<section title="11.4. Mobile Telephony"><subsection title="Objective"><paragraph
    title="11.4.1."


><![CDATA[<p>Mobile telephone systems and devices are prevented from communicating unauthorised classified information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.4.2."


><![CDATA[<p>This section covers information relating to the secure use of mobile telephones, tablets and other mobile, voice communication capable devices, as well as the systems they use to communicate information.</p>]]></paragraph>
<paragraph
    title="11.4.3."


><![CDATA[<p>Mobile devices use RF in various parts of the spectrum to communicate including Wi-Fi, cellular, satellite, RFID, and NFC frequencies. All such mobile devices are considered to be transmitters.</p>]]></paragraph>
<paragraph
    title="11.4.4."


><![CDATA[<p>Mobile devices with cellular capability will regularly “poll” for the strongest signal and base or relay station. Monitoring such activity can be used for later interception of transmissions.</p>]]></paragraph>
<paragraph
    title="11.4.5."


><![CDATA[<p>Information regarding Voice over Internet Protocol (VoIP) and encryption of data in transit is covered in <a title="Video &amp; Telephony Conferencing and Internet Protocol Telephony" href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a> and <a title="Cryptographic fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="11.4.6."


><![CDATA[<p>It is important to note that VoIP phones have some of the same vulnerabilities as the mobile devices discussed in this section.</p>]]></paragraph>
<paragraph
    title="11.4.7."


><![CDATA[<p>Mobile devices can be equipped with a variety of capabilities including internet connectivity, cameras, speakerphones, recording and remote control. Such devices are also susceptible to Internet malware and exploits. All risks related to the use of the Internet will apply to mobile devices with 3g/4g/5g capability.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.4.8."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Mobile device usage policy"><paragraph
    title="11.4.9.R.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


><![CDATA[<p>All mobile devices are subject to interception. The required level of expertise needed varies greatly. Accidentally or maliciously revealing classified information over mobile devices can be intercepted leading to a security breach.</p>]]></paragraph>
<paragraph
    title="11.4.9.C.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2691"
><![CDATA[<p>Agencies MUST develop a policy governing the use of mobile devices.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.4.10.R.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using mobile devices. It is important that personnel are aware of what levels of classified information they discuss as well as the wide range of security risks associated with the use of mobile devices.</p>]]></paragraph>
<paragraph
    title="11.4.10.C.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2694"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations using both internal and external mobile devices.</p>]]></paragraph>
<paragraph
    title="11.4.10.C.02."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2695"
><![CDATA[<p>Agencies SHOULD advise personnel of all known security risks posed by using mobile devices in areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Use of mobile devices"><paragraph
    title="11.4.11.R.01."

    tags="Communications systems,Encryption,Technical,Mobile Devices,Mobile Telephony"


><![CDATA[<p>When classified conversations are to be held using mobile devices the conversation needs to be appropriately protected through the use of encryption measures and a secure network.</p>]]></paragraph>
<paragraph
    title="11.4.11.C.01."

    tags="Communications systems,Encryption,Technical,Mobile Devices,Mobile Telephony"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2698"
><![CDATA[<p>Agencies intending to use mobile devices for the transmission of classified information MUST ensure that:</p><ul>
<li>the network has been certified and accredited for the purpose; </li>
<li>all classified traffic that passes over mobile devices is appropriately encrypted; and</li>
<li>users are aware of the area, surroundings, potential for overhearing and potential for oversight when using the device.</li>
</ul>]]></paragraph>
</block>
<block title="Mobile Device Physical Security"><paragraph
    title="11.4.12.R.01."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


><![CDATA[<p>Mobile devices are invariably software controlled and are subject to malware or other means of compromise. No “off-hook” or “power off” security can be effectively provided, creating vulnerabilities for secure areas. Secure areas are defined in <a title="Secure area" href="http://nzism.gcsb.govt.nz/ism-document#Block-12020">Chapter 1 at 1.1.36</a>.</p>]]></paragraph>
<paragraph
    title="11.4.12.C.01."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2701"
><![CDATA[<p>Mobile devices MUST be prevented from entering secure areas.</p>]]></paragraph>
<paragraph
    title="11.4.12.C.02."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="2702"
><![CDATA[<p>Agencies SHOULD provide a storage area or lockers where mobile devices can be stored before personnel enter secure or protected areas.</p>]]></paragraph>
</block>
</subsection>
</section>
