NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages.

No surprise: it doesn’t work quite like the one in your pocket.

Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

One of the recipients is Cyber Command chief Adm. Michael Rogers, said DISA head Lt. Gen. Alan Lynn. That’s not to say that everyone in the military can expect to receive one. “The Boeing Black is the device we’re currently working with,” Lynn said. “We’re just now in the test phase,” he said.

That the military has been working on such a device is no secret. A lot of device manufactures have been eager to meet rising military needs for secure communication. One contender, Silent Circle, co-founded by encryption guru Philip Zimmerman and former Navy Seal Mike Janke, has managed to push a few units into the hands of some military for testing and recreational use.

Lynn said the Boeing Black phone also works with “a large amount of encryption.” But the encryption alone is not what makes the device so secure. “There’s nothing that lives on the devices,” said Lynn. “It’s close to a VDI,” a virtual desktop infrastructure.

What that means is that the most secure phone in the world is, in the purest sense, just a window to another computer, a remote server on the military’s Top Secret JWICS network. That server does all the real work and holds the data. The phone itself just moves input commands, keyboard, mouse, and other signals, to that server. The result, said Lynn: “We’re not too worried about losing data,” at least not off the phone.

But does Rogers like the phone? Lynn said, “I think he does. Haven’t heard any complaints.”

DefenseOne:      Blackphone: Privacy-obsessed Smartphone:     North Korean Leader Has His Own Cellular Network:

 

« Could You Be A UK Cyber-Warrior?
Welcome To A World Without Work (W3) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.