Practice raises alarm after Navy IG report confirms hacking vulnerabilities in mapping apps
Special operators and other troops must stop taking their unsecured personal tablets and smart phones into combat after an internal Navy investigation found that mapping applications can be hacked by hostile actors, cybersecurity experts warn.
U.S. special operators and other troops have been using advanced war-fighting mapping applications for the last several years to reduce the time it takes to call in airstrikes and for better situational awareness and communication between ground forces and overhead aircraft.
However, a non-public Navy Inspector General investigation earlier this year found that two of these widely used mapping applications produced by the U.S. Navy have serious vulnerabilities, the Washington Free Beacon first reported earlier this week.
The mapping applications in question are known as known as KILSWITCH and APASS. KILSWITCH is an acronym that stands for Kinetic Integrated Low-cost Software Integrated Tactical Combat Handheld. APASS stands for the Android Precision Assault Strike Suite.
The IG's findings were cited in a Marine Corps force-wide message in late June warning commanders that the applications are only used on military-issued "hardened" hand-held devices that are not connected to cellular or civilian Wi-Fi networks, not personal devices troops purchased commercially that are far more susceptible to malware and hacking.
More
Why is it the military can use the most sophisticated electronic equipment known to man but makes dumb mistakes like those mentioned?
ReplyDeleteHas anyone heard of horror stories of FISA tracking and monitoring our cell phones at home?
At home, I know I'm vulnerable when it comes to cyber security but am taking more and more precautions.