Mobile Government and Defense

Mobile Government and Defense

Jim Jones
Copyright: © 2012 |Pages: 12
DOI: 10.4018/978-1-61350-150-4.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The Government, Military, and Intelligence communities of the United States and other countries are adopting mobile technologies almost as quickly as commercial entities, and in some cases are going beyond the applications we see in the commercial space. Government services, such as information access and certain transactions, are rapidly adopting mobile delivery mechanisms. The military is using mobile technology to share static information as well, but is also providing live data feeds and information sharing to support combat operations. Intelligence agencies are using mobile devices as a data collection platform for their own agents, and are also accessing the mobile devices of enemy agents and intelligence targets to collect data surreptitiously. Military operations face unique challenges, given that they are often conducted in regions without existing networks and against an enemy trying to actively disrupt communications. The Government, Defense, and Intelligence communities all face the challenge of securing mobile devices and data in response to regulatory and statutory requirements, as well as a dynamic and evolving threat space of identity thieves, hackers/crackers, hostile military forces, and foreign intelligence services.
Chapter Preview
Top

Government Services

Description and Mission

Consider the elements of the United States or another government (federal, state, and local) which provide direct1 services to citizens and residents. With the exception of the profit motive, these organizations function like many commercial enterprises. Specifically, both commercial and government entities need to conduct bidirectional informational and financial transactions with their “customers”. While the two types of entities operate under different sets of laws and regulations, both have requirements to protect information and transaction data, to authenticate users, to provide reliable services, etc. - in short, to protect the confidentiality, integrity, and availability of the information and systems relevant for the services provided. In the examples which follow, we discuss applications of mobile technologies to government services and the relevant assurance criteria, i.e., authentication (none, one, or both parties), transaction security (protected or not), and availability (critical or not). After discussing several current and potential uses of mobile technology for providing government services, the section concludes with a discussion of relevant challenges.

Complete Chapter List

Search this Book:
Reset