A years-long "game" of stealing and trading nude photos from suspects' cell phones has come to an end for several California Highway Patrol (CHP) officers, who have been accused of misconduct.
The Army will be fielding a smartphone app to help soldiers better determine their drinking water needs so they can carry just enough to stay hydrated.
Several options may be available to law enforcement officials concerned that recent actions by companies to protect and encrypt data on smartphones and other mobile devices could impact their investigations, according to a recent Congressional Research Service brief.
Americans are turning more frequently to mobile devices to perform activities they used to rely on desktop and laptop computers for, according to a new report.
Two agencies – the Energy Department and the Defense Finance and Accounting Service, or DFAS – recently presented a webinar showcasing their efforts in implementing a responsive web design and the difficulties they faced.
The Justice Department said it will review whether a Drug Enforcement Administration agent went too far when he used photographs and other personal information taken from a woman's cell phone to set up a fake Facebook account as part of an investigation.
Police use of a device that lets officers zero in on the location of cellphones – and thereby persons of interest or suspects – is being kept under wraps by the FBI, according to a document released last month through a Freedom of Information Act request.
FBI Director James Comey has criticized Apple and Google for saying they would not give law enforcement officials access to their customers' smartphones even if they wanted to because those devices will be encrypted.
Mobile technology is helping direct mail become more interactive, particularly for advertisers, says the Postal Service inspector general in a Sept. 22 report (pdf) on mail innovation. Connected mail connects recipients to a digital experience via a mobile device.
The National Institute of Standards and Technology issued the second draft of a "building block" document federal agencies or enterprises could use to secure mobile devices that connect to the organization's network. The guide is customizable, as it takes a layered approach to security, and also practical and repeatable because it offers standards-based solutions using commercially available technology.