The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

The Boeing "Black" phone

BOEING

AA Font size + Print

The Boeing "Black" phone

The Boeing device is less a phone and more a locked-down portal to a faraway server.

There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.

Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

One of the recipients is Cyber Command chief Adm. Michael Rogers, said DISA head Lt. Gen. Alan Lynn.

That’s not to say that everyone in the military can expect to receive one. “The Boeing Black is the device we’re currently working with,” Lynn said. “We’re just now in the test phase,” he said.

That the military has been working on such a device is no secret. A lot of device manufactures have been eager to meet rising military needs for secure communication. One contender, Silent Circle, co-founded by encryption guru Philip Zimmerman and former Navy Seal Mike Janke, has managed to push a few units into the hands of some military for testing and recreational use.

Lynn said the Boeing Black phone also works with “a large amount of encryption.” But the encryption alone is not what makes the device so secure. “There’s nothing that lives on the devices,” said Lynn. “It’s close to a VDI,” a virtual desktop infrastructure.

What that means is that the most secure phone in the world is, in the purest sense, just a window to another computer, a remote server on the military’s Top Secret JWICS network. That server does all the real work and holds the data. The phone itself just moves input commands — keyboard, mouse, and other signals — to that server. The result, said Lynn: “We’re not too worried about losing data,” at least not off the phone.

But does Rogers like the phone? Lynn said, “I think he does. Haven’t heard any complaints.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download
  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Top 5 Findings: Security of Internet of Things To Be Mission-Critical

    As federal agencies increasingly leverage these capabilities, government security stakeholders now must manage and secure a growing number of devices, including those being used remotely at the “edge” of networks in a variety of locations. With such security concerns in mind, Government Business Council undertook an indepth research study of federal government leaders in January 2017. Here are five of the key takeaways below which, taken together, paint a portrait of a government that is increasingly cognizant and concerned for the future security of IoT.

    Download
  • Coordinating Incident Response on Posts, Camps and Stations

    Effective incident response on posts, camps, and stations is an increasingly complex challenge. An effective response calls for seamless conversations between multiple stakeholders on the base and beyond its borders with civilian law enforcement and emergency services personnel. This whitepaper discusses what a modern dispatch solution looks like -- one that brings together diverse channels and media, simplifies the dispatch environment and addresses technical integration challenges to ensure next generation safety and response on Department of Defense posts, camps and stations.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download

When you download a report, your information may be shared with the underwriters of that document.