{"id":26877,"date":"2014-10-21T03:41:10","date_gmt":"2014-10-21T07:41:10","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26877"},"modified":"2014-10-21T03:41:10","modified_gmt":"2014-10-21T07:41:10","slug":"will-new-commercial-mobile-encryption-affect-byod-policy","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/will-new-commercial-mobile-encryption-affect-byod-policy.php","title":{"rendered":"Will new commercial mobile encryption affect BYOD policy?"},"content":{"rendered":"<p><p>    Mobility  <\/p>\n<p>    While law enforcement is up in arms about new default data    encryption on Apple iOS and Google Android devices, experts say    the policy could have some benefits for federal mobility as    well.  <\/p>\n<p>    Apple and Google are banking that consumers will want increased    security for data stored on their devices. The default    encryption policy means codes that unlock phones are known only    to the users who set them, and can't be cracked using    garden-variety cryptographic attacks. The companies can't share    unlock codes with law enforcement, because they do not know    them.  <\/p>\n<p>    According to FBI Director James Comey, this is potentially    disastrous for public safety. In a     speech last week, he warned of potentially dire    consequences for law enforcement from the encryption of data    stored on devices, or data at rest. Comey worries the FBI won't    be able to access sought-after data, even with a legal warrant    or other authorization, because the companies are not    maintaining a back door for law enforcement.  <\/p>\n<p>    The flip side is that a lost or stolen device will not yield up    its secrets -- an important feature for federal employees and    other users who trade in confidential, non-public or secret    information.  <\/p>\n<p>    The Mobile Security Reference Architecture (MSRA),    the CIO Council's handbook for mobility management, lists    encryption for data at rest as a key security feature. David    Carroll, chief federal architect at cybersecurity firm FireEye,    led the team that wrote the MSRA when he was at the Department    of Homeland Security. Carroll told FCW in an email interview    that \"in general, integrated and device implemented encryption    is a benefit to users for protecting data at rest from    compromise and making it difficult for malware to run due to    the required access to the containers and [encryption] keys.\"  <\/p>\n<p>    There are a few \"buts\" here, Carroll noted. There is the    potential problem of lost data, which can be magnified when a    fed is using a personal device connected to an agency network.    \"Agreements for [bring your own device polices] will have to    cover restoration of access to government owned data on the    device if they are used for government use,\" Carroll told FCW.  <\/p>\n<p>    There will also need to be a significant degree of trust. The    way encryption works, making a unique and virtually unbreakable    key out of an access code and hardware embedded in the device    means it would be \"difficult for federal network administrators    to escrow or keep a secure copy of the keys so that access can    be restored to the data if the employee isn't able, or the    device isn't accessible independent of the owner or user,\"    Carroll said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/fcw.com\/articles\/2014\/10\/20\/mobile-encryption-and-federal-byod-policy.aspx\/RK=0\/RS=F4s1ijo0tNPZcEMJLBjQLQOHFyo-\" title=\"Will new commercial mobile encryption affect BYOD policy?\">Will new commercial mobile encryption affect BYOD policy?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Mobility While law enforcement is up in arms about new default data encryption on Apple iOS and Google Android devices, experts say the policy could have some benefits for federal mobility as well. Apple and Google are banking that consumers will want increased security for data stored on their devices. The default encryption policy means codes that unlock phones are known only to the users who set them, and can't be cracked using garden-variety cryptographic attacks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-26877","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26877"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26877"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26877\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}