Russia hacks German military video call putting British forces at risk in the Ukraine

How secure are your sensitive video calls?

The BBC reports that Germany has admitted to a hack by Russia of a military meeting where officers discussed giving Ukraine long-range missiles, and their possible targets. https://www.bbc.co.uk/news/world-europe-68457087  Elsewhere it was reported that British forces involved with transporting the missiles could therefore be at additional risk.

It has been confirmed by the German government that the call was authentic and, has been leaked by the Russians on the dark web.

There are so many levels on which this worrying story gives rise for concern.  Not least is the highly insecure practice of using a non-secure channel for discussing military secrets. And it comes hot on the heels of a story that broke in January that US security company Ultra Intelligence and Communications fell victim to a cyberattack that, amongst others, affected the Swiss Air Force, when thousands of documents were stolen and made available on the dark web.

This isn’t necessarily a case of Russian intelligence being particularly clever, by not using a secure communications platform designed specifically to protect sensitive conversations, people are making it easy for them!

For protecting the most sensitive of conversations, such as the military secrets discussed in this instance, there are highly secure, on-premises communications solutions that could have been used. By running an on-premises solution organisations significantly reduce the potential attack vectors, as well as keeping total control of every aspect of their sensitive communications,

Armour Unity secure video conferencing

One problem facing many security conscious organisations is how employees handle data of mixed classifications. When sharing information that can be OFFICIAL, OFFICIAL-SENSITIVE, NATO Restricted or even SECRET, what are the appropriate/approved collaboration tools to use?  And, how do you ensure data sovereignty.

Armour Unity™ provides an alternative to consumer grade applications. Unity delivers secure conferencing in an easy-to-use app for mobile and desktop use, with enterprise security features not provided by free-to-use consumer products including a choice of cloud or on-premises installation to ensure data sovereignty. Unity is available in several configurations to ensure the level of security matches the sensitivity of the conversation. Unity combats the issue of ghost callers that may eavesdrop on sensitive conversations by highlighting to all users whether a participant has joined the call via an app, or securely via a browser –browser options often increase vulnerabilities.

Award-winning Armour secure communications

  • Given its multi-domain, multi-organisation structure with strictly siloed security Armour can augment and broaden secure communications and collaboration capabilities.
  • OFFICIAL SENSITIVE collaboration can be provided via Armour’s Secure Cloud extending to include desktops, workstations and unified comms systems.
  • The Armour installation can be hosted and managed on-premises to give the organisation total data sovereignty.
  • All users of the Armour ecosystem are centrally managed, and only those invited are able to join a communications group.
  • Identity-based encryption and authentication means that users can be confident that they are communicating with trusted colleagues, rather than impostors.
  • Remote wipe means that all sensitive information can be removed from the Armour ecosystem should a user or a device be compromised.
  • The organisation keeps control of its data because messages and documents cannot be forwarded to third parties outside of the platform.
  • Message Burn enables the sender to set a message to self-delete after a specific time either after it has been sent, or after it has been read.
  • Central admin can set all messages for all users to auto-delete after a set period, for example, 7 days, or a month.
  • Armour Recall™, a secure audit capability, is available as an additional service, where conversations and associated files are archived for future reference by a suitably security-screened auditor. The files are securely preserved even if the original messages have been deleted or lost.

Not on the High Street

This type of robust secure collaboration is not available from mass-adoption communication tools such as MS Teams, Zoom, GoogleMeet and WebEx. They all claim end-to-end encryption, however, as we’ve mentioned on numerous occasions, there is a lot more to security than just encryption. When looking for a secure communications solution there are multiple aspects to consider. Understanding the likely threats in this environment and solving each one combined with providing an application that is as easy to use as, say, a consumer application, is key to most organisations’ decision making. This is an important point made by the UK’s National Cyber Security Centre (NCSC) Seven Principles for Secure Communications.  For more information on this topic, read our blog:  https://www.armourcomms.com/2021/04/21/replacing-whatsapp-advice-from-ncsc/

Armour® provides highly usable and engaging solutions, so your users will have no reason not to use them.  Our Buyer’s Guide gives advice as to what you should be looking for: https://www.armourcomms.com/2023/06/29/securing-communications-channels-a-buyers-guide/

See us at the Telecom Summit: Safeguarding the Digital Frontier

12 March, Digital Security Authority, Nicosia, Cyprus

Our CTO, Dr. Andy Lilly is presenting at the Cyber Security in Telecom Summit: Safeguarding the Digital Frontier, being held in Nicosia, Cyprus on the 12 March.

Organised by the Cyprus Computer Society and the British High Commission Cyprus, with support from the Digital Security Authority, this is set to be a groundbreaking event. The conference aims to bring together leading experts, professionals, and enthusiasts to explore and exchange insights into the latest trends, challenges, and solutions in the dynamic field of cyber security and telecom.

The Threat in your Pocket

Andy will be presenting a session about the threat in your pocket – your mobile phone. Almost everyone carries a computer in their pocket, or handbag, with access to every aspect of our personal lives, financial, medical and – in some cases – very sensitive commercial, defence, or government data. Andy will present a summary of the broad range of attack vectors against mobile devices, from the network level down to the threats within the device itself. Not least is the significant threat from common messaging applications.  Andy will explain the UK’s NCSC principles for secure communication and provide guidance on mitigating the serious risks from consumer grade messaging apps.

For more information and register visit here: https://ccs.org.cy/el/news/conference-on-cybersecurity-in-telecommunications-614

We look forward to seeing you there.

More banks fined total of $81million for record keeping contraventions

Regulated industries need to introduce secure comms with audit and archive to reduce risk of fines and take back control of data

 

Sixteen financial firms have been fined this month by the US Securities and Exchange Commission (SEC) https://www.sec.gov/news/press-release/2024-18 for conduct that violated recordkeeping provisions of the federal securities laws. The firms have agreed to pay combined civil penalties of more than $81 million, and have begun implementing improvements to their compliance policies and procedures to address these violations.

Just over a year ago, eleven of the most powerful financial services businesses were fined nearly $2bn for failing to meet record keeping regulations due to communications using unauthorised and unmonitored channels. On this occasion the fines were levied by the SEC and the Commodity Futures Trading Commission (CFTC). As well as the fines, the firms involved are also subject to cease and desist orders. Read the full story here:  https://www.bbc.co.uk/news/business-63056677   

The recurring nature of these fines indicates that the underlying causes haven’t gone away. And now with AI-generated deepfakes scamming financial workers into making multi-million dollar fraudulent payments, https://www.armourcomms.com/2024/02/14/do-you-have-25m-to-spare-deepfake-frauds-are-here/  using an enterprise-appropriate, secure communications platform for all business conversations has never been more important.

Bankers are losing their jobs

The original revelations rocked Wall Street when some high profile bankers even lost their jobs (see our previous post about JPMorgan Chase https://www.armourcomms.com/2022/01/06/jpmorgan-fined-200m-for-mis-use-of-whatsapp/ ). The regulators concluded that the use of off-channel communications, using personal mobile devices and apps such as WhatsApp and Signal, were widespread.

And that’s not all – using consumer apps for business typically contravenes GDPR

In the UK and Europe, any organisation found to be using consumer-grade apps for business are likely to be in contravention of GDPR because under the regulations personal details cannot be shared without the owners’ express permission.

The inherent functionality of typical consumer apps include sharing contacts between users (and with the service provider) as well as storing documents or pictures in unprotected locations on a device with no protection against these being shared onwards to any other user of that service (outside the originating organisation). The Terms & Conditions of such apps have ‘cop out’ clauses such as “You will not use (or assist others in using) our Services in ways that […] involve any non-personal use of our Services unless otherwise authorized by us.” which is legalese for “You can’t use this app for any business purpose”.

Significantly reduce the risk of regulatory fines

Taking back control of mobile communications by providing a viable alternative to consumer apps will enable financial institutions to prove they are taking appropriate steps to ensure staff compliance and so significantly reduce the risk of fines or data leakage, and the negative publicity associated with non-compliance.

Armour® Comms has been positioned as a leader in the Secure Communications, Q3 2022 – The 12 Providers that Matter Most and How They Stack Up report by a major industry analyst.  Our flagship Armour Mobile together with Armour Recall™ delivers a highly usable solution to replace the ‘shadow IT’ of consumer-grade apps.

Available as on on-premises solution to provide data sovereignty, Armour Mobile and Recall provide all of the security, monitoring and archiving features required by regulated industries. What’s more, its enterprise-grade capabilities mean that Armour Mobile can be deployed at pace with one-click provisioning, making it quick and easy for users to be up and running with an approved channel for business communications within minutes, even on BYOD and un-managed devices.

With Armour Mobile, employees have the tools they need to communicate even the most sensitive of market intelligence safely and efficiently.

Recall by Armour – How it works

Armour Mobile and Armour Desktop support an integrated and secure audit capability enabling communications (text, audio) to be captured in their entirety within the centralised audit log, allowing detailed retrospective analysis of all conversations.   Each entry within the audit log is encrypted using keys unique to the user to whom the entry relates, and access to the decrypted content can only be gained by an Administrator with access rights to the audit tools to securely retrieve the key material and perform the necessary decryption tasks.

With Recall, all communications via Armour Mobile are protected and preserved automatically, the user doesn’t need to do anything extra. This supports the NCSC ethos of Secure by Design, making security easy for the end user.

For more information about how Armour Comms can help your organisation preserve, check and interrogate secure and sensitive conversations, ensure compliance, protect brand reputation (and avoid hefty fines), contact us today. sales@armourcomms.com

Do you have $25m to spare? Deepfake frauds are here

How Identity-based encryption can help

Yet another finance worker in a multinational company was recently duped into paying out $25 million after a video call with a deepfake chief financial officer. https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html  Not only was the CFO on the call a deepfake, so were all the other participants, all of whom were known to the finance worker. While initially the worker was suspicious, they put aside their doubts after the video call because it was so convincing.  This is not an isolated case, though previous frauds have tended to rely only on audio deepfakes.

With the growth of Artificial Intelligence (AI), impersonation-based attacks using deepfakes will continue to become more prevalent and even more believable. This is reinforced by the latest assessment from the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) https://www.ncsc.gov.uk/news/global-ransomware-threat-expected-to-rise-with-ai   which reports that the growth and accessibility of AI will rapidly increase the number and believability of ransomware and other attacks. As AI gathers momentum so the barrier to entry is lowered meaning that relatively unskilled threat actors such as novice cyber criminals, hackers-for-hire and hacktivists are able to carry out more effective attacks.

All this begs the question, what can organisations do to protect themselves from what is fast becoming a ‘wild west’ situation?

Tackling Deepfakes and other Impersonation-based attacks

Eventually people will become better able to spot deepfakes, in the same way that most of us don’t believe every photo we see, knowing that it is all too easy to manipulate images using software such as Photoshop. However, there is an immediate need for organisations to do everything they can to protect themselves and their employees from becoming victims of this newest threat.

Increasingly, authenticating the source of news, content, and all manner of communications is critical. Being able to trust that you are communicating with the genuine person (and not an impostor) will be a key to safety online, and for any type of transaction, whether that is taking financial or legal instructions from colleagues or customers, sharing commercially sensitive information with third-parties in the supply chain, or discussing matters of state with trusted advisors and co-workers.

As NCSC CEO Lindy Cameron states in the report, “The emergent use of AI in cyber attacks is evolutionary not revolutionary, meaning that it enhances existing threats like ransomware but does not transform the risk landscape in the near term.”

Identity-based Encryption will help to mitigate the risk

Technology is already available to protect sensitive business communications via voice, instant messaging and video conferencing. Secure communication solutions that use identity-based encryption, such as the NCSC’s MIKEY-SAKKE protocol https://www.ncsc.gov.uk/information/the-development-of-mikey-sakke, help organisations to verify that only approved participants can join a call group, meaning that everyone on a video conference call (for example) has been authenticated. This type of security feature is NOT provided by mass-adoption communication platforms, where very often all that it needed is a mobile phone number or email address to set up an account, and those are very easily spoofed, hacked or compromised (e.g. by SIM-swapping).

The Armour Secure Communications platform is purpose-built, Secure by Design, to protect sensitive communications between trusted colleagues, and can be used at higher assurance levels.

Lindy Cameron goes on to say, “As the NCSC does all it can to ensure AI systems are Secure by Design, we urge organisations and individuals to follow our ransomware and cyber security hygiene advice to strengthen their defences and boost their resilience to cyber attacks.”

For more information about the NCSC’s 7 Principles of Secure Communication and how Armour meets them all read our White paper: Replacing WhatsApp? Advice from NCSC

Nine tips for keeping communications secure within the Supply Chain

As cyber-espionage, state-sponsored hacking and identity-based attacks powered by AI and deepfake technology become mainstream, so details of sensitive communications amongst supply chain partners are at particular risk of compromise.

Any organisation that collaborates with others and shares commercially sensitive information needs to take robust action to secure their internal and supply chain communications to avoid becoming victims of malicious attacks that can result in damage to reputation, and financial loss to commercial and brand value.

Keeping your supply chain secure

The NCSC reports that supply chain attacks are on the rise, as increasingly complex technology ecosystems present more opportunities to be exploited. Where organisations cannot directly be compromised, an adversary may target the organisation’s digital supply chain, with just one of many examples demonstrated recently when Swiss Air Force documents were published on the dark web after an attack on one of its suppliers.

Organisations that need to collaborate with others, perhaps because they are working together on major projects, need to be able to communicate securely.

Mass-adoption applications are NOT secure enough

While popular mass-adoption communication applications offer convenience, claiming to be secure, they have not been designed for sharing sensitive commercial information. Using products not specifically designed to address the needs of high assurance organisations introduces unnecessary risk to all organisations within the supply chain.

Advanced Mobile Solutions – 9 Top Tips

The UK’s National Cyber Security Centre (NCSC) has defined a range of cyber security principles which a secure communications system should meet with the aim of delivering more secure devices that are as easy and convenient to use as commercial/consumer devices. With this in mind, here are 9 top tips for setting up secure communications systems that protect sensitive conversations, enabling secure collaboration with trusted partners.

1.Provide reasonable protections against device compromise

Data should be encrypted at rest, time limited (i.e. automatically deletes after a set amount of time) and can be remotely wiped, if for example, the device, or the user is compromised.  The communications app should not start if the platform, or operating system has been rooted or jailbroken.

2.Prevent bulk interception of sensitive data

Data should be encrypted in transit, including Push notifications, and it should be agnostic to being further protected by multiple layers of secondary encryption (for example, VPNs)

3.Prevent devices being compromised in bulk

Each user is separately Activated, Keyed, and Authenticated throughout use and is instantly Revocable, including the remote wipe of all data held within the app.

4.Keep sensitive data encrypted in the mobile infrastructure

Apply a ‘walled garden’ approach to network zoning of infrastructure.  User management and key generation is held within the inner zone securely segregated from external-facing services.  Sensitive data passed from inner to outer zones is encrypted and can only be decrypted by the recipient user app.

5.Monitor the mobile infrastructure to detect attacks

Service providers should deliver logging and data ‘pinch points’ to assist in monitoring.

6.Make it easy to destroy and recreate the mobile infrastructure

Infrastructure should be containerised for fast refresh or updates.

7.Protect the core with hardware assured Cross Domain Solution (CDS)

Ensure interoperability with CDS gateways for voice, video, messaging and Inner/Outer infrastructure zone control channels.

8.Control and monitor the release of data from the core

The infrastructure should only permit the Inner network zone to initiate connections to the Outer zone to prevent external attacks back into the Inner zone.

9.Engaging and User-friendly

Any solution must balance security with usability.  Apps need to be as engaging and easy to use as consumer-grade apps, but with significantly more robust security, so that users have no need of workarounds to get the job done.

We’ve moved down river!

New year, new office.

While everyone else was still coming to terms with a New Year, we at Armour have moved down river to splendid new offices in Aldgate. At time of writing everyone is now safely ensconced, with their own desks and pot plants installed, and we all just about know where the coffee machine is.

Strong Revenues and Growth

The move comes at the end of another great year for Armour where our revenue and profits continued to do well year-on-year. We continued to roll out new use cases for several of our significant customers (you know who you are), and we are developing relationships with a number of key alliance partners. Our ranks have been swelled with several new hires across the business covering development and support, and we welcomed our new VP of Sales and Marketing, industry veteran, Richard Brooks.

Impersonation-based and DeepFake threats

We are seeing a step change in the market for secure communications as security conscious organisations realise the risks of impersonation-based attacks, and deepfakes, which are only going to become more believable and more dangerous thanks to AI. The recent deepfake message purporting to be Joe Biden urging voters not to cast their ballots in the New Hampshire Democratic primary is a graphic example: https://time.com/6565446/biden-deepfake-audio/  

Our technology is already poised to help organisations overcome some of these risks. The benefits of identity-based authentication (in our case, the NCSC’s MIKEY-SAKKE protocol) where users must authenticate before they can join a call, send a message or join a video conference, are finally becoming more widely understood and demand for them is clearly growing.

Continued focus on R&D

2023 saw a focus on interoperability. We’ve delivered specific developments for customers that need to communicate with colleagues within the same organisation, but using different channels such as Skype, WhatsApp and Matrix, while maintaining robust security.  Some of these developments will be finding their way into the main product line later this year.

On the industry accreditations front, we maintained and renewed our ISO27001 certification.

Future projects currently under way include work on NCSC’s Principles Based Assurance – watch this space for further announcements.

It’s going to be a busy year, and one that we are looking forward to with relish – especially now that we have posh new digs!

Ministers’ disappearing messages – Part 2

Scottish Covid inquiry finds that Nicola Sturgeon appears to have deleted ALL her WhatsApp messages.

Hot on the heels of the revelation that WhatsApp messages between the then UK prime minister Boris Johnson, and Paymaster General and leader of the Commons Penny Mordaunt, had mysteriously disappeared, we now hear that ex-Scottish First Minster Nicola Sturgeon seems to have suffered a similar fate.

The BBC has reported that Jamie Dawson KC, counsel for the inquiry, stated that the former first minister appeared to “have retained no messages whatsoever”.  The inquiry was also told that her deputy John Swinney had his WhatsApp messages set to auto-delete.  In addition, the inquiry heard how no corporate or central record was made or retained either.  All of this despite some of their discussions being ‘FOI [Freedom Of Information] discoverable’, such that there was a requirement to keep a copy for future reference.

NCSC approved alternative to consumer apps

As we have stated many times before, there is really no excuse for the use of consumer apps by those in public office when there is an NCSC approved alternative that is every bit as engaging and easy to use.  Not only do consumer apps, such as WhatsApp and many others, lack enterprise-grade security features, such as identity-based authentication (which tackles the issues of impersonation-based attacks/spoofs, etc.), but as this case demonstrates yet again, such apps lack any central management of messages and conversations.

Plausible deniability should not be a goal!

The inquiry further heard that a civil servant, while reminding ministers of the FOI requirements, also made the remark: “plausible deniability is my middle name”.

Had ministers been using an approved secure communications platform, such as Armour Mobile, there would be no question about what happened to messages: they would all be archived and available for review by suitably approved and authenticated auditors. It would have been much easier and faster for the inquiry to discover exactly what went on, saving time and public money.

Furthermore, licences for the secure comms platform can be given to trusted colleagues in third party organisations. This would enable ministers and civil servants to communicate with whoever they need to, with the data remaining in the control and ownership of the government.

NCSC’s Secure Communications Principles

The NCSC has published principles dealing with secure communications which are:

  • Protect data in transit
  • Protect network nodes with access to sensitive data
  • Protect against unauthorised user access to the service
  • Provision for secure audit of the service
  • Allow administrators to securely manage users and systems
  • Use metadata only for its necessary purpose
  • Assess supply chain for trust and resilience

 

In an election year, if politicians and civil servants want to take a step towards repairing their somewhat tarnished reputations, following their own government’s guidelines about what constitutes secure communications, would be a good place to start.

For more information about what to look for read our Secure Communications Buyer’s Guide to discover the 10 questions you should be asking: https://armourcomms-25743375.hubspotpagebuilder.eu/buyers-guide-landing-page-2

More instances of Ministers’ disappearing messages!

A secure communications platform would provide a simple to follow audit trail

People like using WhatsApp. There are reputedly 2.7 billion users globally, beating both Facebook and WeChat. However, it’s really not suitable, or indeed, secure enough for organisations whether in the government or private sector, especially when national security may be at stake.  The latest twist in the Covid enquiry demonstrates this point, yet again.

The Guardian reported that Penny Mordaunt, leader of the commons, who served under Boris Johnson as paymaster general during the Covid pandemic, told the enquiry that WhatsApp messages with the then prime minister had mysteriously disappeared from her phone.

What actually happened to those messages we may never know. However, had all communications between minsters and people working in government, been properly safeguarded i.e. securely archived so that they were available for later audit, this current situation would simply not have arisen.

Preserving the evidence

In other industries, financial services for example, organisations are required by the Financial Conduct Authority (FCA) to preserve any material conversations, including those conducted over instant messaging, so that they can be reviewed at a later date should the need arise. Financial institutions have banned employees from using unsanctioned apps such as WhatsApp for any form of business conversation, and those that have been caught have suffered punitive fines as a result.

Emails of government employees and ministers are securely stored and have been for many years. So, with the ubiquity of instant messaging, why are these communications not treated in the same way? Many other countries’ governments have banned the use of consumer apps such as WhatsApp, Telegram and Signal, with France being the latest. When will the UK government follow suit?

BYOD devices can still be used

The Guardian article notes that Ms Mordaunt admitted using her own personal phone for some messages.  Ministers using their own phones for government business, while understandable as no one wants to be bothered carrying two phones, adds extra complexity to the issue of maintaining a public record of official communications. However, if a secure communications messaging app (the sort already approved and recommended by the National Cyber Security Centre (NCSC)) is used, any communication via the platform is preserved, even when using a BYOD device and even if the original messages are lost or deleted from the device.

Ministers using these apps could even provide licenses to journalists and other third parties, so that all calls/conversations/communications are preserved.

NCSC’s Secure Communications Principles

The NCSC has published principles dealing with secure communications which are:

  1. Protect data in transit
  2. Protect network nodes with access to sensitive data
  3. Protect against unauthorised user access to the service
  4. Provision for secure audit of the service
  5. Allow administrators to securely manage users and systems
  6. Use metadata only for its necessary purpose
  7. Assess supply chain for trust and resilience

 

Furthermore, NCSC has published guidelines for dealing with Shadow IT which expressly covers the use of unsanctioned channels and applications.

NCSC approved alternative to consumer apps

While consumer apps are easy and convenient to use, the Armour NCSC-approved Secure Communications Platform is equally as engaging. It has been designed working closely with NCSC to ensure that there is the correct balance between usability and security that supports good information governance.

Had ministers been using such a platform for communications, there would be no question about what happened to messages, they would all be archived and available for review by suitably approved and authenticated auditors. It would have been much easier and faster for the enquiry to discover exactly what went on, saving time and public money. And dare we say it, democracy would have benefitted!

For more information about how to tackle Shadow IT read our eBook: https://armourcomms-25743375.hubspotpagebuilder.eu/shadow-it-ebook or download our Secure Communications Buyer’s Guide to discover what you should be looking for and the 10 questions you should be asking: https://armourcomms-25743375.hubspotpagebuilder.eu/buyers-guide-landing-page-2

Should your staff use burner phones on business trips?

Some of the world’s largest consultancy firms (including the ‘Big 4’) are asking staff to use burner phones when they visit Hong Kong – but is this really the right solution?

A recent article in the Financial Times highlighted the growing concern about the risk to commercial data and the dangers of working in potentially unfriendly regimes. As Beijing continues to exert more control over the previously semi-autonomous international business centre of Hong Kong, more organisations are suggesting that company executives should take extra care when visiting the city, due to increased risks of hacking and unauthorised access to client data if work devices are used. In short, companies like Deloitte and KPMG are asking staff to use burner phones when in Hong Kong. And this is not being received well by some senior executives who prefer not to travel to the region due to the inconvenience of needing extra devices and leaving their usual phones and laptops at home.

This isn’t the first time that such an edict has hit the headlines. In January 2022 athletes from the US and UK were advised to use burner phones during the Beijing Winter Olympic Games due to concerns about an app provided by the Chinese government for use by all Olympics attendees that had significant security flaws.

This most recent example of organisations taking a stand against the dangers of state-sponsored hacking is equally applicable to many global organisations who have their Asia-Pacific headquarters in Hong Kong, or indeed any untrusted regime. Some of the firms affected have expressed concerns about the legal liability associated with leaks of client data, and the commercial implications should clients’ data be stolen or compromised.

Burner phones – a solution or a risk?

This all raises an important question: What are the pros and cons of burner phones? From the user’s viewpoint, it is inconvenient to have to use a temporary phone, possibly with only a subset of the apps they are used to using. Conversely, if the phone is bought in country, then it might be considered unsafe because its provenance cannot be certain. For cost reasons such phones are usually Androids, which makes them more susceptible to having been ‘jailbroken’ (modified to remove restrictions imposed by the manufacturer, to allow the installation of unauthorised software) or already contain potentially malicious apps from local carriers or distributors. While more secretive users might choose a burner phone because it helps their traffic blend in with the local phone communications, the primary purpose of using a burner phone is to be able to dispose of it when it is no longer required, such that whatever malware it contained, or picked up while in use, is not brought back into the user’s organisation. So, a burner phone is always a short-term solution to manage communications risks.

How Armour® helps

Armour Mobile™ and SigNet by Armour® can protect your mobile communications and data whether you choose to take your normal phone into a potentially hostile environment, or you need a secure communications solution that can be easily deployed on a burner phone.

Armour’s solutions completely isolate the communications and any associated data, metadata or files (attachments such as documents, images, video clips). In addition to end-to-end security over-the-air, all data is encrypted and secured at-rest within the app, protecting your contacts, messages and attachments from malware on the device or if the device is lost or stolen. The ultimate goal is to minimise your organisation’s risk by reducing the residual data held on the device. Armour’s products are ‘Secure by Design’, for example technology in the app requires sole use of the microphone ensuring rogue apps are not ‘listening’ into voice or video calls.

In addition, before the app can be used, the Armour software checks to see if the device has been jailbroken, if so, the user will not be able to use the Armour app.

Armour provides its own viewers for certain types of attachments, so as not to share information with the operating system or third-party viewers, and preventing the user from deliberately, or accidentally, sharing the attachment (and its sensitive information) outside of the Armour app, thus avoiding the potential for data leakage.

To minimise the use of the public internet and untrusted, insecure networks, the Armour apps can be installed in a variety of ways. Depending on the specific use case requirements this can include via SD card or via a completely closed VPN network (using additional technology from Armour technology partners).

Armour Mobile and SigNet also include many security features within the app to protect against data leakage.  This includes the Message Burn and Disappearing Messages features, where the sender of a message can set it to automatically delete at a set time, either after it has been read, or after it has been sent.  This feature can be deployed as a standard setting across chat groups or communities of users.  In addition, if a phone is lost, stolen or compromised, all data held within the Armour platform can be wiped remotely.

For more information about how Armour can help your organisation protect corporate and client information while travelling in untrusted regimes, contact us today.

Or read our Buyer’s Guide to find out what you should be looking for: https://www.armourcomms.com/2023/06/29/securing-communications-channels-a-buyers-guide/