
More on security: 20 hot IT security issues
DARPA said the systems it deploys must use an Advanced Encryption Standard (AES)-256 bit encryption algorithm compliant with Federal Information Processing Standard (FIPS) 140-2, o government security standard. In order to meet the encryption objective, DARPA said it is looking for industry and universities to submit a whitepaper with ideas/concepts that describe an innovative existing technology approach that can be deployed in less than 90 days.
Securing smartphones has been an ongoing project for the military. In January the US Air Force said it was looking to decide whether or not to use commercial off-the-shelf (COTS) smart phones, such as Android-based devices or iPhones, and how it can securely process classified voice and data using them.
The Air Force has issued a request for information, not a formal contract solicitation as it is trying to come up with the best plan. Securing smartphones for military use is an absolute necessity if the devices are to find wide applications for field use. The Army has made smartphone development a priority as well.
The military is very interested in getting smartphones out in the field. Last year the Pentagon awarded $6.4 million to the Corporation for National Research Initiatives to build a smartphone app store.
In DARPA's words: "A military apps marketplace will be created to enable rapid innovation to meet user needs based on a direct collaboration between a vibrant and highly competitive development community and involved communities of end-users. The program will address all the challenges - technical, business, and operational - faced to make the new capabilities available for use in the field. The end objective is to transition the resulting systems to the end users in the Services, and to foster a new model for rapidly and effectively acquiring, introducing, maintaining, and enhancing software."
DARPA said the program will lean heavily on existing commercial handhelds for the initial development efforts. Initially, at least two distinct repositories are envisioned: one holding beta apps that are queued for initial app evaluations, and a separate repository holding apps that have been vetted, certified and approved for use.
Follow Michael Cooney on Twitter: nwwlayer8
Layer 8 Extra
Check out these other hot stories:
Google goes ga-ga for huge power tower
Free DARPA software lets gamers hunt submarines
Victoria's Secret no longer, Epsilon breach sees to that
Got gold? You might at record $1,452.50 p/ounce
'We regret to inform you': The Epsilon breach letters you don't want to see
UPDATE: Underwater robots find airline wreckage, bodies
IT "geek squad" wins $319 million Mega Millions lottery
FBI wants you to solve encrypted notes from murder mystery
Get in the ring: protection US, Europe vow to hash out Internet personal privacy












