by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : March 2014
The latest tool for secure communi- cation in government might be the Blackphone. The sleek, black smart- phone uses encryption so users can make secure phone calls, use video chat features and store les securely. And while the Blackphone name may not be well known yet, its creators, Geeksphone and Silent Circle, are at the heart of many efforts to improve secure commu- nications. Meanwhile, in a ling last month with the Federal Communications Commission, Boeing said it had tested "the Boeing Company Black Smartphone," a dual- SIM phone that would allow users to change between personal and business uses. Geeksphone is a Madrid-based company specializing in the develop- ment, promotion and commercializa- tion of open-source mobile telephony. The company launched an Android smartphone in 2009 and the world's rst Firefox OS-powered smartphone in 2013. Silent Circle provides a peer-to-peer platform for encrypted voice, video, text and le transfer on mobile devices via a secure, proprietary network, software and mobile apps. Company executives said last year that government has been an early adopter of the service, particularly U.S. military and intelligence agencies. Blackphone will offer PrivatOS, which the company says is an Android-based operating system without all the usual security holes found on most Android phones. Blackphone was unveiled at Mobile World Congress in February. Silent Circle CEO and co-founder Mike Janke said it would be sold around the world at prices lower than the iPhone 5S or Samsung Galaxy S4. According to the Blackphone website, the the smartphone maintains privacy and security while giving users, "the freedom to choose your carrier, your apps, and your location." Users can make and receive secure phone calls; exchange secure texts; exchange and store secure les; and anonymize activ- ity through a VPN. For its part, Boeing's FCC ling said the Black Smartphone will be targeted to government agencies and contrac- tors in the defense and homeland security markets. Although a price has not been disclosed, the rm said their goal was to offer a price below other encrypted smartphones, according to a report in Defense Systems. • Will government use a black phone for secure calls? BY JOHN BREEDEN II GCN MARCH 2014 • GCN.COM 7 The latest version of SafeGuard En- cryption from Sophos Inc. addresses some of the usability challenges of working with full disk encryption by enabling centralized management of crypto engines built into the Windows and Apple operating systems. Strong encryption is recognized as an effective way to secure digital data, but its use has been limited by its impact on performance and that fact that it often is dif cult to manage and use. Because of this, many users accept the risk of leaving data unencrypted, putting it in danger if a device is lost or stolen. Operating system vendors have ad- dressed part of the problem by incor- porating full disk encryption into recent versions of popular OSs, eliminating the performance hit for disk encryption. Microsoft began including BitLocker in some versions of Windows 7, Vista and Windows Server 2008, and Apple's FileVault 2 is available in OS X Lion and later releases. These OS-based crypto tools have limitations, however. They are not easily managed across an enterprise, and they do not protect data once a computer has been booted and unlocked or when data is sent else- where. SafeGuard's latest contribution to the encryption challenge addresses usabil- ity by creating a uni ed cryptographic environment that leverages native OS encryption and provides encryption for data moved onto mobile or removable devices, into the cloud or to le servers. "We have a single console that man- ages encryption across the entire envi- ronment," said Sophos vice president of product marketing Marty Ward. When OS full disk encryption is being used, SafeGuard allows administrators to centrally manage the BitLocker and FileVault encryption keys for multiple devices. Once the disk has been unencrypted on a running computer, the SafeGuard engine can be used to encrypt and manage data as it moves and is used across the enterprise and in the cloud. SafeGuard supports government approved encryption algorithms includ- ing 128-bit and 256-bit AES. FileVault 2 uses government approved 128-bit XTS-AES encryption, and BitLocker uses AES 128 or 156-bit encryption. • A single console for managing full disk encryption headaches BY WILLIAM JACKSON NEWS.DISCOVERY.COM