NEUTRALITY
IN SECURE COMMUNICATION

ARMA G1
AT Cyber security & Cloud expo North America 13-14 Nov 2019

“No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence”

Universal Declaration of Human Rights – Article 12
Proclaimed in 1948 by the United Nations

SMARTPHONES
PORTALS INTO OUR WORLD
SMARTPHONES
PORTALS INTO OUR WORLD

For our customers, critical communication ending up in the wrong hands can cause anything from financial damage to extortion and loss of life. Todays smart phones, including ultra secure models have in effect become portals into our worlds and pose a great risk.

Discover more

The problem

Regardless of the US $6 trillion worth of damage to the global economy annually by 2021 (2018 Cost of a Data Breach Study by Ponemon IBM), for those individuals the damage in many cases extends far beyond financial loss and ranges from blackmail and extortion to loss of live.

While travelling abroad, encountering different regimes, domestically, whether attending meetings that require the highest confidence or while exchanging the most critical strategy with your peers, most likely you will be accompanied by your trusty smartphone.

Any smartphone today, including the so called ultra secure models, are more than just an open book when it comes to security. Equipped with microphones more sensitive than the human ear, cameras, facial recognition, fingerprint readers and GPS they are able to collect just about anything from its users. Your identity, your location, the people you are with, who you regularly meet or have ever met, online communication, conversations, video, your biometric data and so on. It has become a portal into your world.

THE THREAT
STATE ACTORS AND TECH GIANTS

Common cybercriminals get a lot of attention, yet, it is the conglomerate of nation sponsored state actors and large tech companies that pose the biggest threat to private communication.

Discover more

The theatre of cyber

In order to come up with a suitable solution to this epic problem we needed to acknowledge the different actors in this global theatre of cyberwar.

Common cybercriminals are obviously a worldwide disaster. Exploiting ransomware, identity theft, hijacking smartphones for crypto mining to attacks on public infrastructure. 

More significantly followed up by the larger tech companies that are involved in severe breaches of privacy. Most notable is the chain of incidents involving the US National Security Agency (NSA). On June 2013 the NSA admitted monitoring the communication of US and global citizens on a massive scale through its PRISM program. Their accomplices? Apple, Google, Facebook and Microsoft. Through Android, iOS, Whatsapp and Skype, to name but a few, they are represented in the vast majority of worldwide mobile communication, “Ultra Secure Smartphones” included.

The involvement of state sponsored agencies is not just limited to the US. The Chinese have their Big Intelligence program, operated by its Ministry of Public Security and the Russians the Roskomnadzor program with its Deep Package Inspection.

In the Unites States, due to Julien Assanges’ Wikileaks and a diversity of whistleblowers like William Binney and Edward Snowden, the operations of the NSA have been well documented.

Its PRISM program and FASCIA (co-traveller) and Boundless Informant tools allow easy targeting, locating, monitoring and tapping into any specific individual that seems opportune, globally. You do not need to be a terrorist as was exposed in July 2015 when the NSA admitted the decades of spying on German chancellor Angela Merkel. The incident is not isolated though, a vast amount of US politicians including its own president Trump accused the NSA of spying on their communication.

Despite, it didn’t cause much disturbance in the worldwide collaboration with allied countries through the Five Eyes, Nine Eyes and Fourteen Eyes intelligence alliances.

STATE OF
CURRENT TECHNOLOGY
STATE OF
CURRENT TECHNOLOGY

So far unaddressed by any secure communication solution is the easy identification of any user on a network level and the centralisation of ones communication.

Discover more

Identify the problem

On July 2018, ARMA Instruments participated in the industry panel at Internet Society France, in Paris. In identifying the technical short comings in privacy, present academics and mobile industry representatives agreed on the following mayor short comings for both off the shelve as well as the industry’s most secure devices:

  • Network identity: Whatever you do on the hardware or software level, regardless of encryption, every device ultimately has a unique set of identifiers linked to a physical person. Even if the user is anonymous at first, adversary tools like Co-traveller will correlate devices that have a known subscriber such as other mobile devices, connected cars and IOT devices, revealing the individual’s true identity. This makes any one on the globe easy to find and target.
  • Server infrastructure: In current solutions, servers that route data and communications are company owned. All communication data is locally stored and vulnerable to any type of security breach or malicious attack over the network or physical.
A FRESH PERSPECTIVE
ON THE PLAY FIELD

Current technologies are focussed on convenience and are no technological match for the current threat level. 

A secure device can only be as secure as the good intentions of its developers and the political climate it was conceived in.

Current secure mobile products are in all cases based on technology developed by companies and states, that ultimately are responsible for the threat to begin with. 

NEUTRAL COMPANY
THE RIGHT INTENT
NEUTRAL COMPANY
THE RIGHT INTENT

We established a politically neutral basis to enable us to develop backdoor-free communication devices in Switzerland. Our transparency center invites all our customers to come and investigate our source code, updates, operations- and threat intelligence center. We are open to third party auditing and invited no less than 85 privacy advocating groups to an open discussion how to ultimately maximise transparency.

Discover more

Our vision

ARMA Instruments AG, an acronym to Advanced Relay Mission Applications was founded early 2017 in Baar, Switzerland.

Lead by our vision of political neutrality and set up to rule out any possible interference by governments, investors and other forces that could push for backdoors in products and pose a risk to our independence.

Switzerland, being the most functional democracy on the globe through its system of referenda and its civil army has literary distributed its military power amongst the people. Switzerland has a long and strong history of neutrality and a strong data protection legislation.

Its Intelligence Service of the Federation or FIS is under strict governance of the people and as such not part of the Five Eyes, Seven Eyes or Fourteen Eyes Intelligence Alliances.

Our board is represented by international entrepreneurs, ethical hackers, cyber security experts and privacy activists and span a variety of nations including Switzerland, Ukraine, United States, Russia and The Netherlands.

Shares are privately held and we have no affiliations, agreements or obligations to any national government, related entities or any politically engaged organisation, securing our neutrality and integrity.

We operate a transparency center that invites all our customers to come and investigate our source code, updates, operations- and threat intelligence center. We are open to third party auditing and citizen witness based fabrication and for these reasons have good communications with privacy advocating groups worldwide.

THE ARMA G1
SECURE COMMUNICATOR

A mobile personal communicator based on the ARMA Linux operating system, using the cellular network. Build on a zero trust approach from hard- en software to manufacturing within our secure facility.

ARMA G1 features an absolute minimalistic hardware design to exclude any type of attack and facilitates communication by text only. Can be made operable for communication inside bunkers, onboard ships and airplanes, it has our patented Dynamic Identity, does not rely on a dedicated server infrastructure and matches national TOP SECRET classifications.

Discover more

The ARMA G1 Secure Communicator

Dynamic Identity is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number 16/433,768.

Serverless Infrastructure is the first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

Dynamic Identity is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number 16/433,768.

Serverless Infrastructure is the first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

Controlled ecosystem
ARMA is both developer and manufacturer of its products, excluding supply chain attacks.

Non-extractable keys

Isolated cellular modem
Modem is isolated from the device’s main computing core and has no direct memory access.

Controlled execution environment
Trusted boot and firmware updates and cryptographic verification of the boot image integrity.

Microservice architecture
Individual software components are isolated using operating system containers and are run on a “need to know basis”.

Passports
Multiple identities are possible on a single device being totally independent.

Zero inbox
We promote a zero inbox principle to be able to conveniently use the device. 
By default all communicated information is set to expire soon and typically there is no message archive on the device.

Self destruct
All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.

TEMPEST resistant
Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.

General specifications

  • Operating system Linux based ARMA OS
  • Dimensions length x width x height (mm) – 115 x 72 x 9
  • Weight (g) – 200 grams
  • Battery capacity (mAh) – 4000
  • Tactical rotary encoder – Isolated from the main case using magnetics
  • Composition – Stainless steel and advanced ceramics
  • Wireless charging
  • Dust and water resistant Rated IP67 (maximum depth of 1 meter up to 30 minutes) under IEC standard 60529

Hardware specifications

  • Main circuit board – ARMA Instruments proprietary
  • Processor – Arm iMX7
  • Baseband processor – Quectel Qualcomm BG96 / U-blox SARA-N4
  • RAM – 1 GB
  • Internal storage – 8 GB
  • Display – AMOLED 3.81 (inches) 1020×1200 pixels

Connectivity

  • Cellular
  • SIM-less operation

Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

Industry-first technologies

Dynamic Identity is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number 16/433,768.

Serverless Infrastructure is the first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

All features

Dynamic Identity is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number 16/433,768.

Serverless Infrastructure is the first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

Controlled ecosystem
ARMA is both developer and manufacturer of its products, excluding supply chain attacks.

Non-extractable keys

Isolated cellular modem
Modem is isolated from the device’s main computing core and has no direct memory access.

Controlled execution environment
Trusted boot and firmware updates and cryptographic verification of the boot image integrity.

Microservice architecture
Individual software components are isolated using operating system containers and are run on a “need to know basis”.

Passports
Multiple identities are possible on a single device being totally independent.

Zero inbox
We promote a zero inbox principle to be able to conveniently use the device. 
By default all communicated information is set to expire soon and typically there is no message archive on the device.

Self destruct
All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.

TEMPEST resistant
Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.

G1 specifications

General specifications

  • Operating system Linux based ARMA OS
  • Dimensions length x width x height (mm) – 115 x 72 x 9
  • Weight (g) – 200 grams
  • Battery capacity (mAh) – 4000
  • Tactical rotary encoder – Isolated from the main case using magnetics
  • Composition – Stainless steel and advanced ceramics
  • Wireless charging
  • Dust and water resistant Rated IP67 (maximum depth of 1 meter up to 30 minutes) under IEC standard 60529

Hardware specifications

  • Main circuit board – ARMA Instruments proprietary
  • Processor – Arm iMX7
  • Baseband processor – Quectel Qualcomm BG96 / U-blox SARA-N4
  • RAM – 1 GB
  • Internal storage – 8 GB
  • Display – AMOLED 3.81 (inches) 1020×1200 pixels

Connectivity

  • Cellular
  • SIM-less operation

Our services

Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

The latest news

Strategic Partnership DDB Unlimited

ARMA Instruments announces a strategic partnership with DDB Unlimited, the multi-award winning branding agency. Together we will develop an impactful worldwide marketing campaign.DDB Unlimited works…