[Scan-DC] Securing the Presidential BlackBerry

TMartin831 at aol.com TMartin831 at aol.com
Sun Jan 18 16:17:51 EST 2009


Securing the Presidential BlackBerry

Security efforts explain how the military-level encryption and  restricted 
use could enable Obama to keep his handheld.

Ellen Messmer, Network World 
Sunday, January 18, 2009 09:02 AM  PST
 
Naysayers aside, President-elect Obama appears determined to take  office 
Tuesday with his BlackBerry -- or at least some PDA -- firmly in hand.  Here's 
how experts say he might pull it off -- and what pitfalls he may be  
underestimating.

The Presidential Records Act requires retention of the bulk of  documents 
generated by the president for public review at a later date, so any  message 
Obama creates with his BlackBerry would have to be retained and stored,  subject 
to scrutiny in the future. But the larger problem is that the BlackBerry  is 
unlikely to get the nod as the presidential wireless handheld from the  
National Security Agency (NSA) or other federal entities with a traditional  
oversight role in top-secret communications security, according to  experts.

"The most significant issue here is security," says Randy Sabett,  partner at 
Washington-based law firm Sonnenschein, Nath & Rosenthal LLP.  "The number 
one target of anyone anywhere in the world would be the e-mail  communications 
of the most powerful man in the world, the president of the  United States." 
Sabett, who has worked at the NSA, says that "nation-states,  terrorist 
organizations and criminal gangs" could all be expected to be trying  to break into a 
president's BlackBerry.

There is a version of the BlackBerry that uses AES-256 encryption,  which has 
been approved by the Defense Department for sensitive communications.  
Research in Motion, maker of the BlackBerry, points to a number of government  and 
third-party security certifications as evidence that its key-management  system 
is secure.

A November 2008 certification by the Fraunhofer Institute for Secure  
Information technology in Germany, for example, gave a positive evaluation to  the 
BlackBerry's use of cryptographic algorithms and life-cycle management of  
shared secrets or keys and passwords.

But for top-secret communications, the NSA has a history of turning to  
select manufacturers for custom-designed equipment. These include the  
high-security STU-III phones or the more recent Secure Mobile  Environment/Portable 
Electronic Device program under which General Dynamics  built the Sectera Edge smartp
hone and PDA.

This Sectera is compliant with what's called the Secure Communications  
Interoperability Protocol and the High Assurance Internet Protocol Encryptor  
Interoperability Specification for secure interoperability with in-line  encryption 
devices used on the government's Secure Internet Router Network  (SIPRnet).

L-3 Communications has also built an SME PDE-style PDA called the  Guardian, 
which is undergoing certification.

But use of any PDA smartphone remains problematic for a  president.

Smartphones are programmable devices and "local devices are  increasingly 
vulnerable to attacks by injecting hostile software onto the  device," says Phil 
Zimmermann, a fellow at the Stanford Law School's Center for  Internet and 
Society, and creator in 1991 of Pretty Good Privacy (PGP), the  public-key 
encryption and authentication system.

"If that code can gain control of the device, it could take such  actions as 
activate the microphone, record his conversations and then transmit  them 
somewhere," Zimmermann says. "You're being ratted out by the device in your  
pocket."

Potentially, the device could even "rat out" your location, he adds,  because 
many smartphones provide highly accurate GPS capabilities.

While a simple BlackBerry for the president may not get the thumbs-up  from 
the NSA, Obama should not necessarily consider this the final word, says  
security expert Bruce Schneier.

"Look, he can decide to paint the White House blue if he wants,"  Schneier 
says. "The Internet is the greatest generation gap since rock and roll.  . . . 
The NSA will tell you the risks, but they will never say here's what the  
benefits are." Obama might be so productive and effective with a BlackBerry or  
other PDA, it would outweigh the risks.

But Schneier also acknowledges the risk of hacking the presidential PDA  is 
high and in any event, it is not possible to have absolute certainty that  
e-mail actually came from Obama.

"No encryption program solves that," says Schneier.

Gartner analyst John Pescatore, whose background includes working with  the 
Secret Service, says NSA-approved devices like Sectera would be secure  enough 
for use in a closed system, but the problem is switching to unclassified  mode 
to use the Internet.

"Internet e-mail is totally unacceptable for a president to use,"  Pescatore 
says. "There is no strong authentication -- how can anyone prove an  e-mail 
came from the president? There is no integrity -- how can anyone prove  the 
content wasn't changed?"

Use of something like the PGP public-key infrastructure could help the  
president communicate with others in a larger closed system, says Pescatore,  "But 
that doesn't stop anyone from forwarding an e-mail from him outside that  
closed loop."

Pescatore says he would also be concerned that any wireless device  might act 
as a radio-frequency beacon to reveal the president's location.

The other challenge -- the legal requirement under the Presidential  Records 
Act that a president store all documents in order to make them available  to 
the public in the future -- is also a factor Obama and his team must  consider.

Most legal experts and scholars say there's nothing in the Presidential  
Records Act to prevent use of e-mail.

"What it does do," says Dickinson College political-science professor  Andrew 
Rudalevige, "is make every presidential e-mail a public record and thus  
something -- unless classified for other reasons, such as national security --  
will be released via the presidential library system."

Records are typically deemed "open" 12 years after the president leaves  
office, but can be opened by presidential consent, by the Freedom of Information  
Act or subpoena before then, he adds.

However, current law doesn't require presidential phone calls to be  
recorded, though they have to be logged.

So, between the Presidential Records Act and the threat of PDA hacking,  
presidents have some good reasons to avoid e-mail, Rudalevige notes.
~~~~~~~~~~~~~
1998-2008, PC World Communications, Inc.
 
_http://www.pcworld.com/article/157907/article.html?tk=nl_dnxnws_ 
(http://www.pcworld.com/article/157907/article.html?tk=nl_dnxnws) 
**************Inauguration '09: Get complete coverage from the nation's 
capital.(http://www.aol.com?ncid=emlcntaolcom00000027)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.qth.net/pipermail/scan-dc/attachments/20090118/4baf7039/attachment.html 


More information about the Scan-DC mailing list