Some civil servants in Shanghai switched to domestic encrypted mobile phones to avoid information leakage.

(Original title: Many civil servants in Shanghai switched to domestic encrypted mobile phones)

There is a special instruction in the background. Once the mobile phone falls into the hands of others, it will be linked with the special instruction when it is turned on again, and all the information in it will be automatically deleted, and the mobile phone will instantly become a "waste". This scene in the movie "007" made many people familiar with encrypted mobile phones. The reporter was informed that due to the information loopholes frequently exposed by Apple’s mobile phones recently, many civil servants in Shanghai began to replace domestic encrypted mobile phones to avoid the risk of information leakage.

It used to be cold, but recently it suddenly caught fire.

"Keeping secrets is no small matter." In mid-July, Wu Qixian (pseudonym), a civil servant, stopped using ordinary smart phones and replaced them with a domestic encrypted mobile phone. Prudent by nature, he explained that because of his work, he often comes into contact with some internal government documents and sensitive data in the economic field. "If my mobile phone is eavesdropped, or the memory data can be stolen through the background, once it is used by some lawless elements, it may leak, and the other party can even spy on the changes and policy trends within the government to formulate countermeasures."

The reporter was informed that since last month, there are not a few people in the civil service who changed into encrypted mobile phones like Wu Qixian. "At least two days a week, I run in the government department. The business is much busier than before." A senior person in the mobile phone industry said, "Many civil servants are familiar with Apple and Samsung mobile phones, and domestic mobile phones are rarely used. Now it is mainly to provide after-sales service to those civil servants who have changed their encrypted mobile phones, such as guiding the original address book to the new mobile phone, and then teaching them how to set their own encryption functions and privacy functions on the mobile phone. "

According to the source, they also sold encrypted mobile phones to government departments a few years ago, except for a batch used by the police during the 2010 World Expo, but the overall effect was not satisfactory. "Most civil servants buy their own mobile phones at will, and government departments subsidize certain communication fees. Many people don’t realize that mobile phones may be eavesdropped." From the recent beginning, government departments have been ordering. "If Shanghai doesn’t have it, it will be transferred from Shenzhen, and at least 500 to 1000 units will be transferred each time."

Vendors began to pay attention to the encryption market.

The reporter learned that due to technical constraints, among the three major operators, only China Telecom can provide encrypted communication service at present, because this service can only be based on CDMA technology. As early as 2010, China Telecom’s encrypted mobile phone system obtained the "Product Model Certificate of Commercial Cryptography" issued by the State Administration of Commercial Cryptography, which realized the whole encryption of mobile phone calls.

Yesterday, the reporter saw on the website of the National Commercial Password Management Office that there were 22 encrypted mobile phones with this function in the "Catalogue of China Telecom SJT1001 Encrypted Mobile Phone System Voice Encryption Terminal Products with Password Detection", involving several domestic mobile phone brands such as Coolpad, Huawei and Hisense. Among them, Huawei has one model and Hisense has three models, but the product certificate numbers have expired. These two brands of encrypted mobile phones have also been basically delisted, and no new products have been launched since then. Coolpad has the most types of encrypted mobile phones, pushing 18 models before and after, and is the only mobile phone manufacturer cooperating with telecom.

The encrypted mobile phone recently replaced by Shanghai civil servants is the telecom version of Coolpad S6, which is also the first 4G mobile phone in China that has passed encryption certification, and each one costs 1990 yuan. Coolpad said that there is another high-end encrypted mobile phone with a price of 3,980 yuan. The customer base is business people and business owners. "It can be used to prevent trade secrets from being eavesdropped." At present, the sales of these two encrypted mobile phones are good.

The popularity of Coolpad also makes competitors jealous. The person in charge of Huawei’s mobile phone market in Shanghai said that the new situation in the Shanghai market has been fed back to the headquarters, and a new version of encrypted mobile phones is also under development.

[Decrypt the telecom encrypted mobile phone]

1. What’s so special about the function?

The call is encrypted, but it has to be an encrypted mobile phone.

Mr. Ji is an office worker. Last week, he just received an encrypted mobile phone issued by his unit. This mobile phone is six inches in size and looks like an ordinary mobile phone from the outside.

Only when you make a phone call does it show a unique encryption function. Every time you make a call, there is a red encryption key on the screen besides the green dialing key that ordinary mobile phones also have. Click it to enter the encrypted call mode. When there is an encrypted call, a red prompt button will pop up on the screen of the mobile phone, with the word "encrypted" in it. Click it to enter the encrypted call mode. "If you feel that the content of the call is sensitive during the ordinary call, you can also switch to encryption mode, and it will be transferred in about 1 second."

After a few days of use, Mr. Ji felt that the call effect was good. "The encryption function can only be used between two encrypted mobile phones. If you call family and friends, the call will not be affected."

2. Does the hardware have a "key"?

An encryption/decryption module is added behind the telephone microphone.

The appearance of encrypted mobile phone is the same as that of ordinary mobile phone, but the subtle difference is that an encryption/decryption module is added behind the vocoder, that is, the call microphone on the screen of the mobile phone. Every time you make a call, there is a red encryption key on the screen besides the green dialing key. This encryption key is connected with the internal information center of China Telecom Group. The system will verify the SIM card number, mobile phone number and unique body verification code. Only after all three information are met, will a "key" similar to the verification code be issued, and then the calling and called functions will be carried out.

The whole verification operation process only takes 1 to 2 seconds, and the encryption algorithm ensures that the encryption password of each call is different, realizing "one word and one secret".

3. How to prevent eavesdropping?

The mobile phone network also has four "barriers"

According to relevant personnel of Shanghai Telecom, encrypted mobile phones have unique advantages in network security settings. The first is spread spectrum technology, which modulates the signal with spread spectrum coding, hides the user’s mobile phone signal, hides useful information in radio noise, and eavesdroppers only hear noise. The second is the pseudo-random code technology, which quickly switches the power control in the call. Even if the eavesdropper captures the signal of the user’s mobile phone, it can’t lock the signal code of the telecom. Moreover, the pseudo-random code technology can make every call have 4.4 trillion possible coding methods, which makes it impossible for eavesdroppers to decipher. The third is the special technology of fast power control. Even if it is eavesdropped, the transmitting power of its mobile phone changes rapidly and the other party cannot lock it. In addition, China Telecom also has its own unique mobile phone encryption system, which has been customized on both the mobile phone side and the network side through the "Model Certificate of Commercial Cryptography Product" issued by the State Administration of Commercial Cryptography.

According to relevant personnel of Shanghai Telecom, these four "barriers" are used at the same time on encrypted mobile phones. With multiple "security locks", the security of communication technology can be ensured.

4. What should I do if I drop my mobile phone?

Telecom can initiate remote deletion instruction.

If the encrypted mobile phone is accidentally lost, you don’t have to worry about the information stored in the mobile phone being leaked. You can contact the telecom immediately, and the staff will start the remote deletion instruction of China Telecom. As long as the mobile phone is turned on again, all the information in it will be automatically deleted. "The memory information of many smart phones can be seen in the background or on the’ cloud storage’ side; However, the contents of the telecom encrypted mobile phone cannot be known or cracked by the telecom itself, and only the deletion instruction can be provided. " Shanghai Telecom staff stressed.