Securing Android for the Battle Space

By Tim Skutt

Tim Skutt photo

Armed conflict has radically changed.  Remotely operated unmanned vehicles and cyber warfare highlight this change.  Combatants can launch an attack anywhere from a few hundred meters away to half a world away with the same devastating results.  One of the fascinating – and scary – parts of this change is that the trigger firing the weapon has become the Enter key on a keyboard or a finger press on a touchscreen.

Essentially, the geography of the battlefield now includes the mobile devices we carry – whether we carry them into the physical front lines being fought with kinetic weapons, or the virtual front lines that extend to our corporate or even home offices. 

Global defense organizations recognize the value of commercial smart phone and tablet capability for deployment to soldiers in the battlefield, wherever that battlefield may be. The challenge of securing the commercial capability and mobile platform for warfighter use requires end-to-end system threat assessment and incorporating embedded device strategies to minimize cyber-attacks and maintain mission-critical communications.

Continue reading >>

Tweet about this on TwitterShare on Google+Share on FacebookShare on LinkedInEmail this to someone