Create a free Manufacturing.net account to continue

Boeing Developing A Self-Destructing Spy Phone

A company best-known for developing a healthy share of the aircraft civilians use to jet around the globe, and military pilots use to blaze toward their objectives, is now developing an Android-based smartphone that will self-destruct if a third party attempts to break in and extract its secrets.

A company best-known for developing a healthy share of the aircraft civilians use to jet around the globe, and military pilots use to blaze toward their objectives, is now developing an Android-based smartphone that will self-destruct if a third party attempts to break in and extract its secrets.

According to Quartz, the company has been developing this phone for more than two years, but only this week filed paperwork with the FCC to have it approved for actual use.

The phone, codenamed “Black,” comes with all the features that savvy consumers are demanding as well, such as support for all the wireless spectrums used globally (GSM, LTE, and WCDMA), plus some wireless technologies like Wi-Fi and Bluetooth.

In the FCC filing, the company writes, “Boeing has developed its Black phone primarily by governmental agencies and their contractors to ensure that data and voice communications undertaken by their respective employees are transmitted and stored in a highly secure manner.”

Whether the company is developing this device for its own use is not yet clear, although would be assumed, considering it certainly falls under the label of a “contractor” to the U.S. government. There is little doubt that Boeing has a great deal of intellectual property that follows engineers and executives alike as they move between work from home, or in travel. A smartphone such as this could better protect their IP against targeted thefts or attacks.

What happens, then, when a nefarious agent tries to get to the data locked away inside? In the filings, Boeing wrote: “The Boeing Black phone is manufactured as a sealed device both with epoxy around the casing and with screws, the heads of which are covered with tamper proof covering to identify attempted disassembly. Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable.”

More