigley Exciting Internet experiences for the aspirations of billions 2 © 2008 Symbian Foundation Mobile software set free Symbian Foundation Kai Öistämö Executive Vice President, Nokia Shared vision for an unparalleled open mobile software platform 4 © 2008 Symbian Foundation That unites Symbian OS, S60, UIQ and MOAP(S) 5 © 2008 Symbian Foundation Creating the most proven, open, complete mobile software platform 6 © 2008 Symbian Foundation With over 200 million devices already shipped 7 © 2008 Symbian Foundation For free. 8 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience MOAP(S) 9 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience Symbian Foundation Platform Applications suite Runtimes UI framework Middleware Operating system Tools & SDK 10 © 2008 Symbian Foundation The first step to our goal • Acquiring Symbian Ltd • Closing expected in Q4 2008 • Symbian Ltd to be part of Nokia • Nokia will contribute Symbian OS and S60 to Symbian Foundation 11 © 2008 Symbian Foundation Fulfilling the Symbian mission Symbian Foundation Nigel Clifford CEO, Symbian Symbian Ltd Mission To become the most widely used software platform on the planet 13 © 2008 Symbian Foundation The leading global open platform 12% Symbian Linux 11% Microsoft RIM 60% Apple 11% Other Source Canalys – Cumulative 4% 12 month period to Q1 2008 2% 14 © 2008 Symbian Foundation The choice for the top vendors Samsung MOTO
    [Show full text]