Wednesday, November 16, 2011

The role of the smartphone on the digital battlefield


Posted by John Keller

The Android smartphone and mobile tablet computer soon will play major roles on the digital battlefield, as government agencies join forces with the aerospace and defense industry to find ways to safeguard these technologies from hackers, eavesdroppers, and attempts steal sensitive information by reverse engineering.

U.S. government agencies -- particularly the National Security Agency (NSA) and the U.S. Department of Defense (DOD) are beginning to embrace commercially developed data-encryption algorithms, as well as software virtualization technologies that enable classified and unclassified information to run together on the same mobile device.

At the same time, industry is developing Wi Fi technologies to enable fighting forces on the front lines to exchange sensitive and classified information securely among handheld devices like tablet computers, smartphones, and wearable computers for situational awareness, targeting information, and intelligence gathering.



It's only a matter of time before a soldier on the front lines observes enemy movement, whips out a rugged smartphone from a vest pocket, takes a picture, and sends that information over a secure and mobile wireless local area network to warn colleagues nearby, as well as to send that time-critical information by satellite up the chain of command.

Military forces are eager to dip into the deep well of commercially developed mobile communications technology such as smartphones and tablets. Still, it almost doesn't matter whether the military wants to use this technology or not; the technology is coming, ready or not.

New recruits to the military forces expect to use the same technologies on the battlefield that they used every day in the civilian world, and the military -- even if it wanted to -- would be virtually powerless to stop this technological tidal wave.

Today, the military's major tasks in this regard are to find commercially developed mobile communications technology that offers good-enough capability, good-enough reliability, and good-enough security for use on the front lines.

The key phrase here is good enough. The days of gold-plated military-specific technologies are drawing to a close, and fast. The biggest and most immediate benefit of this, with little doubt, is involving smartphones, tablets, and other commercial mobile technology.

No comments:

Post a Comment