The Federal Aviation Administration plans to release its own flight risk assessment tool application in the future as part of a broader campaign to educate the general aviation community on flight safety practices. The FAA said Tuesday its FRAT works to assess risk factors such as type of operation, environment, aircraft, …
Read More »CNAS Report: DoD Should Take New Approach to Mobile Device Procurement, Adopt BYOD Model
The Center for a New American Security has said the Defense Department should implement a new approach to the acquisition of commercial mobile devices and introduce changes to its policies in an effort to advance workforce mobility and update information systems. CNAS made the recommendation in the report “Leveraging Commercial …
Read More »Jim Baker: FBI Uses Data on Mobile Devices, Computers to Aid Investigations
Jim Baker, the FBI’s general counsel, has revealed the law enforcement agency is able to access data stored in some mobile devices and computers during the course of an investigation, Motherboard reported Friday. Lorenzo Franceschi-Bicchierai writes Baker told a public meeting on encryption in Washington D.C. that the FBI came across …
Read More »Anne Rung, Tony Scott: OMB’s Category Mgmt Policy Seeks to Streamline Mobile Device Procurement
The Office of Management and Budget has issued a policy that aims to facilitate the procurement and management of mobile devices and related services by federal agencies through category management. OMB’s Category Management Policy 16-3 seeks to reduce duplicate mobile contracts and help agencies manage their mobile service inventories, Federal Chief Acquisition Officer Anne Rung and …
Read More »DHS, DARPA to Support Mobile Security Tool Devt Based on Continuous Authentication; Vincent Sritapan Comments
The Department of Homeland Security and the Defense Advance Research Project Agency have teamed up to fund a Kryptowire-led project that aims to develop a user authentication tool for mobile devices. Researchers at Kryptowire have created a continuous authentication algorithm that works to validate mobile device users through their behavioral patterns that …
Read More »GAO: Census Bureau Lacks Processes to Manage Interdependencies Between CEDCAP, 2020 Decennial Census Programs
The Government Accountability Office has found that the Commerce Department’s Census Bureau lacks certain procedures to handle interdependencies between the Census Enterprise Data Collection and Processing program and the 2020 Decennial Census initiative. GAO said in a report released Thursday the bureau has failed to implement a single dependency schedule and does not have a combined …
Read More »Frank Konieczny: Air Force Looks to Integrate iPads on DoD Classified Network
The U.S. Air Force is looking at ways to connect Apple iPads on the Defense Department‘s classified network, USAF Chief Technology Officer Frank Konieczny told FCW in an interview posted Tuesday. Sean Lyngaas writes that Air Force CTO Frank Konieczny discussed with FCW how new developments in mobile device security and features built to …
Read More »Anne Rung, Tony Scott: OMB Seeks to Improve Mobile Device, Service Acquisition Through New Policy
The Office of Management and Budget has released a policy that seeks to improve the way federal agencies acquire and manage mobile devices and related services in compliance with the Federal Information Technology Acquisition Reform Act. OMB drafted Category Management Policy 16-2 in an effort to improve pricing and reduce duplication of contracts …
Read More »Army Unveils Online Mobile Apps Store; Matthew MacLaughlin, Brian Robertson Comment
The U.S. Army Training and Doctrine Command has introduced an online store of mobile applications in an effort to improve information access for uniformed personnel, the Army reported Friday. C. Todd Lopez writes soldiers can access interactive digital content and unclassified apps hosted on the TRADOC Application Gateway online store …
Read More »Rep. Anna Eshoo’s Bill Seeks to Counter Cyber Attacks
Rep. Anna Eshoo (D-Calif.) has proposed a bill meant to establish best practices with the goal of combating cyber attacks on U.S. networks. Eshoo said Thursday “system administrators can better protect their networks and consumer data from a majority of known cyber threats” using established “commonsense best practices.” Eshoo, a …
Read More »