Detecting Rogue Mobile Devices

Rogue devices are one of the fastest growing security issues that both private sector organisations and governments are faced with. These are unauthorised and unwanted devices that connect to the network and use up the organisations network resources. Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data. 

Cyber criminals often attempt to breach networks by  inserting doctored  mobile devices into the supply chain for final delivery to target organisations. Their aim is to get the rogue devices onto government and commercial premises.

Now the US Department of Homeland Security’s Science and Technology Directorate is testing portable technology that can detect, locate and identify all cellular, Bluetooth, Bluetooth LE and Wi-Fi devices operating within a 3,000 square-foot area. The ability to monitor the electromagnetic spectrum enables real-time detection of wireless devices so that protective operations and law enforcement can detect uninvited wireless devices in meeting spaces, remote offices, hotel rooms, or in the field.

The DHS and the wider government community are continuously in search of capabilities that can be rapidly deployed for temporary field applications, according to the agency’s announcement. The Silicon Valley Innovation Program awarded a Phase 5 Other Transaction Agreement to Bastille Networks, an enterprise threat detection firm, to continue working with DHS to demonstrate how its software-defined radios and machine learning technology can passively monitor an area for wireless device emissions.

Initially developed for the Defense Department, the Flyaway Kit is a portable version of its enterprise product. The self-contained system comes with five sensors, a mini-switch, laptop, cat6 cables and tripods, and it can fit into several types of protective cases for temporary mobile deployments.

The system can detect and locate cellphones and Wi-Fi, Bluetooth and BLE devices within 30 to 90 minutes and then shows the rogue devices as dots on a map.

DHS S&T has acquired the Flyaway Kit for additional independent testing and evaluation in a controlled setting to validate requirements, evaluate cost-benefits and determine the system’s usability in the field, according to gsn.com.

US Dept. Homeland Security:      Search Mobile:       IP Switch:          ResearchGate:    I-HLS

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« Six Big Features Of Cyber Security In 2021
AI Is The New Weapon In The Cyber Arms Race »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.