Risk
10/19/2012
02:28 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Silent Circle's Military-Grade Encryption: BYOD Tool?

Silent Circle's encryption tools for smartphones and tablets are a boon for privacy enthusiasts--but enterprises could find them useful too.

Silent Circle's suite of apps for smartphones and tablets is designed to make calls, text messages, video chats, and, in coming months, emails virtually invulnerable to surveillance efforts.

It's no surprise the company sensed a market for this sort of service. As technology and terrorist threats have evolved over the last decade, lines between national security efforts, invasive data mining, civil liberties, and Big Brother-like policies have become increasingly difficult to discern. A few recent examples: Carrier IQ debate, the FBI's attempts to gain backdoor access to various electronic communication and social media platforms, ramped-up domestic surveillance initiatives at both the federal and local levels, contentious court rulings around businesses that spy on customers, and an explosion of data-pilfering malware. Privacy concerns have ballooned beyond the ranks of conspiracy theorists to include an increasing number of ordinary citizens.

But what about businesses? As much as average users have reason to proactively protect their privacy, enterprises--thanks in large part to the BYOD phenomenon--arguably need to be even more diligent. Many businesses are already invested in a slew of precautions, including next-gen firewalls, mobile application management tools, and more. Does Silent Circle bring something new to businesses that have already deployed such measures?

Absolutely, according to co-founder Mike Janke, a former Navy SEAL and--along with email encryption pioneer Phil Zimmermann--one of the company's co-founders.

"It's great that people want to use VPN," he said during a phone interview, "but there are nation states and criminal groups breaking them open like coconuts." These ubiquitous encryption tools usually connect to a server where security keys are stored, he explained, making them less than fully secure.

[ Were key details omitted from the FTC's privacy audit of Google? Read more at Google Privacy Audit Leaves Lingering Questions. ]

Infiltrating such enterprise-grade perimeters demands a certain level of sophistication, of course. But elaborate viruses, many ostensibly designed to breach complex targets such as industrial control systems, are already roaming the Internet. Free access to this malware not only demonstrates that high-level sophistication is already being applied but it also allows less skilled hackers to piggyback on these more accomplished efforts.

The issue of government-sponsored espionage, meanwhile, has been a hot topic, with recent headlines focusing on Iran and China. The United States, as Stuxnet revealed, also has an active stake in cyber-warfare's evolution. While these developments can lead to overstated rhetoric, risks remain: data loss can be incredibly damaging, and as strong as some security measures are, they have to contend with talented but unscrupulous people working against them.

Silent Circle isn't a panacea against all of those threats, of course, but it does offer an alternative to the security key dilemma. The products' encryption is peer-to-peer, meaning that it is uniquely generated every time a data transfer is initiated and also deleted, either immediately or after a user-defined period, afterward. Silent Circle doesn't store a key that can be used to decrypt data. The result is information that's not only much more difficult to intercept but also more challenging to use if an attacker actually gets his or her hands on it.

What's more, the interface generally preserves the native app experience, making it user-friendly. As some frustrated IT managers will no doubt agree, security protocols are sometimes subverted by employees who either don't understand all the measures they need to observe or opt for workarounds because they think the policies get in the way of productivity. Janke remarked that Silent Circle deliberately avoided anything "too geeky" in order to make the experience "just like what [users] are used to."

Currently, Silent Circle's products work on iOS devices (except for first- and second-generation versions of the iPhone and iPod Touch). Support for additional operating systems, starting with Android, will come online in the coming months.

The company's encryption tools offer potentially powerful capabilities for those who need to secure sensitive data. However, broader MDM and MAM capabilities currently aren't included, which means that Silent Circle could be a component in an enterprise's security policy but not a complete solution. Given the products' focus on privacy, it's not likely that this larger set of capabilities is in the cards, but Janke said there are plans for additional features that will appeal to enterprises. He mentioned that real-time collaboration tools and encrypted data storage, for example, should join the suite in 2013.

Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.