Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Android Cellphones Encryption Government Handhelds Security IT

Ask Slashdot: Managing Encrypted Android Devices In State and Local Gov't? 138

An anonymous reader writes "I am a systems administrator for a mid size state agency. We currently offer Blackberries to our staff, but we are migrating to Android devices in the near future. Since phones have sensative data (email, documents, etc.), what is a good choice for encrypting that data? Options abound, like OS-level encryption from Motorola and Samsung, 3rd party apps from GoTrusted and even a LUKS port for Android. Does anyone have experience managing encrypted Android devices? What are the important features I should be looking at? Many thanks in advance." (And, for that matter, are there good options for doing the same with iPhones? Other options to consider?)
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Managing Encrypted Android Devices In State and Local Gov't?

Comments Filter:
  • state agency will take the best deal not the best for IT.

    • No, the US government actually takes computer security pretty damn seriously.
    • by nurb432 ( 527695 )

      Not always. Some states do worry about technical merit.

    • Re: (Score:3, Insightful)

      by dsvick ( 987919 )
      I would think that the fact the OP is taking to the time to ask the question and even went so far as to ask for help with things he realizes he might not even know enough to ask is pretty good evidence that they are taking security seriously. Granted, he probably has to get it approved if it a pad app, but the cost of that should be pretty small compared to the cost of the phones themselves.
  • Don't encrypt (Score:5, Insightful)

    by Anonymous Coward on Thursday July 12, 2012 @03:11PM (#40630939)

    If the state isn't doing anything wrong, it doesn't have anything to hide.

    • ULTRA LOL :-) It's overhead anyway and requires too much processing power.
    • I wish I had Mod points for this one.

    • Re:Don't encrypt (Score:5, Insightful)

      by masternerdguy ( 2468142 ) on Thursday July 12, 2012 @03:19PM (#40631059)
      It doesn't just have to do with hiding immoral actions (btw we don't even know what agency he works for -- he could be fracking parks and recreations), it also prevents tampering.

      I encrypt the disks on my computers not to hide anything, I will gladly decrypt my disk for the FBI if they ever asked, but to prevent outside tampering. Without encryption, an adversary can just load up a linux live cd and tamper with anything they want with root access. By encrypting the entire disk I can prevent that sort of tampering. They can still boot a live cd, but they can't tamper with the installed operating system or the data.

      Besides, there is a metric ton of personal information on any smart phone. How would you like Joe the Laptop Thief to get access to your Google account, or possibly even login information for your online banking?

      • > he could be fracking parks and recreations

        Gee thanks. It'll take a long time to get that mental image out of my head.

      • If you truly believe the FBI is working for the greater good of humanity, then please read Classified Woman [amazon.com] by whistle-blower Sibel Edmonds for an inside look at how they 'get business done.'
      • Re:Don't encrypt (Score:5, Insightful)

        by AmiMoJo ( 196126 ) on Thursday July 12, 2012 @06:30PM (#40633009) Homepage Journal

        I encrypt because I do have things to hide. I'm a normal person. Everyone has things they want to keep private. You wouldn't be happy getting your bank statements on the back of a postcard, would you?

        Hiding stuff is normal. Everyone needs privacy. There is nothing wrong with it.

    • Re:Don't encrypt (Score:4, Insightful)

      by Calos ( 2281322 ) on Thursday July 12, 2012 @03:51PM (#40631391)

      Sorry, but no, not everything the government has should be open for anyone to obtain and peruse. Take this [computerweekly.com] as an example, or several other blunders made by the UK government or its contractors. This [btlj.org] has some data and discussion on the US. Personally, I'm more concerned with the general lack of responsibility for these kind of breaches in both the public and the private sector.

      Don't get me wrong, I agree with your ideal. But ideals can rarely if ever become reality. And they're not always the blessing that they would seem to be.

      • by sowth ( 748135 )

        Me thinks the AC was making a sarcastic statement based on the fact many government agents or people speaking about government agents investigating a person will often say: "if you aren't doing anything wrong, you have nothing to hide." Which obviously is wrong.

    • Re:Don't encrypt (Score:5, Insightful)

      by Last_Available_Usern ( 756093 ) on Thursday July 12, 2012 @03:53PM (#40631423)
      What about personally identifiable information? Should SSN's be flying around unencrypted? Just because encryption is used to conceal wrongdoing doesn't mean it's always used for that purpose.
      • Federal regulation require full disk encryption for any portable disk containing PII. HIPPA (medical) information has even stronger requirements than PII. I assume many state and local government have similar requirements (and should have).

        BTW, I think the Anonymous Coward who posted the initial comment was expecting a rating of "Funny". At least it looked tongue in cheek to me.

      • Should SSN's be flying around unencrypted?

        Slightly tangential, but: an SSN (or whichever national equivalent) should be less dangerous to publish than, say, your name and address. It baffles me that it needs to be kept secret in the U.S., furthermore I trust that slashdotters know the difference between identification and authentification. Who where the geniuses that decided that a valid SSN is authentication, and suffices to seriously compromise your personal security? The question is not in jest, quoth the Wiki: ... because it is assumed that no [wikipedia.org]

    • If the state isn't doing anything wrong, it doesn't have anything to hide.

      Your medical records, for example?

  • iPhone (Score:4, Informative)

    by masternerdguy ( 2468142 ) on Thursday July 12, 2012 @03:12PM (#40630957)
    Considering that any meaningful encryption (I will assume you want some sort of volume group/full disk encryption) will require root access and probably a custom kernel module, you will need android. Personally I would download the source code and hack it myself, add in the encryption and other features I want, and then flash the modified ROM onto a device of choice. You can't do that on an iPhone. It worked for SELinux.
    • Re:iPhone (Score:5, Informative)

      by bz386 ( 1424109 ) on Thursday July 12, 2012 @03:17PM (#40631027)
      Android has builtin encryption starting with ICS.
    • Re:iPhone (Score:4, Insightful)

      by jmorris42 ( 1458 ) * <{jmorris} {at} {beau.org}> on Thursday July 12, 2012 @03:22PM (#40631097)

      Nice propeller spinning but forget all that crap and lets get real.

      If you want to enforce privacy of information you do two simple things.

      YOU DON"T F*CKING ALLOW IT TO WALK OUT THE FRONT DOOR.

      YOU DON"T ALLOW IT TO BE MOVED TO DEVICES OUTSIDE OF YOUR DIRECT CONTROL.

      So just say no to BYOD, let em screech and bitch all they want. Tell em straight up, if your can't work without your precious iPad then go find an employer who doesn't need to deal with laws enforcing privacy. And good luck with that in this crappy economy. Just say no to portable devices, period, unless there is a truly compelling need. Data collection and off site archiving come to mind.

      Otherwise admit you really don't care about privacy at all and get on with it and, again, you don't need to spend a lot of money on tech that won't actually work when it comes to crunch time with end user idiots.

      • by gweihir ( 88907 )

        While I agree that BYOD is a nightmare security wise, you seem to be unaware that technology cannot really protect against insiders. So let me add:

        YOU DON'T ALLOW ANYBODY TO WORK WITH IT OR LOOK AT IT.

        That is where the "lock everything down" approach fails and things like data leakage prevention look just as ridiculous as they are.

        • by jmorris42 ( 1458 ) *

          > YOU DON'T ALLOW ANYBODY TO WORK WITH IT OR LOOK AT IT.

          No, you have to assume your own people are somewhat safe, at least at the level of access you grant each one. Although you also have audit trails of who accesses/changes what to keep everyone honest.

          But the second it leaves the front door you aren't trusting the user anymore, you are trusting the user to be able to retain possession in a hostile environment. Or you are trusting them to actually use the secure features correctly. Do you deal with

      • Re: (Score:3, Insightful)

        Please, I would like to see you say those exact words to your CxO when they come and ask you for help with activating their brand new iPhone/Android/Tablet. You're just going to make my job easier when I sell them a BYOD solution without your consent.
        BYOD is here to stay whether you want to support it or not.
        • by jmorris42 ( 1458 ) *

          Translation: Security/privacy is just a joke. We will waste a little tax money on security theater and fattening up a preferred vendor but we really don't care. Give me the shiny toy.

          • by gorzek ( 647352 )

            When a C-level executive says they want something, do you really think a rank-and-file IT worker, or even the IT manager, is going to get to tell them "no"?

            • When a C-level executive says they want something, do you really think a rank-and-file IT worker, or even the IT manager, is going to get to tell them "no"?

              Presumably the company employs the IT worker for his skills and knowledge in this particular field, while the requirements of a C-level exec probably and rightfully involves more admin skills than technical ones. The task of the IT-worker is to inform them of why this is a bad idea. Explain the risks, document that you've done so, and if they still demand it and the shit hits the fan you're in the clear, at least if you live in a civilised country (as opposed to for instance Ecuador, where you'd still be su

              • by gorzek ( 647352 )

                The problem I see with the above is that, if this hypothetical IT worker does the necessary ass-covering and the executive gets to use whatever devices he wants, and then there's a breach, on whom is the axe going to fall? The IT guy. Shit rolls downhill, always.

                "I want to use this device."
                "That device isn't secure. You should use this other one instead, which complies with our security policies."
                "Nah, I'll use the one I've already got."
                "Okay, but I'm going to note in our records that you were warned."

                Three

        • Re: (Score:2, Interesting)

          by stewbacca ( 1033764 )

          I changed jobs last year. I used to work on government contracts and we weren't even allowed to take thumb drives or laptops out of the building. Wasteful and inefficient for very little security returns (with nothing in place to keep me from just forwarding the stuff to my gmail account, and then working on it from home, something everyone did, btw).

          Now I work in a place that is BYOD. We have NO security problems like the old place. Not because BYOD is more secure, but because when you surround yourself wi

          • by jmorris42 ( 1458 ) *

            > just forwarding the stuff to my gmail account

            Translation: I didn't give a shit about security and worked around it for my convience. I didn't give two rats asses if I passed private information through totally unsecured servers at Google and anyone at Google with legit (or not) access to the servers with that data on them. I passed information I was obligated to protect the privacy of right through who knows how many unsecured pathways between work, google and home. I managed to leave before getting

            • Better translation: our IT policies were stupid and overly restrictive and nobody could get any work done so EVERYBODY had a work around. You can't fire everyone, but starting with the idiot IT policy makers would have been a good first start.

            • just forwarding the stuff to my gmail account

              Translation: I didn't give a shit about security and worked around it for my convience.

              That's the rub. Security will always be traded for convenience. Some employees have a very real need to be able to work with confidential stuff on the go, but for most it's just "I want to have my email just appear on my iPhone instead of having to turn on my PC and log in to that VPN shit".

              A dedicated and knowledgeable attacker *will* get passwords (almost) no matter what you do to prevent it, but it's easier when you have easily stealable access points in the wild. Of course, an offer of a bit of money to

      • Re:iPhone (Score:5, Insightful)

        by rhsanborn ( 773855 ) on Thursday July 12, 2012 @03:42PM (#40631307)
        This is why IT people have such a bad reputation. Yes, portable devices are a security risk. Our job, as IT professionals, is to come up with solutions. On the same bent, I suppose you'd also cut the link to the Internet. Wait, you obviously haven't, because you're posting on Slashdot. But you came up with clever ways to protect your system from the Internet? Then why don't you start working on coming up with ways to secure mobile devices.

        The obstructionism is well intentioned, but we have an obligation to try to support the needs of the business. Staff are more mobile, and the business is benefiting by having people more connected and better able to make decisions, even when they aren't sitting in front of a PC. So, let's make it secure.
        • by jmorris42 ( 1458 ) *

          This isn't a tech problem. Therefore it can't be solved with tech. You don't allow information that you are obligated to protect the privacy of leave your control. Doesn't matter if it is android, a laptop or a briefcase full of files. The other option is roll the dice and hope you aren't there when the press show up to cover the breach. Choose. And if your boss insists you do it anyway make the sum-bitch put the order in writing so your butt is covered when the poop hits the fan. Because sooner or l

          • This isn't a tech problem. Therefore it can't be solved with tech. You don't allow information that you are obligated to protect the privacy of leave your control. Doesn't matter if it is android, a laptop or a briefcase full of files. The other option is roll the dice and hope you aren't there when the press show up to cover the breach. Choose. And if your boss insists you do it anyway make the sum-bitch put the order in writing so your butt is covered when the poop hits the fan. Because sooner or later... BOOM!

            Then my point still stands. You don't have any potentially sensitive data connected to the internet, right? Because any vulnerability you can come up with against a screen-locked, encrypted, remote wipeable device, I can come up with something relatively comparable against you're internet attached network. Yep, I walk around with my phone, potentially left or stolen in public. You leave your network attached to the public 24x7x365. And if you don't do that, there is a building that's potentially breachable.

        • Our job, as IT professionals, is to come up with solutions. On the same bent, I suppose you'd also cut the link to the Internet.

          So, chew on this: where I live, collaboration between companies competing for a government contract is illegal. Suppose two companies, X and Y, compete. You are a criminal, and you knock the CEO of X over the head and steal his (not screen-locked at the time) phone. At this point you could offer Y an insight in the strategy of X (for instance their lowest limit) in exchange for money. Or you could blackmail the CEO of Y which any illicit info you can access. Or blackmail him to not share all his secrets wit

          • As an IT pro, I setup the phone to auto-screen lock, encrypt it, and set it up to be remotely wiped. That vector is, for most purposes, now moot. There are definitely ways around it, but there are ways around most things, remember the old XKCD comic with the encryption key and a wrench. I'm willing to bet your data center isn't fully secured against a SWAT team coming in using C4 to blast open the doors either. But we make reasonable efforts to cover most vectors.

            It also depends on the type and volume of t
      • I think you are correct with everything you said, but you're missing the most fundamental part of security as it's mostly practiced in the real world (there are some places where security is really taken seriously but they are extremely few.) The only thing that is important is the illusion of an extremely secure system. Most normal human beings would never tolerate any truly secure system as it would be too inconvenient to use.
      • If you want to enforce privacy of information you do two simple things.

        YOU DON"T F*CKING ALLOW IT TO WALK OUT THE FRONT DOOR.

        That doesn't solve the needs of the EMT who arrives to find you on the floor and responsive. You'll have privacy a-plenty when you're dead.

        Mobile access to confidential information is not a problem you can simply wish away. There are two many situations in which it is useful, too many situations in which it is vital.

    • And in fact its non-disableable. The remote wipe is, in fact, "kill key store".

      Apple's propaganda, err, whitepaper on the subject [slashdot.org]

    • Re:iPhone (Score:5, Informative)

      by Yaztromo ( 655250 ) on Thursday July 12, 2012 @04:26PM (#40631807) Homepage Journal

      Considering that any meaningful encryption (I will assume you want some sort of volume group/full disk encryption) will require root access and probably a custom kernel module, you will need android.

      iOS devices have AES 256 encryption baked right into the hardware inside the DMA path between flash storage and the main system memory. It's always enabled, and can't be disabled by users, administrators, or anyone else [apple.com]. No custom kernel modules required -- XNU already has built-in AES 256 support, and the platform already implements it for each and every device.

      Yaz

  • by Anonymous Coward

    http://support.google.com/ics/nexus/bin/answer.py?hl=en&answer=2381815

  • Use Apple. (Score:4, Funny)

    by Anonymous Coward on Thursday July 12, 2012 @03:14PM (#40630983)

    Their phones don't offer any enterprise-level collaboration features whatsoever. No features, no security risk!

    • Read the Government/Secure deployment guide, which Apple wrote for this exact purpose.

      iPhones do hardware encrypted disk, passcoding, ActiveSync, and support MDM (mobile device management) servers to enforce policy.

      Android's support for these things is much more... fragmented. I think iPhones would be the better option here.

  • by nighthawk243 ( 2557486 ) on Thursday July 12, 2012 @03:19PM (#40631057)
    If you're using active sync, you can make it part of the sync policy to wipe the phone when it is marked lost. We do that quite a bit.
  • Sandbox Application (Score:4, Interesting)

    by rogueippacket ( 1977626 ) on Thursday July 12, 2012 @03:21PM (#40631065)
    Try something like Good for Enterprise - allow your employees to bring their own devices (this is the trend, don't try to dodge it) if they wish, and just provide them with an activation key for the application. The days of "work device" and "personal device" are over - users will use one device for both, and issuing a crippled device which only performs one of these tasks is quite draconian. The sandboxed application ensures all critical information is secure, while giving your employees the segregation between life and work they desire.
    • by Andy Dodd ( 701 )

      Yeah. "Sandbox" apps like this will be received better by employees. If you try OS-level encryption with policy enforcements (such as Exchange policy enforcements), users will find ways to bypass the policy enforcements that get in the way of "normal personal operations" and this will also kill the security of the things you want to keep secure.

      Sandboxes like Good for Enterprise don't annoy users when they are engaged in personal use, so they are far less likely to disable security measures.

    • Id prefer to have 2 devices over the 'boss' having access to mine, in ANY manner. ( even active sync which gives them far too much control over MY device )

    • by gweihir ( 88907 )

      Stay away from that trash. I recently attended a presentation on "Good for Enterprise" intended for professionals and it was just pathetic. Some friends, who are not security experts, began poking holes in the statements made in real-time, because the fatal flaws were obvious even to them.

    • I will second this option. My company uses Good for Enterprise on both Android and iPhone. The nice thing about it is that it is YOUR phone that happens to have a an app on it to access your work e-mail, calendar and contacts. You can view attachments, but not download them to the actual device. The app itself is password protected so you can choose your own level of security for the rest of your phone. The only bad part is that, well, naming an app "Good" will always result in it being bad. The inter
  • by Anonymous Coward

    We use Google Apps builtin in encryption and mobile device management. http://support.google.com/a/bin/answer.py?hl=en&answer=1734200 Works great. Free too.

  • by Anonymous Coward

    Blackberry was your best bet for security. All the others are spyable from the US government by their own admission. Blackberry was the one carried by all those in the know, outside of the us. They had stopped the production of the old style berries at the request of some-one not listed. But the house of saud wass involved about 5 years ago.
    All of the current units, the programing can be hacked, reported by the security magazines, for the last three years. Dont trust a one of them. If your company-state-go

  • by Animats ( 122034 ) on Thursday July 12, 2012 @03:47PM (#40631343) Homepage

    Assume that your carrier, cloud provider, and handset manufacturer all have access to everything on the phone.

    With Blackberry, you could run your own server, and nothing in the public infrastructure had access to unencrypted data. With Android, Google has a direct tap into your data. Encryption won't help when the layer that reads the keys is under the control of the provider.

  • There is Open PGP for Android phones. http://www.thialfihar.org/projects/apg/ [thialfihar.org]
  • NYC startup enterproid has a product call Divide that you should check out: http://www.divide.com/ [divide.com]

    No iphone solution, but I'm sure it is next on your list.

  • This requires certain models of phone with the hypervisor loaded by the manufacturer, but creates two partitions on your phone, one like the blackberry (encrypted, remote wipeable, secure, app streaming, no access to add user apps but system can administer global apps in the work partition), and the other a personal android phone. Even has separate work and personal phone number identities. Just swipe the screen back and forth, and you switch between personal and work spaces. http://www.vmware.com/products [vmware.com]
  • There are plenty MDM solutions out there. I am quite happy with AirWatch (Gartner Magic Quadrant 2012), though I was impressed with Good Technologies. AirWatch was cheaper, but was not sandboxed. Most Android devices will also require the Touchdown client ($15-20 per license) for the deployment of email profiles unless you're only supporting devices with OEM MDM extensions. You'll find a lot of MDM solutions require Touchdown, which definitely has quirks end-users will notice. Biggest things: Make sure you
  • Here's the NSAs recommendations for securing iOS devices: http://www.nsa.gov/ia/_files/os/applemac/Apple_iOS_5_Guide.pdf [nsa.gov]

  • by plsuh ( 129598 ) <plsuh&goodeast,com> on Thursday July 12, 2012 @04:42PM (#40631975) Homepage

    I'm a former Apple engineer, current independent consultant, so I'm not going to address the Android side. That's a lot more complicated -- I'll stick with talking about the iOS info that I know about.

    That said, wow, there's a lot of snarky comments but not a lot of information posted.

    iOS has full-device hardware encryption built-in on the iPhone 3GS and later, activated as soon as you set up a passcode. This top-level encryption layer is for quick device wipes, not for data protection. Each user data file is then encrypted on top of that using its own unique key, then set into a protection class by the app developer:

      - Complete Protection - decrypted only when the device is unlocked; file key is removed from memory when the device is locked.

      - Protected Unless Open - decrypted when the device is unlocked; if file is open when the device locks, the file stays open/decrypted.

      - Protected Until First User Authentication - decrypted on first unlock, stays decrypted until reboot

      - No Protection - file system encryption only; no per-file encryption key

    Apple has really been on developers cases to tighten down the data protection classes for their apps on iOS.

    In addition, iOS has a huge number of remote management options. Apple provides a basic management tool called Profile Manager in Lion Server, and there are third-party Mobile Device Managers (MDMs) that take the basics and go even further. You can force complex passcodes, pre-configure e-mail accounts, restrict usage of features, and so on. The enterpriseios.com site has a pretty complete listing.

    One of the cool things about using iOS MDM is that all of the configuration profiles are tied to the management profile that gets installed when the device is first enrolled with the MDM. If you're in a BYOD situation and a user leaves on bad terms, the IT department can retract the management profile, which automatically retracts all of the other configuration profiles. This will delete corporate e-mail accounts, remove in-house apps (and their data!), take away VPN and 802.1X access, and so on, without erasing the person's device entirely. All of the pictures the person took are still there, not blown away as they would be after a complete device wipe.

    Anyway, a few links that may help you out:

    http://www.apple.com/iphone/business/integration/ [apple.com]
    http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf [apple.com]
    http://www.enterpriseios.com/ [enterpriseios.com]
    http://consultants.apple.com/index.php [apple.com] - look for consultants with the Mobility specialization
    https://help.apple.com/advancedserveradmin/mac/10.7/ [apple.com] - go into "Manage Users" --> "Profile Manager" on the right

    Hope this helps.

    --Paul

    • by Spad ( 470073 )

      iOS MDM is pretty laughably limited, you can't even disable WiFi or Bluetooth through it, set a proxy server (other than as part of a VPN connection) or otherwise restrict web access without turning off Safari entirely. Apple being Apple, of course, if they don't offer it as a setting, you can't do it without Jailbreaking, which few companies really want to have to mess around with.

  • Oh wait, was this the article about spammers hiring better copyeditors so they could steal your data more better, or was it the other one?

  • Don't know what exactly your requirements are, but you can look into McAfee EMM, supports iOS, Android, Windows Phones and Blackberry

    http://www.mcafee.com/us/products/enterprise-mobility-management.aspx [mcafee.com]

    Disclaimer: I work for McAfee but a different division

  • - You propose a bunch of obtuse and/or manufacturer specific options, when Android has had full disk encryption available out of the box since 4.0

    - Encryption is not your primary problem. Endpoint Management is. It doesn't matter a lick if your device is encrypted if it is swiped while it is unlocked, or if it gets malware inserted into it via an SD card or browser exploit. You need to be able to enforce what is installed on the phone so that you can force malware detection software. You also need to be abl

It is easier to write an incorrect program than understand a correct one.

Working...