Announcement

Collapse
No announcement yet.

Military Coders Deploy iPod Touch, iPhone on Duty

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Military Coders Deploy iPod Touch, iPhone on Duty

    Kinda neat article,

    Even the Military is using I Phones Now

    Source: http://www.pdfzone.com/c/a/Authoring...Phone-on-Duty/

    With the freedom to develop their own apps, military officials are using soldiers' familiarity with the iPod Touch and iPhone to deploy Apple's platform for networked warfare. From language translators to ballistics calculators to remote controls for bomb-detonating robots, the iPod Touch and iPhone are proving military worthy.

  • #2
    Re: Military Coders Deploy iPod Touch, iPhone on Duty

    This seems like a good thing. Using a COTS (commercial off the shelf) solution instead of spending lots of our money to develop something just for the military that wouldn't have as many applications.

    Comment


    • #3
      Re: Military Coders Deploy iPod Touch, iPhone on Duty

      Originally posted by cpw View Post
      This seems like a good thing. Using a COTS (commercial off the shelf) solution instead of spending lots of our money to develop something just for the military that wouldn't have as many applications.
      Agreed -

      Comment


      • #4
        Re: Military Coders Deploy iPod Touch, iPhone on Duty

        Originally posted by cpw View Post
        This seems like a good thing. Using a COTS (commercial off the shelf) solution instead of spending lots of our money to develop something just for the military that wouldn't have as many applications.
        unless it can be easily compromised,
        Push sticks/blocks Save Fingers
        ~~~~~~~~~~~~~~~~~~~
        "The true measure of a man is how he treats someone who can do him absolutely no good."
        attributed to Samuel Johnson
        ~~~~~~~~~~~~~~~~~~~
        PUBLIC NOTICE: Due to recent budget cuts, the rising cost of electricity, gas, and oil...plus the current state of the economy............the light at the end of the tunnel, has been turned off.

        Comment


        • #5
          Re: Military Coders Deploy iPod Touch, iPhone on Duty

          Originally posted by BHD View Post
          unless it can be easily compromised,
          These applications don't seem as if they are particularly prone to compromise. For example, a simple phrase book or ballistics calculator has no need for networking.

          As an aside, making something secure isn't easy. It helps that the iPhone and other commercial gizmos have lots of people trying to hack into them. More eyes on the target is a good thing, because you'll be able to correct the published exploits. If it is a military only device, your adversary is unlikely to publish the exploits; and I don't believe you are actually less likely to have the security holes.

          Comment


          • #6
            Re: Military Coders Deploy iPod Touch, iPhone on Duty

            One cool thing about the iPhone is that you can wipe them remotely. So if one gets lost or captured, HQ just wipes it clean. You can also locate them remotely, so if you need to go in and extract someone it is one more tool to help get the guy home.
            Steve
            www.MorrisGarage.com

            Comment


            • #7
              Re: Military Coders Deploy iPod Touch, iPhone on Duty

              It helps that the iPhone and other commercial gizmos have lots of people trying to hack into them. More eyes on the target is a good thing, because you'll be able to correct the published exploits.
              So the iPod, a popular piece of hardware & OS that everyone is trying to hack into is a good thing, because you become aware of holes, backdoors, or other potential methods of compromising the product and its security sooner, and can response with corrections through updates. Did I get that right?

              I think that is what you said more or less.

              Funny how when its Apple and people are trying to hack into your system it's a good thing, and when you're the most prevalent OS on the planet with the widest installed base, you're pushing crap because everyone and their brother is trying to hack your product because if they can get in and gain control then they have access to a much larger population of victims.

              It's all clear now.
              "When we build let us think we build forever. Let it not be for present delight nor for present use alone. Let it be such work that our descendants will thank us for, and let us think, as we lay stone upon stone, that a time is to come when these stones will be held sacred because our hands have touched them, and that men will say, as they look upon the labor and wrought substance of them, "See! This our fathers did for us."
              John Ruskin (1819 - 1900)

              Comment


              • #8
                Re: Military Coders Deploy iPod Touch, iPhone on Duty

                Originally posted by Bob D. View Post
                So the iPod, a popular piece of hardware & OS that everyone is trying to hack into is a good thing, because you become aware of holes, backdoors, or other potential methods of compromising the product and its security sooner, and can response with corrections through updates. Did I get that right?

                I think that is what you said more or less.
                Yes, exactly.

                Funny how when its Apple and people are trying to hack into your system it's a good thing, and when you're the most prevalent OS on the planet with the widest installed base, you're pushing crap because everyone and their brother is trying to hack your product because if they can get in and gain control then they have access to a much larger population of victims.

                It's all clear now.
                For Apple or Microsoft, it isn't good, because they have to invest the time and resources to fix it and defend against it. However, it is a good thing for their customers. The idea that you are secure because no one knows about something is referred to as security through obscurity, which is not considered a good design principle.

                Another popular phrase in the open source community is "with enough eyeballs, all bugs are shallow." [i.e., if you have enough people look at a problem, the solution is obvious to one of them].

                http://en.wikipedia.org/wiki/Security_through_obscurity

                Comment


                • #9
                  Re: Military Coders Deploy iPod Touch, iPhone on Duty

                  Originally posted by smorris View Post
                  One cool thing about the iPhone is that you can wipe them remotely. So if one gets lost or captured, HQ just wipes it clean.
                  It's not as straightforward.
                  According to the US Defense Security Service (the document's name is DSS Clearing & Sanitization Matrix) wiping (this an actual term) is considered secure only in the same security zone. A device captured by an enemy is not considered to be in the same security zone. For such scenarios the DoD considers degaussing or physical destruction as the only acceptable methods. These are obviously unavailable if the data storage device is lost.
                  In order to understand recursion, one must first understand recursion.

                  Comment


                  • #10
                    Re: Military Coders Deploy iPod Touch, iPhone on Duty

                    Originally posted by darius View Post
                    It's not as straightforward.
                    According to the US Defense Security Service (the document's name is DSS Clearing & Sanitization Matrix) wiping (this an actual term) is considered secure only in the same security zone. A device captured by an enemy is not considered to be in the same security zone. For such scenarios the DoD considers degaussing or physical destruction as the only acceptable methods. These are obviously unavailable if the data storage device is lost.
                    You're absolutely right that truly wiping a disk by anything other than mechanical means is basically impossible. To prove a point, someone who runs a storage security conference actually shot a few hard drives and was able to get most of the data commercially recovered at low cost.

                    Of course, shooting the disk doesn't actually wipe it, but using software to overwrite the data isn't 100% either because the disk head will track slightly differently on every pass. Thus a capable adversary, could examine the raw platters and recover the data that way. Beyond that, you can't even write to every sector on a modern disk, because "bad" sectors are automatically remapped and you'll never be able to steer your head back over them.

                    Of course this all depends on the capabilities of your adversary. The technological capabilities of a nation state are still greater than many of our now proverbial cave-dwelling enemies.

                    IMO, the best form of secure erasure is to never write unencrypted data to the hard disk in the first place. Erasing the hard disk, then becomes a function of destroying the encryption key (a small amount of data, on the order of 16-128 bytes) rather than the whole disk.

                    Comment


                    • #11
                      Re: Military Coders Deploy iPod Touch, iPhone on Duty

                      All this has been possible for many years, going back to the stone age of personal computers (DOS & floppy disks).

                      The only sure way is to remove the HD and send it through the equivilant of a paper shredder. If you chew the disk platters up into little bits that can't be reassembled its over.
                      "When we build let us think we build forever. Let it not be for present delight nor for present use alone. Let it be such work that our descendants will thank us for, and let us think, as we lay stone upon stone, that a time is to come when these stones will be held sacred because our hands have touched them, and that men will say, as they look upon the labor and wrought substance of them, "See! This our fathers did for us."
                      John Ruskin (1819 - 1900)

                      Comment

                      Working...
                      X