Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

U.S. Army Slammed for Poor Mobile Security Practices

According to a report from the Pentagon Inspector General, the U.S. Army isn’t implementing an effective cybersecurity program for commercial mobile devices, such as tablets and smartphones.

According to a report from the Pentagon Inspector General, the U.S. Army isn’t implementing an effective cybersecurity program for commercial mobile devices, such as tablets and smartphones.

The assistant Inspector General, Alice F. Carey, says that if the devices continue to remain insecure, “malicious activities could disrupt Army networks and compromise sensitive [Dept. of Defense] information.”

The spot-check conducted by the Pentagon Inspector General’s office included a full accounting of mobile devices (smartphones and tablets) used at West Point and ERDC, excluding BlackBerry, from October 1, 2010 until May 31, 2012.

The report criticizes Army CIO, Lt. Gen. Susan Lawrence, for failing to implement “an effective cybersecurity program” for commercial mobile devices.

Specifically, the report adds, Lt. Gen. Lawrence didn’t track commercial mobile devices appropriately, and was unaware of more than 14,000 such devices being used throughout the Army.

Other listed failures include failure to use MDM to protect sensitive information on devices at West Point (U.S. Military Academy) and the Engineer Research and Development Center (ERDC); a failure to sanitize commercial devices properly, in addition to the failure to ensure they could be remotely wiped if lost or stolen.

“These actions occurred because the Army CIO did not develop clear and comprehensive policy for [commercial mobile devices] purchased under pilot and non-pilot programs. In addition, the Army CIO inappropriately concluded that [commercial mobile devices] were not connecting to Army networks and storing sensitive information. As a result, critical information assurance controls were not appropriately applied, which left the Army networks more vulnerable to cybersecurity attacks and leakage of sensitive data,” the report says.  

The CIO’s office and the CIO’s at West Point and ERDC have until April 25 to respond and begin addressing the issues.

Advertisement. Scroll to continue reading.

Bringing the point close to home, Sophos’ Beth Jones asks: “If the United States Army, with all the endless policies, is having a difficult time with BYOD, how is a small or medium-sized business going to cope?” 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.