The Defense Mobile Classified Capability–Secret has moved out of the pilot phase with the latest release that provides improved call interoperability, failover or redundancy, and a new mobile device management system.
New technical specifications from the National Institute of Standards and Technology enable smart identity card holders to access government computer networks from mobile devices.
The Advanced Technology Academic Research Center and Mitre Corp. recently released a report that summarized collaborative sessions, including one on a bring-your-own-device program, during the Federal Mobile Computing Summit in February.
In a November 2012 report, the DHS inspector general found that less than 0.25 percent of the 479 radio users tested could access and use the common channel. Additionally, only 78 of 382 radios tested, or about 20 percent, had all the correct program settings for the common channel.
Two California Senate bills – one mandating that law enforcement get a warrant before accessing electronic communications and another requiring public comment before cell phone intercept technology can be adopted locally – have advanced in the last week and a half.
An expert at the Federal Trade Commission has some ideas for how to make access requests and information flows more secure using incentives and opportunities based on the principle of least privilege.
The companies were among more than 140 civil society groups, corporations, trade associations and security and policy experts urging President Obama to promote rather than undercut data encryption technology.
The principle of least privilege, which holds that "every program and every user of the system should operate using the least set of privileges necessary to complete the job," is key to ensuring and maintaining security in a mobile world, says an FTC official.
A much larger 11-member panel revisited the case, saying that Davis doesn't own the cellphone records because they were created by a third party telephone company for legitimate business purposes.
As work moves forward on a nationwide public safety broadband network, the National Institute of Standards and Technology released guidelines for addressing identity management across the new system.