Boeing, BlackBerry working on a smartphone that would 'self-destruct'

It sounds like something out of old spy movies, but it isn't.

It seems like something out of an old episode of Mission Impossible or Inspector Gadget--an ultra-secure phone that self destructs. But such a phone might be close to reality, courtesy of Boeing and BlackBerry.

According to Reuters (via Recode), Boeing and BlackBerry are currently jointly developing a super-secure smartphone geared toward governments and other groups or individuals who require high security standards. And if someone goes and tampers with the device, it'll render itself inoperable.

We're not talking about something that burns itself or explodes or anything like that, though; instead, Slashgear says that "all data will be erased" from the phone "if the tamper-proof casing is taken apart." So it's not as dramatic as, say, something from spy movies, but it certainly sounds effective.

We don't yet know when this phone will be available, but Reuters says that "Boeing has begun offering the phone to potential customers."

Why this matters: It should go without saying, but smartphone security is kind of a big deal, and smartphone owners have countless options for keeping their data safe. iPhone owners have the Touch ID fingerprint sensor and Apple's Find My iPhone location and data security services at their disposal, for example, and Android users can sign up for one of countless phone security services.

Although Boeing and BlackBerry designed its phone with governments in mind, it doesn't seem unreasonable to expect smartphone makers to try and bring similar "self-destruct" security mechanisms to consumer-level devices.

Even more security measures

Of course, the self-destruct mechanism isn't all this phone offers: According to Recode, the phone will also work with biometric sensors and be able to connect to satellites, presumably for secure lines of communication. It'll also use BlackBerry Enterprise Service 12, a phone management and security platform for use in businesses, and come with dual SIM cards so it can connect to a wider array of wireless networks.

Join the CSO newsletter!

Error: Please check your email address.

Tags boeingconsumer electronicsReuterssecuritysmartphonesPhonesencryptionbiometric securityBlackberryApple

More about AppleBlackBerry

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Nick Mediati

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts