New mobile security prototyping contracting between Privoro and the United States Air Force leverages the SafeCase, intelligent smartphone case.
Back in 2016, I sat down with Privoro, a mobile hardware security solutions provider. Privoro CEO and Founder Mike Fong and his team demonstrated to me just how easy it was for an intruder to hack an iPhone and not only access internal files, but also access the device's cameras and microphones. This leads to another level of security that's easily compromised, yet often overlooked by information security teams—visual and audible data.
Three years later, Privoro tops security headlines as it has landed a mobile security prototyping contract with the United States Air Force's innovation arm.
SEE: Information security policy template download (Tech Pro Research)
What the US Air Force-Privoro partnership means
The US Air Force has arms devoted to tech innovation called the Air Force Research Lab (AFRL) and AFWERX. Specifically, AFWERX will work with Privoro to address government mobile security and productivity issues and manage our service men's and women's devices and the implementation of Privoro's SafeCase product, a high-security, intelligent smartphone case, which will be attached to the stock of iPhones used in the field.
The SafeCase attaches to the iPhone and with a toggle on the case will jam the phone's mic signal as well as cover the phone's cameras.
In addition to these hardware attachments, Privoro will also work with the Air Force to provide a more enhanced way of managing and tracking mobile devices via the Air Force's existing Blue Force Tracking. This will allow the Air Force to amplify Command Center awareness and improve agent safety for both contiguous and outside the contiguous US. Blue Force Tracking is the commonly known name of the interface used by the armed services to track friendly assets via GPS signal. This is great for not only delivering communication to field agents but also for locking out a device from private information if its ever compromised. Think of it as a kill switch connected to each field agent's device.
What are your thoughts?
What are your thoughts? I've given up on my private data being "private," but news like this is a rather optimistic. Tag me on Twitter with your thoughts or leave a comment below.
- Cheat sheet: How to become a cybersecurity pro (TechRepublic)
- 10 dangerous app vulnerabilities to watch out for (TechRepublic download)
- Online security 101: Tips for protecting your privacy from hackers and spies (ZDNet)
- The best password managers of 2019 (CNET)
- Cybersecurity and cyberwar: More must-read coverage (TechRepublic on Flipboard)