Automatic Identification & Mitigation of Unauthorized Information Leaking from Tactical Mobile Networks
Final rept. 29 Sep 2011-28 Sep 2013
INVINCEA LABS LLC FAIRFAX VA
Pagination or Media Count:
Most hand-held mobile devices today are equipped with a phone, web browser, music player, camera, and a horde of other applications and services. Google Android, NeoFreeRunner, Nokia Maemo, iPhone OS and Windows Phone OS are noteworthy hand-held device platforms capable of performing most of the functions previously found only in full-fledged desktop operating systems. Usability of such devices is further increased by the availability of third-party applications that can be purchased or freely downloaded by users from online application stores or developer websites. Unfortunately, few of these applications provide the required level of security to protect the sensitive, potentially mission critical data that they access and store. Furthermore, while the major mobile device manufactures have given much lip service to security for their respective platforms, all currently fall way short of providing the robust security controls required to securely operate these devices in a tactical or other mission critical environment. This issue is under scored by the fact that no DoD accreditation authority has yet to accredit and authorize the use of any commercial mobile devices in a tactical environment despite the need and demand for the capabilities that such devices provide for the warfighter.
- Computer Systems Management and Standards
- Radio Communications