Detecting Rogue Mobile Devices

Rogue devices are one of the fastest growing security issues that both private sector organisations and governments are faced with. These are unauthorised and unwanted devices that connect to the network and use up the organisations network resources. Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data. 

Cyber criminals often attempt to breach networks by  inserting doctored  mobile devices into the supply chain for final delivery to target organisations. Their aim is to get the rogue devices onto government and commercial premises.

Now the US Department of Homeland Security’s Science and Technology Directorate is testing portable technology that can detect, locate and identify all cellular, Bluetooth, Bluetooth LE and Wi-Fi devices operating within a 3,000 square-foot area. The ability to monitor the electromagnetic spectrum enables real-time detection of wireless devices so that protective operations and law enforcement can detect uninvited wireless devices in meeting spaces, remote offices, hotel rooms, or in the field.

The DHS and the wider government community are continuously in search of capabilities that can be rapidly deployed for temporary field applications, according to the agency’s announcement. The Silicon Valley Innovation Program awarded a Phase 5 Other Transaction Agreement to Bastille Networks, an enterprise threat detection firm, to continue working with DHS to demonstrate how its software-defined radios and machine learning technology can passively monitor an area for wireless device emissions.

Initially developed for the Defense Department, the Flyaway Kit is a portable version of its enterprise product. The self-contained system comes with five sensors, a mini-switch, laptop, cat6 cables and tripods, and it can fit into several types of protective cases for temporary mobile deployments.

The system can detect and locate cellphones and Wi-Fi, Bluetooth and BLE devices within 30 to 90 minutes and then shows the rogue devices as dots on a map.

DHS S&T has acquired the Flyaway Kit for additional independent testing and evaluation in a controlled setting to validate requirements, evaluate cost-benefits and determine the system’s usability in the field, according to gsn.com.

US Dept. Homeland Security:      Search Mobile:       IP Switch:          ResearchGate:    I-HLS

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« Six Big Features Of Cyber Security In 2021
AI Is The New Weapon In The Cyber Arms Race »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.

Ciena

Ciena

Ciena is a global leader in optical and routing systems, services, and automation software. We build the world’s most adaptive networks to address ever-increasing digital demands.