NSA Mobile Device Best Practices
NSA Mobile Device Best Practices
NSA Mobile Device Best Practices
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the
users can take to better protect personal devices and information.
Airplane mode Bluetooth® Cellular service signal Location Near-field communication (NFC) Recent applications soft key Wi-Fi
case that drowns the and applications as soon as by a malicious actor. YES X NO
! POP-UPS
microphone to block room possible.
audio (hot-miking attack). Unexpected pop-ups like this are
Cover the camera when usually malicious. If one appears,
not using. ! TRUSTED ACCESSORIES forcibly close all applications
BIOMETRICS (i.e., iPhone ®2: double tap the
Only use original charging cords or Home button* or Android ®3:
CONVERSATIONS charging accessories purchased click “recent apps” soft key).
Consider using Biometrics
(e.g., fingerprint, face) from a trusted manufacturer. DO NOT
DO NOT have sensitive use public USB charging stations.
authentication for
conversations in the Never connect personal devices to
convenience to protect data
vicinity of mobile devices government computers, whether via
of minimal sensitivity.
not configured to handle physical connection, Wi-Fi,
secure voice. or Bluetooth®.
*For iPhone X ®2 or later, see: support.apple.com/en-us/HT201330 The information contained in this document was developed in the course of NSA’s Cybersecurity mission, including its
responsibilities to assist Executive departments and agencies with operations security programs.
1
Bluetooth is a registered trademark of Bluetooth SIG, Inc.
®
2
iPhone ® and iPhone ® applications are a registered trademark of Apple, Inc. U/OO/155488-20 | PP-20-0622| Oct 2020 rev 1.1
3
Android ® is a registered trademark of Google LLC.
National Security Agency | Mobile Device Best Practices
Spearphishing
(To install
Malware)
Malicious Apps
Zero-Click
Exploits
THRE AT/ VULNER ABILIT Y
Malicious Wi-Fi
Network/Close
Access Network
Attack
Foreign Lawful
Intercept/
Untrusted
Cellular
Network
Room Audio/
Video
Collection
Call/Text/Data
Collection Over
Network
Geolocation of
Device
Close Access
Physical
Attacks
Supply Chain
Attacks