Re: Indian Army developed secure OS Obviously the army needs secure communication and just about all forces in the world have various systems and ways of doing so.
I have been involved in secure mobile communication and call/data interception capabilities since the early 90s.
The notion that 5G is open to eavesdropping is a bit of a misnomer.
5G is encrypted too. In fact from 2G onwards it has been encryptic. Both voice and data. Contrary to popular belief it is incredibly difficult to not only crack the code, but intercept a specific call.
To the best of my knowledge it has not been done, despite many claims to the contrary.
All of the high profile cases around call interception and eavesdropping (e.g. Prince Harry against the Uk media), was not about journalist having the technical ability to trace or intercept Harry’s calls from his mobile device.
If there is one thing I have learned in all of those years, studying endless cases, the weakest link in in secure communication is always the human, not the technology. People, even those that should know better, are careless, leave a password, are, literally, overheard, leave documents behind, leave their device behind without password etc etc.
Almost all 2G-5G networks have the ability to intercept, trace and record voice and data calls. It has been past of the standard since 2G. It allows the telecom carrier to comply with local interception rules and regulations.
Carriers usually have a department that deals with these interceptions and traces, dedicated security vetted staff. How this department is set up, how they interact with the respective law enforcement agencies is extremely important as it tends to be the weakest link in the system.
Jeroen |