network coverage, or unusual
cell site configurations.
The Baseband Firewall is con-
figured to err on the side of
caution and rather reset the
baseband more frequently than
overlook an attack and expose
the CryptoPhone to risks.
You can configure the Baseband
Firewall’s sensitivity, logging
and rebooting options directly
from the Baseband Firewall
screen by pressing the menu
button and then selecting
“Preferences”.
In the Baseband Firewall’s pref-
erences menu you also have the
option to send a log file con-
taining all detected suspicious
events to GSMK for analysis by
email.
Note that this requires your
CryptoPhone to be in Basic or
Medium Security level (
see
sec
-
tions
1
and
14
).
Upon first start, an on-screen
tutorial will explain the usage
and functions of the Baseband
Firewall.