NSA builds Android phone for top secret calls

Powered by SC Magazine
 

Blueprints released to public.

The National Security Agency (NSA) has developed an ultra-secure Android phone built using off-the-shelf kit that allows US Government staff to discuss top secret materials.

About 100 of the Fishbowl phones were developed and released to government staff. They were designed to comply with the NSA’s tough information security rules yet be as cheap as possible and easy to use. 

Margaret Salter

The phones were designed and built by the NSA’s 40 year-old Information Assurance Directorate, which is responsible for providing secure communications to the US Government, including the Department of Defence.

The division’s head, Margaret Salter, said anyone can reproduce the phone using specifications published online today because it uses off-the-shelf components.

“The plan was to buy commercial components, layer them together and get a secure solution,” Salter said. “It uses solely commercial infrastructure to protect classified data.”

Salter said she would previously need to “speak in code” if using a commercial mobile device to discuss classified information.

Users will be able to install defence applications on the device from an enterprise app store run by the US Defence Information Systems Agency. This would ensure only secure applications were installed, and remove the need for NSA staff to otherwise vet the integrity of third party applications.

The phone is part of a wider NSA Mobility Program to design all communications technologies used for classified discussions from commercial off-the-shelf components.

The aim, Salter said, was to produce secure devices that had the ease-of-use at a low cost.

Tech troubles

The Information Assurance Directorate ran into a string of problems during the build due to a lack of interoperability between vendor products.

Salter said a lack of interoperability between SSL VPN options forced designers to use IPSEC.

Several other compromises were made but none that reduced the security of the phone, Salter said.

“We needed a voice app that did DTLS (Datagram Transport Layer Security), Suite B and SRTP (Secure Real-time Transport Protocol) and we couldn’t buy it,” Salter said. “But the industry was thinking more about session description … so we went with that.”

 

Fishbowl encryption

Designers were also challenged by the functionality in commercial products. Vendors were chosen not by reputation or preference, but by their support of required functionality. Each was plotted on a grid and chosen by “drawing a line through the list”.

Salter said the security specifications, such as those sought for the voice application, would be useful to everyone.

She urged colleagues to demand vendors improve unified communications interoperability.

“We need to send a message [about] standards, interoperability and plug and play," she said.

All traffic from the phone is routed through the enterprise as a primary security design goal.

“If we let it go to all kinds of places, we lost control of figuring out what the phone was doing. If I want pizza, I have to go through the enterprise which has to route me to Pizza Hut.”

Voice calls are encrypted twice in accordance with NSA policy, using IPSEC and SRTP, meaning a failure requires “two independent bad things to happen,” Salter said.

She said the Android operating system and key store were customised to be made secure enough for top secret conversations, and a “kind of police app” was designed to monitor operations on the device.

Copyright © SC Magazine, Australia


NSA builds Android phone for top secret calls
 
 
 
Top Stories
Slow progress in Turnbullistan
[Blog post] How has the NBN moved ahead since regime change?
 
Hacks and frauds can't dampen Bitcoin buzz
[Blog post] Enthusiasts meet in Melbourne.
 
Qantas checks in with cloud computing
Impressed with results of public cloud bake-off.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Have a phone, tablet and laptop?
Jun 20, 2014
This new Telstra pre-paid 4G mobile hotspot might be useful if you regularly need to use fast ...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 545

Vote