{"id":1044575,"date":"2012-03-06T07:17:11","date_gmt":"2012-03-06T07:17:11","guid":{"rendered":"http:\/\/www.immortalitymedicine.tv\/uncategorized\/anatomy-of-a-government-phone-or-can-the-nsa-build-an-android.php"},"modified":"2024-08-17T17:14:34","modified_gmt":"2024-08-17T21:14:34","slug":"anatomy-of-a-government-phone-or-can-the-nsa-build-an-android-2","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-a-government-phone-or-can-the-nsa-build-an-android-2.php","title":{"rendered":"Anatomy of a Government Phone, or, Can the NSA Build an Android?"},"content":{"rendered":"<p><p>    The craziest    thing about a typical \"top secret\" U.S. Government phone is    that you can probably spot it from a football field away. If    your mental picture of a Hollywood-style NSA agent drives a    black AMC Ambassador, wears a polyester suit and Ray-Bans, and    smokes Luckies, then his phone may either be Maxwell Smart's    shoe or a General Dynamics Sectera Edge (pictured left). At any    distance, it looks like one of the pocket football games my    junior high school vice principal used to confiscate and    collect in his back drawer.  <\/p>\n<p>    The National Security Agency wants a real-world smartphone, not    the one it has now - not the one you see here. Of course, it    must fulfill the Dept. of Defense's requirements for session    encryption and data retention. But beyond that fact, the NSA    wonders why its secure phone can't have multitouch, apps, and    speed just like the civilians have. Based on looks alone, you'd    think the civilians are a couple of pegs ahead of the G-men.    This is a story of looks being more deceptive than even a    security agency could have anticipated.  <\/p>\n<\/p>\n<p>    The real face of the National Security Agency looks more like    Margaret Salter. At the RSA Conference in San Francisco last    Wednesday, Salter told attendees the story of the NSA's Secure    Mobility Strategy. She leads a department called the    Information Assurance Directorate. For the better part of four    decades, IAD has been tasked with securing secret government    communications, and building specifications for the tools to do    it. The NSA contracts with private suppliers to build a class    of devices it calls GOTS (government off-the-shelf). The    gestation cycle for each of these devices - from the conceptual    stage, to development, to deployment - typically consumes    years. Perhaps the best-known GOTS product is still in wide use    today - 1987's STU-III secure    telephone, which looks about as home on an agent's desk    today as an IBM PC.  <\/p>\n<p>    Still, as Salter told the RSA attendees, for the better part of    half a century, the NSA explicitly defined its own market, a    private universe of products made for its own exclusive    consumption. \"That was cool for us, for the longest time. We    kinda had a monopoly on this from the very beginning,\" she    remarked. \"We were mostly building things like radios for    combat, [and] big link encryptors to hook one site up to    another site.\"  <\/p>\n<p>    But their ease of use ranked right up there with a World War II    cipher machine. \"Once you get something in the hands of an    individual user who's not a cleared COMSEC custodian, someone    who knows what they're supposed to be doing with this stuff and    understands all the details, ease of use became incredibly    freakin' important. And it turned out that, although our stuff    was incredibly secure, it was not incredibly easy to use.\"  <\/p>\n<p>    Over time, it became more difficult over time for the agency to    define \"ease of use\" on a comparative scale. In just the last    five years, the consumer universe appeared to leave the NSA's    secure market behind. \"The world everyone wants is, I want to    get what I want, when I want it, where I want it.\"  <\/p>\n<p>    Salter's team considered whether it was feasible for NSA to    utilize a real, commercial smartphone - one like all the kids    are using nowadays - but with software that made the device    perhaps more secure than the Sectera Edge. \"The phones are so    popular and exploding all over the place, because we can play    Angry Birds on them, and do whatever you want. But we needed    enterprise management - some control over it, because honestly,    we didn't really want you to be able to go load Angry Birds on    your TS [top secret] phone... That was not a business model    that we could support, or even defend.\"  <\/p>\n<p>    They launched Project Fishbowl, a pilot to produce a smartphone    made of mostly commercial parts and infrastructure (more COTS    than GOTS), capable of supporting classified voice and data,    while remaining as easy to use as its civilian counterpart and    staying inexpensive. The historical significance of the NSA    embracing commercial crypto standards cannot be stressed    enough. Anyone familiar with how RSA came to be in the first    place will recall the fights its engineers faced keeping the    government from classifying it, taking its power out of the    public's hands. Perhaps the whole point of the RSA standard and    the RSA conference is to promote the power of security for    everyone through manageable encryption.  <\/p>\n<p>    \"So one of the things I harp on most is, why was that so hard?\"    remarked Salter.  <\/p>\n<\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.readwriteweb.com\/mobile\/2012\/03\/anatomy-of-a-government-phone.php\" title=\"Anatomy of a Government Phone, or, Can the NSA Build an Android?\" rel=\"noopener\">Anatomy of a Government Phone, or, Can the NSA Build an Android?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The craziest thing about a typical \"top secret\" U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-a-government-phone-or-can-the-nsa-build-an-android-2.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577281],"tags":[],"class_list":["post-1044575","post","type-post","status-publish","format-standard","hentry","category-anatomy"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1044575"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=1044575"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1044575\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=1044575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=1044575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=1044575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}