NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages.

No surprise: it doesn’t work quite like the one in your pocket.

Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

One of the recipients is Cyber Command chief Adm. Michael Rogers, said DISA head Lt. Gen. Alan Lynn. That’s not to say that everyone in the military can expect to receive one. “The Boeing Black is the device we’re currently working with,” Lynn said. “We’re just now in the test phase,” he said.

That the military has been working on such a device is no secret. A lot of device manufactures have been eager to meet rising military needs for secure communication. One contender, Silent Circle, co-founded by encryption guru Philip Zimmerman and former Navy Seal Mike Janke, has managed to push a few units into the hands of some military for testing and recreational use.

Lynn said the Boeing Black phone also works with “a large amount of encryption.” But the encryption alone is not what makes the device so secure. “There’s nothing that lives on the devices,” said Lynn. “It’s close to a VDI,” a virtual desktop infrastructure.

What that means is that the most secure phone in the world is, in the purest sense, just a window to another computer, a remote server on the military’s Top Secret JWICS network. That server does all the real work and holds the data. The phone itself just moves input commands, keyboard, mouse, and other signals, to that server. The result, said Lynn: “We’re not too worried about losing data,” at least not off the phone.

But does Rogers like the phone? Lynn said, “I think he does. Haven’t heard any complaints.”

DefenseOne:      Blackphone: Privacy-obsessed Smartphone:     North Korean Leader Has His Own Cellular Network:

 

« Could You Be A UK Cyber-Warrior?
Welcome To A World Without Work (W3) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.