CCW 2013: Motorola’s secure smartphone voice and data solution now available in EMEA

The AME 2000 solution allows agencies to create a secure encrypted voice and data tunnel between their servers and commercially available Android-based smartphones

CCW 2013: Motorola’s secure smartphone voice and data solution now available in EMEA

At Critical Communications World 2013, Motorola Solutions introduced to markets in Europe, the Middle East and Africa, the AME 2000 Secure Mobile Solution, a new tool for government agencies that need secure voice and data communications on a wireless network.

AME 2000 is based on Motorola’s Assured Mobile Environment (AME) solution, which combines a commercial-off-the shelf (COTS) device with hardware and software to provide end-to-end encrypted voice and data communications through private or public wireless networks to support government agencies.

The solution allows customers to use their COTS smartphone (although this is limited to Motorola Android devices because of the integrated chip that creates Security Enhanced Android) as their personal mobile in the usual way, but to create a secure encrypted environment for business calls and data exchanges using a downloadable app.

The app provides end-to-end AES 256/NSA Suite B encrypted voice services and messaging between AME-equipped devices. A Suite B IPSec Virtual Private Network (VPN) provides secure data-in-transit between a mobile device and a customer enterprise through private and public broadband networks, including GSM, 3G, 4G LTE and Wi-Fi.

AME 2000 supports the use of customer-installed applications, such as graphic information system mapping and video and remote medical monitoring. It also includes a browser and applications for email, text messaging and contacts.

It also allows the implementation of government-sponsored security recommendations from Security Enhanced Android (SEAndroid) to provide enhanced security policy controls through assured pipelines, so processes cannot be bypassed or hijacked by flawed or malicious applications.

The Motorola CRYPTR micro, a hardware security module in a microSD form factor that meets FIPS 140-2 Level 3 and Suite B standards, provides the AME 2000 with tamper protection for keys, tokens and certificates, and performs high-assurance cryptographic operations. AME 2000 is based on established technology including the MACE chip, which is CAPS certified, a key factor in the CESG certification process.

In addition, integrated mobile device management allows over-the-air (OTA) installation and updating of applications as well as device integrity verification. For further protection, encryption keys can be erased remotely on devices that are lost or compromised.

Colin Bendall, business development director, EMEA, Motorola Solutions, told Wireless: ‘There are many solutions to provide security for standard smartphones, but we believe there is nothing quite as secure as our solution. Motorola Solutions has built a platform that will create a truly global secure solution because it has the ability to comply with a variety of standards and guidelines established by governments around the world.

‘AME 2000 features a familiar Android-based OS experience and is an affordable mobile solution for government agencies to access secure information over the air. We believe AME 2000 will become the secure mobile solution of choice for governments across EMEA.’

Once the microSD card and app are installed, the user enters a PIN to access the phone and then a password, which allows him to use the phone for an encypted call or data exchange. The request goes to the Internet and creates the VPN tunnel (the certificates for the tunnel are stored on the tamper-proof microchip) to the AME server.

Once the IP tunnel is set up calls and data can be sent from one phone to another. The call is further encrypted by use of the AES 256 algorithm (the same as it used for TETRA and P25 radios) and is managed by the same network and the same encryption keys as would be used on a TETRA network.

Bendall emphasised that apps and information must come via the user organisations server where they can be checked and cleaned. ‘You can’t go to Google’s Android store and download an app. It must come from the secure server run by the organisation’s IT department. They know the apps are clean and send them out when requested. They are the same standard apps, however.’

Written by Wireless magazine
Wireless magazine

Leave a Comment