iPhones, 'droids go to WAR: US soldiers invade TOP-SECRET cloud

Chiefs stop short of letting BYOD tech onto classified networks


Spooks and soldiers will get iPhones and Android kit after the top brass promised to open up its top-secret communication networks to handsets beyond BlackBerrys.

A new US Department of Defense implementation plan - which covers the Army, Navy, Air Force, CIA and tech research group DARPA - will allow employees of all levels to use the latest and best commercial mobiles, including those from Apple and Samsung. "Classified voice and data communications up to classification level of top secret will be supported", according to the blueprint.

The document [PDF], issued today by DoD chief information officer Teri Takai, reveals that the US government will buy 600,000 mobile devices from a range of suppliers. The department currently uses 450,000 BlackBerry handsets. The war on America's enemies will be partly won on the mobile internet, said Takai:

This is not simply about embracing the newest technology - it is about keeping the department’s workforce relevant in an era when information accessibility and cyber-security play a critical role in mission success.

Putting US soldiers in the cloud will give them an edge, added the report:

The development of portable, cloud-enabled command-and-control capability will dramatically increase the number of people able to collaborate and share information rapidly.

In a pilot study, DARPA will use "secure iPads" to access top-secret networks.

The department mulled the possibility of opening a Bring Your Own Device (BYOD) scheme to employees, but decided officially against it on the basis of the "security gap" in worker-bought devices. However, two developments could put it back on the table: hyper-secure virtual desktop software, and hardened devices built on secure crypto-processors (aka TPM chips) that separate the personal and professional uses of a phone.

DoD chiefs are also considering bolting future tech developments onto current commercial mobes - such as biometric checks and encrypted voice traffic. ®


Other stories you might like

  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading
  • UK government having hard time complying with its own IR35 tax rules
    This shouldn't come as much of a surprise if you've been reading the headlines at all

    Government departments are guilty of high levels of non-compliance with the UK's off-payroll tax regime, according to a report by MPs.

    Difficulties meeting the IR35 rules, which apply to many IT contractors, in central government reflect poor implementation by Her Majesty's Revenue & Customs (HMRC) and other government bodies, the Public Accounts Committee (PAC) said.

    "Central government is spending hundreds of millions of pounds to cover tax owed for individuals wrongly assessed as self-employed. Government departments and agencies owed, or expected to owe, HMRC £263 million in 2020–21 due to incorrect administration of the rules," the report said.

    Continue reading

Biting the hand that feeds IT © 1998–2022