Related Stories

  • ACLU asks FTC to investigate AT&T and Verizon over Android security updates
    The American Civil Liberties Union has filed a 16-page complaint with the US Federal Trade Commission accusing mobile carriers of “unfair and deceptive business practices” by failing to warn their customers about known, unpatched mobile security flaws, especially in Android devices. It’s a claim that is likely to prove controversial.
  • Mobile malware increased by 163% in 2012; 95% aimed at Android
    Android is the prime target for mobile malware; China is the most infected country; criminality is getting better organized; users are not learning lessons; and there’s no improvement in sight – all from the latest report on mobile malware.
  • US Army has gaping BYOD mobile security holes
    The effects of the bring-your-own-device (BYOD) phenomenon are being felt across the US military, according to a report from the US Inspector General’s office. It found that US military data security is woefully lacking when it comes to device tracking and policy enforcement. Most alarmingly, the military CIO’s office was found to be unaware of more than 14,000 mobile devices in active use across the US Army.
  • DHS teams with DoD on cybersecurity project with industry
    The US Department of Homeland Security (DHS) is working with the Department of Defense (DoD) on a pilot project to share cybersecurity threat information with industry.
  • DoD could spend $13 billion on cybersecurity by fiscal year 2016
    The TechAmerica Foundation, a nonprofit research affiliate of TechAmerica, is predicting a surge in cybersecurity spending by the Department of Defense (DoD), from $8 billion in fiscal year 2012 to $13 billion in fiscal year 2016 if the country suffers a major cyberattack.

Top 5 Stories


DoD approves Android, BlackBerry 10 smartphones for use by soldiers

07 May 2013

US soldiers will soon be able to get their Android on…sort of. The US Department of Defense has approved the use of Samsung’s hardened, secure version of Android in smartphones used by the military, along with BlackBerry 10 devices.

BlackBerry phones were previously the only allowed devices for the armed services, thanks to BlackBerry’s server-based security, so the Android approval could vastly widen choice for service members. The BBC also reported that other gadgets will soon be available as well: approval for other Android devices and Apple phones and tablets is expected later in the month.

DoD spokesman Lt Col Damien Pickart told the news agency that this move is “the first step of a strategy that would let soldiers use many different types of devices, both smartphones and tablets, during their tours of duty.”

It could be a serious windfall for Samsung: right now, the DoD supports around 600,000 smartphone users, 470,000 of whom were using Blackberry handsets. The other 130,000 are part of a trial initiative to test iPhones and other Android devices for security approaches.

Federal News Radio also reported that the DoD is assessing commercial bids for a secure mobility management system to accompany a big overall smartphone push: the military plans to more than double the number of secure mobile devices deployed, by 2014.

Samsung’s hardened version of Android, appropriately called “Knox,” was developed to meet military and enterprise standards for security. The Customizable Secure Boot ensures that only verified and authorized software can run on the device. TrustZone-based Integrity Measurement Architecture (TIMA) provides continuous integrity monitoring of the Linux kernel. When TIMA detects that the integrity of the kernel or the boot loader is violated, it takes a policy-driven action in response. One of these policy actions disables the kernel and powers down the device.

In addition, Android security enhancements provide an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements. It isolates applications and data into different domains so that threats of tampering and bypassing of application security mechanisms are reduced, while the amount of damage that can be caused by malicious or flawed applications is minimized.

This article is featured in:
Compliance and Policy  •  Industry News  •  Malware and Hardware Security  •  Public Sector  •  Wireless and Mobile Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×