NSA Turns to Android as Foundation of Super-Secure Phones

Gear Diary is reader-supported. When you buy through links posted on our site, we may earn a commission at no cost to you.

You can learn more by clicking here.

Open Source software and operating systems have positive and negative attributes, but one major positive is the ability to completely customize the solution to meet your needs.

And according to an article at SC Magazine, that is EXACTLY what the NSA is doing.

Before this solution, NSA employees:

would previously need to “speak in code” if using a commercial mobile device to discuss classified information.

The initial plan was to cobble together a string of off-the-shelf solutions to come up with a total secure package … and not surprisingly that was a disaster. But switching to using Android as an operating system allowed them to tear out the things that didn’t work or were insecure, and add in only those things that DID work.

As always there were issues:

The Information Assurance Directorate ran into a string of problems during the build due to a lack of interoperability between vendor products.

Salter said a lack of interoperability between SSL VPN options forced designers to use IPSEC.

Several other compromises were made but none that reduced the security of the phone, Salter said.

And ultimately they came up with a package that meets security requirements and is still a fully functional device.

They were able to find a ‘third route’ other than vetting third party apps or simply disabling app installs:

Users will be able to install defence applications on the device from an enterprise app store run by the US Defence Information Systems Agency. This would ensure only secure applications were installed, and remove the need for NSA staff to otherwise vet the integrity of third party applications.

The other reason I love this is it shows creativity and initiative. Previously a government agency would have contracted a private manufacturer to come up with the solution, which would meet all the requirements but be the most dreadful device ever in terms of daily use. This solution meets the security requirements, doesn’t look like something ‘ultra secure’, and retains enough Android identity to be worth using!

As an Amazon Associate, we earn from qualifying purchases. Thanks for your support!


About the Author

Michael Anderson
I have loved technology for as long as I can remember - and have been a computer gamer since the PDP-10! Mobile Technology has played a major role in my life - I have used an electronic companion since the HP95LX more than 20 years ago, and have been a 'Laptop First' person since my Compaq LTE Lite 3/20 and Powerbook 170 back in 1991! As an avid gamer and gadget-junkie I was constantly asked for my opinions on new technology, which led to writing small blurbs ... and eventually becoming a reviewer many years ago. My family is my biggest priority in life, and they alternate between loving and tolerating my gaming and gadget hobbies ... but ultimately benefits from the addition of technology to our lives!