Safeguarding the sensitive and classified information of military and government personnel in a mobile environment.

Situation Summary: Military and government personnel are targeted


  1. Generally accepted as high-value targets given roles, responsibilities and the knowledge/information they posses.
  2. Face the most sophisticated, capable, well-funded and determined attackers. It is the dedicated focus of other nation states, including allies to gather this information
  3. Many examples, including:

The Problem: Smartphones are inherently insecure


  1. Long supply chain: Many components come from and assembly is often performed in Asia, which carries risks for US government, military and business users.
  2. Large attack surface
    • Browser: Capable of accessing the entire internet, including malicious sites
    • App development environment platform: Previously compromised/attacked. Millions of apps with risk from both the malicious as well as the legitimate (that over-reach in their data collection).
    • General-purpose operating system: Supporting many features, functions and services, all of which can be attacked
    • Android: Highly fragmented marketplace, resulting in poor software hygiene/updates/security.
  3. Getting into your phone is a highly profitable business:
    • Crack Apple iOS, access some of the most sensitive info for 500-million+ users.
    • "Battle Heats Up Over Exports of Surveillance Technology"
      "The interception industry is growing rapidly, with worldwide sales estimated to reach $1.3 billion by 2019, according to Markets and Markets, a research firm." —NY Times, October 31, 2015
  4. Sophisticated, well-funded and determined attackers:
  5. Smartphone security software does not solve the problem. Security at any level loses to attacks at a lower level (i.e. apps lose to operating system lose to firmware lose to chip) and the entire stack has been proven to be compromised.

Intelligence gathered by smartphones can be extremely sensitive/damaging.


  1. People have sensitive conversations outside of a SCIF. Confidential information will come out in normal conversations with people they trust.
  2. Audio eavesdropping can reveal strategies, plans, deployments, etc.
  3. Cameras can reveal sensitive info (i.e., inside of nuclear submarines, classified facilities, locations, relationships, etc.)
    • "US Navy sailor gets year in prison for taking photos inside nuclear sub"
      "The photographs show the ship's entire reactor-powered propulsion system and reveal, in close-up, key design elements. The images are said to show the ship's location when they were taken, and a console indicating maximum dive depth, a closely guarded secret." —Chicago Tribune, August 20, 2016
  4. RF emissions can reveal troop stationing and movements, ship locations, meetings, individual movements, habits and relationships/associations (opening people for compromise or targeting), building or base layouts, etc.

Privoro Privacy Guard: Overview


  1. Prevent smartphone from being used as a surveillance device, even if it has been hacked.
    • All 4 sensitive microphones on the phone are independently and securely jammed.
    • Both front and back cameras are covered.
  2. Selectively prevent location tracking or attacks via the RF layer:
    • Applying cover creates a high-performance Faraday Cage around the phone.
      • The phone's RF footprint/emissions are massively reduced (or essentially eliminated from detection).
      • The ability of external signals (cell tower transmissions, etc.) are similarly reduced/eliminated.
  3. Easy to use
    • Raise or lower the hood to activate/deactivate audio and video protections.
  4. Air-gapped, hardened platform: Airgap prevents remote access to Case's chips/firmware. Tamper resistance restricts access to internal components and helps make tampering visible/evident
Apache Helicopters

Military awareness of mobile surveillance is increasing


  1. "Army says smartphone, digital tech increase vulnerability"
    "… the Army fears that its massive electronic footprint is becoming a major vulnerability that could leave troops more exposed and open to detection. Electronic signals emitted by U.S. forces make it easier for tech-savvy enemies to keep tabs on units' locations and movements. The spying tools are relatively cheap and ubiquitous: iPhones, Goggle maps, commercial tracking software. "It's an unbounded battle space," said Lt. Gen. Robert Ashley Jr., Army deputy chief of staff for intelligence. The idea that anywhere the Army goes there might be people out there "pushing pictures" fundamentally undermines "our ability to have operational security." —Defense Systems, May 9, 2017
  2. "General: Marines, put down those cell phones!"
    "Neller said the Marines and Navy had seen exercises in which their personnel's use of mobile devices could give away positions to adversaries. "What do you think the largest electromagnetic signature in the entire MEF headquarters emanated from? The billeting area. Why? Because everybody had their phone on. The Navy has come up with plans to reduce its reliance on modern electronics to make its force harder to trace, going so far as to have sailors re-learn navigating by the stars instead of using the Global Positioning System, he said." —CNN, August 11, 2016
  3. "NATO, allies in major drill at Estonia cyber range to ward off malware, infected devices" — U.S.News & World Report, November 2015
  4. "China's military bans Apple Watch"
    "The Asian power's military has banned the smartwatch and other wearable technology over cybersecurity concerns that the devices could be used to track troops, record audio and video and capture military secrets." —The Hill, May 2015

Military and government personnel have highest need for protection


  1. Senior officers, at a minimum, should have the Privoro Case on their phone to protect against the risk of audio and video surveillance.
  2. Personnel who discuss and disseminate sensitive information should have the Privoro Case on their phone to prevent the compromise of operational security (e.g., talking to wife about where they are going).
  3. Any individual whose device can emit an RF signature that can be detected to reveal troop or asset location should have the Privacy Guard Case and Cover to selectively reduce their RF emissions from being detected.

Resources

Thermal Safety FAQ

Mobile Espionage [Whitepaper]

Thermal Safety FAQ

Privacy Guard Thermal Safety FAQ [Spec Sheet]

DoD Brief

Privoro DoD Brief

Your cart

Total
USD
I agree to the Terms & Conditions.
Shipping is calculated at checkout.