SlideShare a Scribd company logo
1 of 2
Download to read offline
Defense, Space & Security
Security, modularity
and productivity
delivered in one
trusted mobile device
Boeing Black
Smartphone
The Boeing Company
7700 Boston Blvd.
Springfield, VA 22153
www.boeing.com/black
black@boeing.com
Copyright © 2014 Boeing. All rights reserved.
Android is a trademark of Google Inc.
259625
The Challenge
The U.S. defense and security communities demand
trusted access to data to accomplish their missions.
Despite the continuous innovation in commercial mobile
technology, current devices are not designed from
inception with the security and flexibility needed to match
their evolving mission and enterprise environment.
Our Solution
The Boeing Black smartphone was designed with
security and modularity in mind to ensure our customers
can use the same smartphone across a range of
missions and configurations.
SECURITY + MODULARITY = PRODUCTIVITY
Through embedded hardware security features, software
policy configurations and physical modularity, Boeing
Black gives customers a trusted, more flexible and
productive solution.
SECURITY
Boeing Black’s security is powered by the Boeing
PureSecure architecture, which was designed from the
outset for the mobile environment. Our architectural
foundation is built upon layers of trust from embedded
hardware, operating system policy controls, and
compatibility with leading mobile device management
systems. The device’s hardware roots of trust and
trusted boot ensure the device starts in a trusted
state, enabling maximum security of data. Hardware
media encryption and configurable inhibit controls are
embedded to protect the device, its data, and the
transmission of information, significantly reducing the risk
of mission compromise due to data loss.
MODULARITY
Boeing Black provides unparalleled modularity and
integration with other mobile ecosystems based on
mission-specific requirements. Boeing Black’s flexibility
is enabled by a modular expansion port. The expansion
port can be used for integrating additional sensors or
technology enhancements like satellite connectivity or
expanding power capacity, plus other customizations.
The device also includes connections for portable digital
media interface (PDMI), universal serial bus (USB) and
secure digital (SD) cards.
PRODUCTIVITY
Boeing leveraged more than 100 years of combined
IT innovation experience from across the company to
deliver a trusted and highly productive mobile solution
for both the user and device administrator. Boeing
Black has a dual-SIM capability that enables users to
switch between government and commercial networks.
Boeing Black integrates seamlessly into customer
mobile device management systems and virtual private
networks. Running an operating system for AndroidTM
with enhanced software security policy configuration,
customers can configure the device for maximum mission
productivity and security.
Security, modularity and productivity delivered in one trusted mobile device
Boeing Black Smartphone
131.9 mm
67.6 mm13.25 mm
Product Specifications
•	Display: 4.3” qHD (540 x 960 pixels)
•	Weight: 170g
•	Battery: Lithium-Ion 1590 mAh
•	Dual SIM Supported Bands:
-	 LTE 700/1700/2100
-	 WCDMA 850/1900/2100
-	 GSM 850/900/1800/1900
•	Bluetooth v2.1 + EDR-enabled connectivity
•	Dual 1.2 GHz ARM Cortex-A9 CPUs
•	Storage: On-board + microSD
•	Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector
•	Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits,
Trusted Modules, and Configurable OS Security Policies

More Related Content

What's hot (7)

Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter Moves
 
Nokia microsoft alliance
Nokia microsoft allianceNokia microsoft alliance
Nokia microsoft alliance
 
Android viswapriya viswa 1
Android viswapriya viswa 1Android viswapriya viswa 1
Android viswapriya viswa 1
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developments
 
F2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileF2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobile
 
GlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux Foundation
 

Viewers also liked

Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
ukdpe
 
Decreto legislativo 20 febbraio 2009 n. 23
Decreto legislativo 20 febbraio 2009 n. 23Decreto legislativo 20 febbraio 2009 n. 23
Decreto legislativo 20 febbraio 2009 n. 23
Forum Nucleare Italiano
 
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
Forum Nucleare Italiano
 

Viewers also liked (9)

Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
 
Coches electricos 1
Coches electricos 1Coches electricos 1
Coches electricos 1
 
The SODA report - Volume 1 - 2014
The SODA report - Volume 1 - 2014The SODA report - Volume 1 - 2014
The SODA report - Volume 1 - 2014
 
Capitalistic Musings
Capitalistic MusingsCapitalistic Musings
Capitalistic Musings
 
Menu
MenuMenu
Menu
 
Decreto legislativo 20 febbraio 2009 n. 23
Decreto legislativo 20 febbraio 2009 n. 23Decreto legislativo 20 febbraio 2009 n. 23
Decreto legislativo 20 febbraio 2009 n. 23
 
Pharma R&D in a Value-based Healthcare System
Pharma R&D in a Value-based Healthcare SystemPharma R&D in a Value-based Healthcare System
Pharma R&D in a Value-based Healthcare System
 
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
Unione Europa – Direttiva 117/2006/Euratom Controllo spedizioni rifiuti radio...
 
Il nucleare in Italia. Una partita tutta da giocare
Il nucleare in Italia. Una partita tutta da giocare Il nucleare in Italia. Una partita tutta da giocare
Il nucleare in Italia. Una partita tutta da giocare
 

Similar to BlackBerry, Boeing to Develop Self-Destruct Mission Impossible Style Phone.

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
Cleophas Kipruto
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
BlackBerry
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businesses
Unified Communications Online
 

Similar to BlackBerry, Boeing to Develop Self-Destruct Mission Impossible Style Phone. (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Breaking down physical boundaries
Breaking down physical boundariesBreaking down physical boundaries
Breaking down physical boundaries
 
Bio Star 09 Biometric Authentication
Bio Star 09 Biometric AuthenticationBio Star 09 Biometric Authentication
Bio Star 09 Biometric Authentication
 
BlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry PRIV Brochure
BlackBerry PRIV Brochure
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businesses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
 

More from Waqas Amir

More from Waqas Amir (20)

Pakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillancePakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillance
 
Unpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US NavyUnpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US Navy
 
Government resources
Government resourcesGovernment resources
Government resources
 
Police can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules CourtPolice can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules Court
 
Boeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: ReportBoeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: Report
 
Big brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-webBig brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-web
 
Reserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgeryReserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgery
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Woman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hackWoman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hack
 
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyUs in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
 
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportChild Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
 
Sherman testimony
Sherman testimonySherman testimony
Sherman testimony
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2
 
Adiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technologyAdiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technology
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutes
 
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtStingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
 
FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.
 
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
 
Nsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwideNsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwide
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 

BlackBerry, Boeing to Develop Self-Destruct Mission Impossible Style Phone.

  • 1. Defense, Space & Security Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone
  • 2. The Boeing Company 7700 Boston Blvd. Springfield, VA 22153 www.boeing.com/black black@boeing.com Copyright © 2014 Boeing. All rights reserved. Android is a trademark of Google Inc. 259625 The Challenge The U.S. defense and security communities demand trusted access to data to accomplish their missions. Despite the continuous innovation in commercial mobile technology, current devices are not designed from inception with the security and flexibility needed to match their evolving mission and enterprise environment. Our Solution The Boeing Black smartphone was designed with security and modularity in mind to ensure our customers can use the same smartphone across a range of missions and configurations. SECURITY + MODULARITY = PRODUCTIVITY Through embedded hardware security features, software policy configurations and physical modularity, Boeing Black gives customers a trusted, more flexible and productive solution. SECURITY Boeing Black’s security is powered by the Boeing PureSecure architecture, which was designed from the outset for the mobile environment. Our architectural foundation is built upon layers of trust from embedded hardware, operating system policy controls, and compatibility with leading mobile device management systems. The device’s hardware roots of trust and trusted boot ensure the device starts in a trusted state, enabling maximum security of data. Hardware media encryption and configurable inhibit controls are embedded to protect the device, its data, and the transmission of information, significantly reducing the risk of mission compromise due to data loss. MODULARITY Boeing Black provides unparalleled modularity and integration with other mobile ecosystems based on mission-specific requirements. Boeing Black’s flexibility is enabled by a modular expansion port. The expansion port can be used for integrating additional sensors or technology enhancements like satellite connectivity or expanding power capacity, plus other customizations. The device also includes connections for portable digital media interface (PDMI), universal serial bus (USB) and secure digital (SD) cards. PRODUCTIVITY Boeing leveraged more than 100 years of combined IT innovation experience from across the company to deliver a trusted and highly productive mobile solution for both the user and device administrator. Boeing Black has a dual-SIM capability that enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks. Running an operating system for AndroidTM with enhanced software security policy configuration, customers can configure the device for maximum mission productivity and security. Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone 131.9 mm 67.6 mm13.25 mm Product Specifications • Display: 4.3” qHD (540 x 960 pixels) • Weight: 170g • Battery: Lithium-Ion 1590 mAh • Dual SIM Supported Bands: - LTE 700/1700/2100 - WCDMA 850/1900/2100 - GSM 850/900/1800/1900 • Bluetooth v2.1 + EDR-enabled connectivity • Dual 1.2 GHz ARM Cortex-A9 CPUs • Storage: On-board + microSD • Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector • Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits, Trusted Modules, and Configurable OS Security Policies