NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages.

No surprise: it doesn’t work quite like the one in your pocket.

Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

One of the recipients is Cyber Command chief Adm. Michael Rogers, said DISA head Lt. Gen. Alan Lynn. That’s not to say that everyone in the military can expect to receive one. “The Boeing Black is the device we’re currently working with,” Lynn said. “We’re just now in the test phase,” he said.

That the military has been working on such a device is no secret. A lot of device manufactures have been eager to meet rising military needs for secure communication. One contender, Silent Circle, co-founded by encryption guru Philip Zimmerman and former Navy Seal Mike Janke, has managed to push a few units into the hands of some military for testing and recreational use.

Lynn said the Boeing Black phone also works with “a large amount of encryption.” But the encryption alone is not what makes the device so secure. “There’s nothing that lives on the devices,” said Lynn. “It’s close to a VDI,” a virtual desktop infrastructure.

What that means is that the most secure phone in the world is, in the purest sense, just a window to another computer, a remote server on the military’s Top Secret JWICS network. That server does all the real work and holds the data. The phone itself just moves input commands, keyboard, mouse, and other signals, to that server. The result, said Lynn: “We’re not too worried about losing data,” at least not off the phone.

But does Rogers like the phone? Lynn said, “I think he does. Haven’t heard any complaints.”

DefenseOne:      Blackphone: Privacy-obsessed Smartphone:     North Korean Leader Has His Own Cellular Network:

 

« Could You Be A UK Cyber-Warrior?
Welcome To A World Without Work (W3) »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

CyberKinetics

CyberKinetics

CyberKinetics specializes in cloud-based services and solutions for federal agencies and commercial clients with compliance mandates.

Team Burkhart

Team Burkhart

Team Burkhart, a proud member of the Apple Consultant Network, is a leader in managed IT and security services, serving clients across the Midwest and beyond.