Biometrics – An extra layer of security

Biometrics

We will be showing the latest version of Armour Mobile at Cyber UK (24-25 April 2019), and one of our most exciting upgrades is the provision of the ability to use biometrics as an extra layer of authentication.

We haven’t just jumped on a bandwagon here, biometrics is an important development for security.  While our products use identity-based cryptography and are designed to enable secure, cross-platform communications by identifying and authenticating the end points, this doesn’t necessarily identify who is actually using the device.  (More about identity-based encryption (IBE) and its benefits in our previous blog post here: https://www.armourcomms.com/2018/02/27/are-you-talking-to-me/?cat-slug=10)

When biometric authentication is added to Armour Mobile, it also confirms that it is the right person using the phone.  Armour Mobile integrates with the biometric authentication algorithms on the latest smartphones (iOS and Android) and uses them to open the Armour Mobile app. The user simply logs in to our app using their fingerprint or face ID, which is authenticated by the device and – through its link into the mobile’s built-in, secure key store – can then unlock our app (when closed, our app’s data-at-rest is kept encrypted).

The biometric component makes it simpler to login without needing to retype a password every time. This convenience removes another of the (perceived) ease-of-use barriers to using a secure, enterprise app that has been designed for purpose, rather than a consumer-grade app.

We will be demoing exactly how it works on our stand B9 at Cyber UK, at the Scottish Event Campus,  Glasgow,  24 – 25 April.

In addition, we will be demonstrating full integration with Secure Chorus’ interoperability standards for encrypted voice calls, to a live audience, with Leonardo, BAE Applied Intelligence and a defence organisation. The interactive workshop, hosted by the NCSC and led by Secure Chorus takes place on 24 April at 14.00 and is part of Stream G.

Several of our partners are also exhibiting, including BAE Systems on stand E22, Amiosec on stand E20, Leonardo on stand E15, Qinetiq on stand B2, Nine23 on stand SBH15 and Templar Executives on stand SBH7.

So all in all, well worth a visit!  For more information and to register visit:  https://www.ncsc.gov.uk/section/cyberuk/overview

Army Reservists Cyber Protection team pilot Armour Mobile

Army Reserves

A recent initiative to give the Army Reserves more responsibility has led to the forming of a Cyber Protection Team.  One of the first issues that the team addressed, was to find a more secure way to communicate. In other words, a secure replacement for WhatsApp.  Like many organisations, WhatsApp (along with other consumer-grade apps) has become widely adopted across the Armed Services.  It has invaded almost by stealth.  It’s easy to use, everyone has it, and it’s encrypted.  What’s not to like.

However, as we have discussed on many occasions, consumer-grade apps are generally owned by multi-national social media companies, that don’t particularly care about your meta data, and might even sell it to advertisers.

Recognising this vulnerability, the Cyber Protection Team is piloting Armour Mobile.  Currently being used very successfully by a small group that often work remotely, the plan is to encourage the use of Armour Mobile more widely.

Watch this space for further details.

Armour supports Royal Signals Cyclist

Working in secure comms, we come across many interesting and varied characters, all with a different background story to tell.  Recently I met Mark Howells, a reservist with the Royal Signals, and formerly a full timer, having seen several tours of active service. Mark has been instrumental in setting up a new cyber protection team within his regiment, and we’ve talked shop on several occasions.

However, what really got my interest was when Mark started to tell me about the proactive steps he was taking to deal with his Post Traumatic Stress Syndrome (PTSD). Depending on which source to you go to, PTSD affects from 5 – 10% of military personnel, and is on the increase.  Although the increase could be because it is now a recognised condition, that is talked about, and so people feel more able to ask for help.  Whichever way you look at it, mental health is something that we all need to be aware of.

Mark told me how he found cycling was a great therapy helping him to manage his symptoms, and so continue an active and healthy lifestyle.  With coaching from the Army, and a strict training regime, Mark has achieved a lot.  Not only that, he has big ambitions.

Mark’s goal is to represent his country at the Invictus Games in 2020.  Meanwhile he is taking part in events every week, and has a packed schedule of races for the coming season.

At Armour we are very proud to support Mark in his endeavours, and will publish occasional posts here, to up date you of his progress.

Rogue Users – What would you do?

Security Mobile

Trump and his foreign nation state eavesdroppers

According to a recent article in the New York Times, conversations on the President’s mobile phones are being listened to by the Russians and Chinese.  As we’ve reported on many occasions, listening in to standard mobile phone conversations is fairly straightforward with IMSI-catcher from just $20, and especially with the resources of a nation state.  The article goes on to explain that the Chinese are monitoring who the President talks to and who influences him.  They are learning what arguments tend to win him over and using that intel to avoid a trade war, so the story goes.

How interesting are your users?

All this begs the question, if the Secret Service, CIA and FBI can’t control one rogue user, how can any organisation be sure that their employees toe the line when it comes to security? As ever, Bruce Schneier articulates the problems of security of mobile devices in his blog very well, and makes the point that it’s not just the President and other heads of state that are at risk.  Anyone who is potentially interesting to criminals or commercial competitors could find themselves subject to eavesdroppers, whether a CEO of a quoted company, any number of sales people, company executives, product developers with trade secrets and intellectual property to protect, or government officials involved in a trade negotiation – I imagine all those involved in the current Brexit dealings are under a huge amount of scrutiny!

Good advice – but does anyone listen?

The UK’s National Cyber Security Centre (NCSC) has a plethora of advice and user guidelines.  All of it is written in easy to understand language, specifically for organisations to re-use with their own employees. Its advice for end users is a case in point.

While all of this seems fairly basic stuff, if you live and breathe cyber security as we do, the following are still good ways to avoid the majority of cyber threats:

  • Use strong passwords and don’t reuse them between different accounts
  • Be careful which apps you download
  • Only use secure/known WiFi connections
  • Don’t leave your device lying around
  • Don’t open phishing emails
  • Don’t visit dodgy websites
  • Be extra careful about what networks you use when abroad
  • Only use secure methods of communication when dealing with sensitive information

 

Making security invisible

The inconvenience of not being able to make a call, send a message or text exactly when you want to is just too much for many workers who are under pressure to perform in today’s always on culture.

Security has to be designed into the apps that we use daily and has to be almost invisible to the end user.  And if you are asking them to use a different app or process to the consumer-grade equivalent, it had better offer at least as good a user experience.

Contact us now for more information about how Armour Mobile can provide a highly useable and secure alternative to consumer-grade communication apps.

Comparing ‘Consumer’ to ‘Enterprise’ Messaging apps is like comparing ‘road cars’ to ‘racing cars’

So what exactly are the dangers of consumer (ie. free) apps?  And what do Enterprise-grade apps provide that the free apps don’t?  Sometimes when your end-users want to download a consumer app and start using it, it isn’t always clear what extra benefits enterprise-grade apps provide, so here we compare the two.

First a note about Encryption

Free apps have encryption and so to do enterprise apps.  There is so much more to security than encryption.  Encryption is (or should be) a given, it is rarely the weakest link, and therefore rarely the attack vector.  The dangers in using free apps for business revolve far more around how your sensitive data is managed, where it goes and who has access to it.

Secure Numbers

Consumer apps need a GSM number to use as the ‘secure number’.  This number is used to send activation codes in clear text via an SMS message.  This is easy to intercept and can compromise any security before it is even activated.

Enterprise apps can use GSM numbers as the secure number too, or a randomly assigned number for the ‘secure number’.  But activation is NOT via an insecure SMS, it can be via a variety of secure activation methods so it is very much harder to compromise.

Armour Mobile

We are able to utilise existing GSM numbers, or use another ‘secure number’. The process for activation and provisioning of Armour Mobile can be designed around the user’s specific requirements, using secure activation methods.

Harvesting your data

Consumer apps run on the vendor’s infrastructure only, and even if the content is protected, the metadata of each call or message is visible to the vendor. This can be cross matched with other user ID owned by the provider to build up a detailed picture of user habits, geo-location, and common friends/contacts, which can be used for profiling and targeted advertising.  Or sold to third parties for a similar purpose.

Enterprise apps run on a subscription business model, so there is no need to harvest user metadata in order to make a profit.  Serious cyber security vendors have no interest in selling data or advertising, their emphasis is on security and maintaining their credibility and brand value.

Armour Mobile

As well as our secure Cloud option, for fast provisioning, Armour Mobile is also available as an ‘on-premises’ option, meaning that not only is the content of the calls/messages secure, but nobody outside of the organisation has access to the metadata.  This ensures complete security and privacy regarding when, where and who users are communicating with.

Sharing your Contacts

Consumer apps typically upload users’ native contacts list to their global database upon activation. This enables them to cross match friends/contacts so that the user knows who else is using the same app. While this is certainly very user friendly, it does mean that the vendor has your GSM number, and also those of all your contacts for potential marketing purposes. All of those users will also have had their details cross matched to their social media profiles, so that the vendor can start to build up really detailed knowledge of the user, their contacts, what they like, and what they look like.  Yes, we are talking facial recognition here!

For more detail on this worrying scenario, read our blog Whose list are you on?

Enterprise apps do NOT need to upload the native phone directory.

Armour Mobile

With Armour Mobile you are able to import a bespoke directory of secure contacts for your users. In some cases real time integration between the app and the organisation’s internal Active Directory is possible. For certain public sector/government organisations there is also the option to link to address books of other departments that are also using Armour Mobile.

Securing your Communities

Consumer apps run on the vendor’s cloud and work in a single global group community where anyone can call anyone if you know their number. This is great for private communication between friends, but it is less than ideal for enterprise users.  Furthermore, it can put users at risk of phishing scams sent from within the messaging app, which can be perpetrated by anyone who has access to a list of valid GSM numbers, whether obtained legally or from the dark web.

Even when running in the ‘cloud’ Enterprise apps can offer cryptographically segregated user groups or ‘communities’ that are ring fenced from all other user groups.

Armour Mobile

We are able to offer to the option for different communities to be white listed to enable communication between communities for collaborative working purposes.  For On-premises installations, communities can be used to offer segregation between different departments or user groups, for increased security.

Third party certification

Consumer apps are rarely, if ever, subject to any independent certification of their security procedures.

Good enterprise apps are certified by Government cyber security experts or international bodies such as NATO.

Armour Mobile

Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Intelligent Support v Automation

Consumer apps typically have no human interaction during the activation process, which means no voice on the end of the phone for technical support if required.

Enterprise apps usually have an account manager assigned during the sales and trial process, with a technical support email and phone line available after the sale.  This is invaluable if, for example, a board level exec, senior manager or VIP user is having issues that need resolving quickly.

Armour Mobile

We provide a range of support services that enable organisations to be up and running with Armour Mobile secure communications within hours for our Cloud solution. We are also able to provide bespoke solutions tailored to specific high security requirements, based on individual use cases.

Management of sent and received files

Some consumer apps store sent and received files on the mobile device’s SD card, unencrypted, and then don’t delete them later. Sometimes this is the case, even when the delete option has been set. The files may remain, in an unencrypted form even if the app is uninstalled.

Enterprise apps that focus on security will keep sent and received files encrypted, only exposing them in unencrypted form to be read briefly by the third party viewer that displays them. Any such files are then removed as soon as the user has finished viewing them.

Armour Mobile

All files are kept encrypted, with data encrypted at rest as well as in transit. In addition, Armour Mobile will not run on a jail-broken phone meaning that security apps performed by the app stores and native in-built security remains intact.  Armour Mobile also isolates the microphone to prevent data leakage.

In Summary

When dealing with sensitive business communications of any type (voice, message, text, video, attachments) you need to be sure of exactly where your data and meta data is going, and who can see it.  You also need to think about what other information that you may be giving away, for example, your contacts list, and other personal information from social media that can be used for profiling.

And one final thought – if you don’t want the world and his wife to see your corporate communications, you need to use an enterprise-grade app, like Armour Mobile, rather than a consumer app downloaded for free.  In this instance, you really do get what you paid for.