Skip to main content

This section of the ISM provides guidance on wireless devices and Radio Frequency transmitters.

Radio Frequency devices

Many RF devices, such as mobile devices, can pose a security risk to organisations when they are capable of picking up and recording or transmitting background conversations. In highly classified environments, it is important that organisations understand the security risks associated with the introduction of RF devices and should maintain a register of those that have been authorised for use in such environments.

Security Control: 1543; Revision: 1; Updated: Aug-19; Applicability: S, TS
An authorised RF devices for SECRET and TOP SECRET areas register is maintained and regularly audited.

Security Control: 0225; Revision: 2; Updated: Sep-18; Applicability: S, TS
Unauthorised RF devices are not brought into SECRET and TOP SECRET areas.

Security Control: 0829; Revision: 4; Updated: Mar-19; Applicability: S, TS
Security measures are used to detect and respond to unauthorised RF devices in SECRET and TOP SECRET areas.

Bluetooth and wireless keyboards

While there have been a number of revisions to the Bluetooth protocol that have made incremental improvements to its security over time, there have also been trade-offs that have limited these improvements, such as maintaining backward compatibility with earlier versions of the protocol. While newer versions of the Bluetooth protocol have addressed many of its historical weaknesses, it still provides inadequate security for the communication of sensitive or classified information. As such, sensitive or classification information communicated using Bluetooth will need to be limited to within RF screened buildings.

Security Control: 1058; Revision: 2; Updated: Oct-19; Applicability: O, P, S, TS
Bluetooth and wireless keyboards are not used unless in an RF screened building.

Infrared keyboards

When using infrared keyboards with SECRET systems, drawn curtains that block infrared transmissions are an acceptable method of protection.

When using infrared keyboards with a TOP SECRET system, windows with curtains that can be opened are not acceptable as a method of permanently blocking infrared transmissions.

Security Control: 0222; Revision: 2; Updated: Sep-18; Applicability: O, P
When using infrared keyboards, infrared ports are positioned to prevent line of sight and reflected communications travelling into an unsecured space.

Security Control: 0223; Revision: 4; Updated: Sep-18; Applicability: S
When using infrared keyboards, the following activities are prevented:

  • line of sight and reflected communications travelling into unsecured spaces
  • multiple infrared keyboards for different systems being used in the same area
  • other infrared devices being used in the same area
  • infrared keyboards operating in areas with unprotected windows.

Security Control: 0224; Revision: 4; Updated: Sep-18; Applicability: TS
When using infrared keyboards, the following activities are prevented:

  • line of sight and reflected communications travelling into unsecured spaces
  • multiple infrared keyboards for different systems being used in the same area
  • other infrared devices being used in the same area
  • infrared keyboards operating in areas with windows that have not had a permanent method of blocking infrared transmissions applied to them.

Wireless RF pointing devices

As many wireless RF pointing devices used Bluetooth, they along with other wireless RF pointing devices can pose an unacceptable emanation security risk, unless used in an RF screened building.

Security Control: 0221; Revision: 2; Updated: Sep-18; Applicability: TS
Wireless RF pointing devices are not used in TOP SECRET areas unless used in an RF screened building.

Further information

Further information on the use of mobile devices can be found in the Guidelines for Enterprise Mobility.

Further information on the use of Bluetooth devices with mobile devices can be found in the mobile device management section of the Guidelines for Enterprise Mobility.

Further information on wireless networks can be found in the wireless networks section of the Guidelines for Networking.