GCN LAB IMPRESSIONS

The 3 steps to securing an Android smart phone

It’s nice to see the government isn’t throwing Angry Birds, and more useful apps, out with the bathwater in their effort to make Android phones more secure.

We’ve been reporting on the Defense Department’s efforts to take commercial, off-the-shelf Android phones and, through a software upgrade, enable them to handle classified and eventually top secret data. Now it looks like, at least for the classified end of the pool, that may finally be happening, with top secret data soon to follow. 

Of course, people are rightly concerned about data security, and the thought of government employees carrying around classified data on their Droid X’s is a little off-putting at first, especially when you consider that no hardware modifications are being made to the phone itself, and no special models are being used, as was done for President Barack Obama when he came to office.

But the truth is that it’s not really all that difficult to secure the current generation of Android phones. And it’s interesting to note that the military apparently asked for Apple’s help in doing the same thing with iPhones, but was turned down because Apple, unlike Google, refused to let the government mess with its source code.

To secure an Android, or any phone for that matter, you need to do three things.

First, you have to restrict physical access to the phone. If anyone finds a lost government phone or steals it, you don’t want them to be able to just turn it on and find a bunch of classified information. This is actually the easier part of the process. Dual authentication log-in programs already exist on some phones, and are easy enough to add to others. If you additionally configure the phone to destroy its data if a certain number of sequential failed access attempts occur, you are pretty much set with the first check box. Most phones lock themselves down after even short periods of inactivity, so that front is also already covered.

Second, you need to make sure the data at rest is secure, in case someone bypasses the login. There are a lot of security protocols natively on Android phones that an admin can already set up for this purpose. One erases all data at rest, or anything flagged as classified, automatically if the phone does not connect into its home network after a certain amount of time has elapsed. You can also encrypt the data up to 256-bit Advanced Encryption Standard, which the NSA says is good enough for classified data.

Third, you can go one step further and add proprietary protocols such as HAIPE (High Assurance Internet Protocol Encryptor), which the NSA requires to access the government’s classified Secure IP Router Network.

Nothing in the first two areas requires access to the actual Android source code, but the third area, securing the communications going out from the phone, does. That’s why the government, in partnership with Google, had to create the Secure Android Kernel and why you won’t be seeing secure iPhones unless and until Apple decides to help out as well.

You might be surprised how many little security holes there are on smart phones that you don’t think about. A simple weather application might broadcast your location. Playing Angry Birds is probably OK, but if you upload your high score, that data might contain information that could let someone identify your phone, your login credentials or, again, your location. It’s really too much for a user to try and monitor, and some of that data is hidden.

The secure kernel is designed to look at all communications going out from a phone and scrub away any data that might compromise security. At the same time, it will allow government smart phones to securely connect with government networks, and presumably each other, without restricting them too much from other normal activities.

Although a little scary at first, when you look at what is actually being done, the government is simply using an existing tool, and a powerful one, to help people make their jobs more efficient.

It’s better to do it this way than to bury our heads in the sand and pretend that smart phones don’t exist, because then you get users trying to do secure things on non-secured hardware, and that’s when you really get into trouble.

 

About the Author

John Breeden II is a freelance technology writer for GCN.

Reader Comments

Tue, Feb 7, 2012 IA Aware Dude

Some of the new Angry Bird version will not run on my tablet unless I have internet access. Also, there is Angry Birds "Seasons" will some Chinese connections.

Tue, Feb 7, 2012 earth

Given the sensors embedded into most android phones there are a variety of identification methods that could be cycled through. Face identification, iris scanning of either eye, hand prints using the onboard “flash”, … cycle through these in a random manor and it becomes a bit harder for a stolen phone to be spoofed. One could also have a QR code version of a CAC card for two or more factor authentication, though a government only code would improve the situation a bit. And since smart phones are small computers a challenge/response system could be used instead of a static password. Combine these into three factor authentication.

The OS also needs to restrict storing data on removable storage and entering “debug mode”. Thought I expect these have already been thought of.

Tue, Feb 7, 2012 Jim Atlanta

This is very encouraging, but the user name and complex password problem remain. There are phones with strong remote fingerprint authentication available, such as the Motorola Atrix, made remote enabled in combination with the BIO-key app available for free on the Android Market. Combining a secure Android OS with a one touch positive ID of any authorized operators (remote authentication allows any authorized user to use a device to access secure cloud apps and data, not just the owner). Someone should look at how to integrate the BIO-key app into this secure Android version.

Tue, Feb 7, 2012 Chris Stone

I like the article very much. When I read the 3 ways of securing a phone the first thing that came to mind was, when data is erased from a flash memory device the data is not completely erased at that time due to how flash memory is managed. I am speaking of wear leveling. It seems that encryption is a must for these phones.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above