National Security Agency encryption devices

Fishbowl (secure phone)

Fishbowl is a mobile phone architecture developed by the U.S. National Security Agency (NSA) to provide a secure Voice over IP (VoIP) capability using commercial grade products that can be approved to communicate classified information. It is the first phase of NSA's Enterprise Mobility Architecture. According to a presentation at the 2012 RSA Conference by Margaret Salter, a Technical Director in the Information Assurance Directorate, "The plan was to buy commercial components, layer them together and get a secure solution. It uses solely commercial infrastructure to protect classified data." Government employees were reportedly testing 100 of the phones as of the announcement. The initial version was implemented using Google's Android operating system, modified to ensure central control of the phone's configuration at all times. To minimize the chance of compromise, the phones use two layers of encryption protocols, IPsec and Secure Real-time Transport Protocol (SRTP), and employ NSA's Suite B encryption and authentication algorithms. USMobile has implemented commercial enterprise version of Fishbowl technology via the Scrambl3 mobile apps that run on both Android and iOS platforms. The phones are locked down in many ways. While they use commercial wireless channels, all communications must be sent through an enterprise-managed server. No direct voice calls are allowed, except for 9-1-1 emergency calls. Only NSA approved applications from the NSA enterprise app store can be installed. NSA has published a 100-page overview specification for the Mobility Capability Package. In tandem with the Capability Package there are a series of Protection Profiles. These Protection Profiles list out the requirements a commercial product must meet to be used in the mobile phone architecture. (Wikipedia).

Video thumbnail

Signal - the most secure messenger for everyone

Signal Private Messenger is the most secure messaging app you can install on your phone. Support me through Patreon: https://www.patreon.com/thehatedone Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join - or donate anonymous

From playlist TUTORIALS & HOW TO's

Video thumbnail

Is WiFi Safe?

You've probably heard that wireless internet (WiFi) is dangerous. But is it true? Lauren breaks it down. Learn more at HowStuffWorks.com: http://computer.howstuffworks.com/wireless-network1.htm Share on Facebook: Share on Twitter: Subscribe: http://goo.gl/ZYI7Gt Visit our site: http://

From playlist Medical/Health Stuff

Video thumbnail

THIS is the most private and secure phone on the planet - GrapheneOS review and how to install

IMPORTANT UPDATE: The installation guide mentioned in the second half of this video is OUTDATED. Always follow the official the guide for proper up-to-date instructions: https://grapheneos.org/install/ There is only one spot available for the most private and secure phone you can get - and

From playlist TUTORIALS & HOW TO's

Video thumbnail

Best secure and private email services review - guide to Gmail alternatives and encrypted email

Secure your privacy and claim a new encrypted email at these secure and private email services. Follow my guide to gmail alternatives and end-to-end encryption using private email providers as part of degoogleify campaign. I made this channel because I believe standing up against power an

From playlist TUTORIALS & HOW TO's

Video thumbnail

DEFCON 20: The End of the PSTN As You Know It

Speakers: JASON OSTROM SECURITY RESEARCHER, VIPER LAB (VOICE OVER IP EXPLOIT RESEARCH), AVAYA, INC. KARL FEINAUER VULNERABILITY RESEARCH SOFTWARE ENGINEER, VIPER LAB WILLIAM BORSKEY SENIOR SECURITY CONSULTANT, VIPER LAB The PSTN as you know it is changing. In March of 2012, the NSA annou

From playlist DEFCON 20

Video thumbnail

Power Meter: Equipment Autopsy #66

http://thegeekgroup.org/ - Chris takes apart something that anyone with a high electric bill has probably dreamed of doing at one point. Looking inside a series of power meters, we get to see just how basic their inner workings really are. With a little mojo involving an old toaster, he ev

From playlist Equipment Autopsies

Video thumbnail

Telnet / TelSpy Program (credits Blackbox246)

Video made by Blackbox246, click and subscribe to his channel! http://bit.ly/blackbox246 TelSpy is a very small Batch Program that Monitors your Telnet Server logins, If someone els logs in because it's not SSH secure!!! Then you can still track them on the Keylogger and find the IP

From playlist Latest uploads

Video thumbnail

Waterproof Bluetooth Speaker! | Trakk Go Review

A lot of Bluetooth speakers are weatherproof, but the Trakk Go takes it up a notch. But does it sound any good? Trakk Amazon store: http://bit.ly/ShopTRAKK Trakk main site: http://www.trakktech.com Trakk social media: https://instagram.com/shoptrakk, https://facebook.com/ShopTRAKK, https:

From playlist Tech Reviews

Video thumbnail

Bouncing, Cending, and Twisting Light Show

Mirrors, lenses, and polarizers, oh my! In this episode we show you some amazing effects that you can recreate at home. We make objects seem to disappear, make transparent objects develop colors, turn people upside down, make a mirror out of transparent materials, and show you how to use a

From playlist LSOP Live

Video thumbnail

23C3: A Hacker's Toolkit for RFID Emulation and Jamming

Speaker: Melanie Rieback Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a "computer of the future", bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, an

From playlist 23C3: Who can you trust

Video thumbnail

Web 2.0 Expo Europe: Rafi Haladjian (Violet)

Let All Things Be Connected. Haladjian describes how Violet intends to connect every single object surrounding us to the network and build the Internet of Things.

From playlist Web 2.0 Expo Europe 2008

Video thumbnail

Garden City Ruby Conference - Panel Discussion

Help us caption & translate this video! http://amara.org/v/GF2s/

From playlist GCRC2015

Video thumbnail

The Most Dangerous Folder On Your Computer

This isn't new, by any means, but just the thought of it still scares the crap out of me. Protect yourself. 👇 PULL IT DOWN FOR THE GOOD STUFF 👇 Patreon - https://patreon.com/thelinuxcast Liberapay - https://liberapay.com/thelinuxcast/ Youtube - https://www.youtube.com/channel/UCylGUf9BvQ

From playlist Security

Video thumbnail

Building a Bigger Bowl | Fish Bowl XXL

Damon Barnes describes the process of building the 50 gallon aquarium sized fish bowl for Fish Bowl XXL. âž¡ Subscribe: http://bit.ly/NatGeoWILDSubscribe About National Geographic Wild: National Geographic Wild is a place for all things animals and for animal-lovers alike. Take a journey

From playlist Pets | Nat Geo Wild

Video thumbnail

Ratio & Root Tests | Geometric Series Generalized

Series with a fixed ratio between all the terms were called Geometric Series. However, if there is not a fixed ratio, we can instead consider the limit of the ratios and look at that. This gives us a ratio test with conditions somewhat analogous to the Geometric Series. Similarly, in some

From playlist Calculus II (Integration Methods, Series, Parametric/Polar, Vectors) **Full Course**

Video thumbnail

RailsConf 2015 - High performance APIs in Ruby using ActiveRecord and Goliath

By, Dan Kozlowski & Colin Kelley We had a real-time API in Rails that needed much lower latency and massive throughput. We wanted to preserve our investment in business logic inside ActiveRecord models while scaling up to 1000X throughput and cutting latency in half. Conventional wisdom wo

From playlist RailsConf 2015

Video thumbnail

The Computer Chronicles - Printers and Business Graphics (1985)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1985 Episodes

Video thumbnail

Stanford Professor Fred Turner & Photographer Mary Beth Meehan's New Book: Seeing Silicon Valley

To capture what it’s like to live and work in Silicon Valley –for the affluent, those who are barely getting by, and the many people in between–Stanford communication professor and Silicon Valley scholar Fred Turner teamed up with renowned photographer Mary Beth Meehan to create the new bo

From playlist Stanford Highlights

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Related pages