HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
News
Electronics & Test

Secure Android OS Developed for Soldiers

NO RATINGS
View Comments: Newest First|Oldest First|Threaded View
Ann R. Thryft
User Rank
Blogger
Re: Securing mobile devices a huge challenge
Ann R. Thryft   7/11/2012 2:50:29 PM
NO RATINGS
Good question about the iPhone. Does anyone know the answer?

notarboca
User Rank
Gold
Re: Securing mobile devices a huge challenge
notarboca   6/28/2012 5:38:28 PM
NO RATINGS
This is a good first step towards securing battlefield communications.  As was mentioned, soldiers post about their movements, situations, etc. without regard to operational security.  Hopefully, the secure access mechanisms will help prevent this.  Does anyone know of a similar safeguard for the IPhone?  I would think they are just as popular.

Ann R. Thryft
User Rank
Blogger
Re: Securing mobile devices a huge challenge
Ann R. Thryft   6/27/2012 1:09:26 PM
NO RATINGS
One main result of the COTS movement a few years back was that the military depended on leaky, hackable commercial software, as well as hardware, and then spent zillions trying to secure it. The problem has proliferated even more with solders' use of mobile devices. A ton of money has also been spent on attempts to design and/or retrofit secure embedded real-time OS. As Beth points out, remote wiping is not a new idea. OTOH, I'd assume that they've built in various military-specific secure access mechanisms.

NadineJ
User Rank
Platinum
Re: Securing mobile devices a huge challenge
NadineJ   6/27/2012 12:31:48 PM
NO RATINGS
I suspect this would also monitor what the users access, send or their contacts.

From what I've read, there were some missteps in the early days of the current war.  Many would post messages on facebook and other places about what they were doing, where they were, etc, just as many young poeple do at home.  But, in war, that info is more critical.

Beth Stackpole
User Rank
Blogger
Securing mobile devices a huge challenge
Beth Stackpole   6/27/2012 8:05:25 AM
NO RATINGS
Security issues are the biggest problem for companies as they deal with the barrage of employee-owned mobile devices coming into the workplace and onto the corporate network. Obviously, the stakes are much higher when the phones are privvy to military applications or even just used in military environments. I'm wondering what this OS brings to the table, though, beyond any of the mobile device management (MDM) platforms that are widely available. Seems like capabilities like remote wiping of devices if they are lost or stolen is pretty commonplace. What would this offer beyond that?

Partner Zone
Latest Analysis
Hacking has a long history in the movies, beginning with Tron and War Games and continuing through The Girl with the Dragon Tattoo.
In a move that strengthens its 3D design business, Stratasys continued a 15-month buying spree this week by announcing its plan to acquire GrabCAD, a provider of a cloud-based collaboration environment for engineers.
Feature-advantage-benefit could help engineers in how we approach design problems, how we sell our ideas to management, and how we market ourselves when it comes to jobs.
Many diverse markets take advantage of semiconductor IP; so many that no one can recite the entire list without leaving off several. So why do we track all the vertical markets? They all have a unique set of requirements and value attributes differently. One major vertical market segment is automotive.
Adam Berger hacked a computer keyboard into a mini key-tar to play with his band.
More:Blogs|News
Design News Webinar Series
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
6/25/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Sep 22 - 26, MCU Software Development A Step-by-Step Guide (Using a Real Eval Board)
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service