This document will present an attack surface analysis of the BlackBerry device; this analysis will include a high-level review of architecture and related application attack scenarios. This research will distinguish what can be done with signed versus unsigned code throughout the document. All observations are based on a default retail configuration unless otherwise stated.