recommended reading

NIST seeks vulnerability analysis for military Android apps

Flickr user zallio

The National Institute of Standards and Technology is seeking vulnerability analysis and security scanning for the Pentagon’s Android software applications, according to a solicitation posted Thursday.

The tools will be used to audit intelligence and imagery applications used by ground troops on tablets and handheld devices in Iraq and Afghanistan. The solicitation, which closes Aug. 24, did not disclose whether there was an incumbent contractor performing this task and whether it would be invited to rebid.

The creation of a secure architecture would bolster a digital distribution platform for apps that the Defense Advanced Research Projects Agency has been trying to roll out through an initiative called Transformative Apps.

The platform was envisioned to be similar to an app store where users download music and games onto smartphones, but security standards have to be higher because the programs available on the platform are used for sensitive missions.

The apps could be used to collect and push data to a widely-used map-based intelligence program called Tactical Ground Reporting, better known as TIGR in military circles. TIGR allows ground troops to log bomb threats, observations and incidents, weaving intelligence gathered by soldiers onto maps so that military strategists can get better situational awareness in theater to make decisions.

Vulnerability testing tools that are not commercially available would be needed to prevent malware-ridden apps from infecting military systems. If a successful security framework can be established for the app marketplace, this would reinforce Android as the favored operating system in the military.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.