By Mike Mount
Combat troops to four-star generals will soon be able to use cell phones or mobile tablets to quickly share classified information anywhere in the world.
The program soon to be rolled out by the Pentagon will allow the more than 600,000 Defense Department employees who use government-issued "smart" mobile devices to send top-secret information on those units or computers.
Until now, classified and other highly sensitive information has only been allowed to be shared by specially designated desktop systems.
Most Defense Department mobile device users peck away at Blackberries. Another 41,000 use Apple devices and a much smaller number use Android-based technology, according to statistics provided by the Pentagon.
The secure network would apply to all of those technologies.
"The application of mobile technology into global operations, integration of secure and non-secure communications, and development of portable, cloud-enabled capability will dramatically increase the number of people able to collaborate and share information rapidly," said Teri Takai, the Pentagon's chief information officer.
Mobile users range from ground troops in Afghanistan to the Joint Chiefs chairman to Pentagon policy wonks.
The motive for the Pentagon is to get a system in place as mobile technology increasingly advances.
The Pentagon eventually hopes to phase in a larger number of users and involve vendor competition to build a system that could possibly handle the agency's more than three million employees, officials said.
The initial system will allow mobile "smart" device users to run apps, e-mail and other functions securely even in remote and hostile locations.
The system will operate on commercial carrier networks that are able to handle classified data, according to Pentagon officials who briefed reporters on the plan.
Takai said the biggest challenge for the Pentagon has been to design a system that can fully leverage all of the uses of the "smart phones" in a way that allows the users to communicate securely.
"The challenge for the DOD is to balance the concern of cyber security with the need to have the capability of these devices," Takai said.
Have you ever heard of second life (sl for short). It is basically a online game where you can do anything you want. SL is literally my second life (pun intended lol). If you would like to see more you can see these second life websites and blogs
http://thisteachinglife.blogspot.com/2004/05/undercutting-professionalism-or.html
Have you ever heard of second life (sl for short). It is essentially a online game where you can do anything you want. sl is literally my second life (pun intended lol). If you would like to see more you can see these sl articles and blogs
http://myvedana.blogspot.com/2007/06/keep-taking.html?m=0
Have you ever heard of second life (sl for short). It is essentially a video game where you can do anything you want. Second life is literally my second life (pun intended lol). If you want to see more you can see these Second Life authors and blogs
http://amusingspace.blogspot.com/2007/10/new-media-new-literacies-new-teaching.html
Have you ever heard of second life (sl for short). It is essentially a game where you can do anything you want. Second life is literally my second life (pun intended lol). If you want to see more you can see these sl authors and blogs
http://everydayliteracies.blogspot.com/2003/05/teaching-award-glynda-hull-well.html?showComment=1570104600332
I don't know about you people but I am obsessed with airplanes. I had a friend in highschool that loved airplanes, so here are some airplane related stuff I don't know about you guys but I love airplanes. I had a friend in highschool that loved airplanes, so here are some airplane related stuff https://www.airlinereporter.com/2010/07/awesome-carbon-fiber-seats-on-qantas-airbus-a380s/
http://everydayliteracies.blogspot.com/2003/06/?m=0
I don't know about you people but I infatuated with airplanes. I have a friend in highschool that loves airplanes, so here are some airplane related stuff I don't know about you guys but I love airplanes. I had a friend in highschool that loved airplanes, so here are some airplane related stuff https://www.airlinereporter.com/2009/10/northwest-airlines-flight-188-overshoots-airport-by-150-miles/
http://urlm.co/g/c/f/163873
Have you ever heard of second life (sl for short). It is basically a online game where you can do anything you want. SL is literally my second life (pun intended lol). If you would like to see more you can see these sl authors and blogs
http://everydayliteracies.blogspot.com/2003/05/teaching-award-glynda-hull-well.html?showComment=1561554866831
Have you ever heard of second life (sl for short). It is essentially a game where you can do anything you want. SL is literally my second life (pun intended lol). If you want to see more you can see these sl articles and blogs
http://myvedana.blogspot.com/2014/01/translocal-assemblages.html
Have you ever heard of second life (sl for short). It is basically a game where you can do anything you want. sl is literally my second life (pun intended lol). If you want to see more you can see these sl authors and blogs
http://everydayliteracies.blogspot.com/2008/10/cool-looking-photoshop-tutorial-i.html?showComment=1226325900000
This was great! I would like you to clean up all this spam though
https://www.linkedin.com/in/yusufhanafy
This was great! I would like you to clean up all this spam though
https://www.linkedin.com/in/yusufhanafy
This was great! I would like you to clean up all this spam though
https://www.linkedin.com/in/yusufhanafy
This was great! I would like you to clean up all this spam though
https://www.linkedin.com/in/yusuf-hanafy-82493b183
Have you ever heard of second life (sl for short). It is essentially a video game where you can do anything you want. sl is literally my second life (pun intended lol). If you would like to see more you can see these Second Life articles and blogs
http://rumblingstrips.blogspot.com/2009/01/job-seeks-blogger.html
https://www.electricpercolatorcoffeepot.com/10-top-coffee-bloggers/
https://www.electricpercolatorcoffeepot.com/10-top-coffee-bloggers/
I simply encountered your site and loved this a lot. We saved it, continue the good work!
http://yourmatrixcashmachine.com
The PLA IT Brigades are going to have a field day with these "secure" communication apps.
They are going to lose it. just watch. I can't begin to tell you how many letters I have recieved from the military saying, "Sorry we lost another laptop with 25,000 peoples information on it." So now my question is what is the punishment for that?
RSA, you're an idiot. You think since something is extremely difficult to achieve that makes it impossible just because you can't figure it out? That is one hell of an ego.
Interesting... but aren't Apple devices manufactured in China? What could possibly go wrong.
To all who say that this is easily hackable please answer the following:
1. How do you plan on breaking RSA with 2056 bit encryption? – currently this has not even been close to getting done.
2. How do you plan on breaking AES 256?
That's the point, the encryption would not need to be broken. Information could be captured before it's even passed to the app. The user's finger can't be encrypted!
In November 2010 Endre Bangerter, David Gullasch and Stephan Krenn published a paper which described a practical approach to a "near real time" recovery of secret keys from AES-128 without the need for either cipher text or plaintext. The approach also works on AES-128 implementations that use compression tables, such as OpenSSL.[29] Like some earlier attacks this one requires the ability to run unprivileged code on the system performing the AES encryption, which may be achieved by malware infection far more easily than commandeering the root account.[
On July 1, 2009, Bruce Schneier blogged[17] about a related-key attack on the 192-bit and 256-bit versions of AES, discovered by Alex Biryukov and Dmitry Khovratovich,[18] which exploits AES's somewhat simple key schedule and has a complexity of 2119. In December 2009 it was improved to 299.5. This is a follow-up to an attack discovered earlier in 2009 by Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolić, with a complexity of 296 for one out of every 235 keys.[
At RSA conference 2010 in San Francisco, the cryptographer panel consisting of legends such as Ron Rivest of MIT, Adi Shamir, and former NSA director Brian Snow cited one of the highlights from 2009 was the fact that both AES-128 and AES-256 have been broken. It took a lot of people by surprise that these two modes could be broken and the next logical question to ask would be is it no longer useful for data protection?
Absurd. In every OS there is an untold amount of potential exploits. Using a mainstream OS for this is just asking for a major breach of security. Regardless of how secure the app may or may not be, a hacker could always capture sensitive data by hacking through the OS, maybe at the hardware level by intercepting the touch screen coordinates on the virtual keyboard for example. With $700+ billion per year I'm surprised the military cannot develop their own OS for this hardware.
That makes more since then anything on here. The only problem will apple be able sue the US for patent infringement?!
They need to follow the chain of command back on this one and fire who ever came up with this stupid idea.
Thank you for broadcasting it to the world. by tomorrow chinese will hack it and the day after tomorrow pentagon employees will use the same app to communicate the hacking news to each other.
Just create it and let us all hackers have easily access to that.
And where and by whom were the "smart" devices (or for that matter any device in the network) built? Anything is only as secure as its weakest link and there are plenty of different possible points of failure in the full path of any data.