Detecting Rogue Mobile Devices

Rogue devices are one of the fastest growing security issues that both private sector organisations and governments are faced with. These are unauthorised and unwanted devices that connect to the network and use up the organisations network resources. Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data. 

Cyber criminals often attempt to breach networks by  inserting doctored  mobile devices into the supply chain for final delivery to target organisations. Their aim is to get the rogue devices onto government and commercial premises.

Now the US Department of Homeland Security’s Science and Technology Directorate is testing portable technology that can detect, locate and identify all cellular, Bluetooth, Bluetooth LE and Wi-Fi devices operating within a 3,000 square-foot area. The ability to monitor the electromagnetic spectrum enables real-time detection of wireless devices so that protective operations and law enforcement can detect uninvited wireless devices in meeting spaces, remote offices, hotel rooms, or in the field.

The DHS and the wider government community are continuously in search of capabilities that can be rapidly deployed for temporary field applications, according to the agency’s announcement. The Silicon Valley Innovation Program awarded a Phase 5 Other Transaction Agreement to Bastille Networks, an enterprise threat detection firm, to continue working with DHS to demonstrate how its software-defined radios and machine learning technology can passively monitor an area for wireless device emissions.

Initially developed for the Defense Department, the Flyaway Kit is a portable version of its enterprise product. The self-contained system comes with five sensors, a mini-switch, laptop, cat6 cables and tripods, and it can fit into several types of protective cases for temporary mobile deployments.

The system can detect and locate cellphones and Wi-Fi, Bluetooth and BLE devices within 30 to 90 minutes and then shows the rogue devices as dots on a map.

DHS S&T has acquired the Flyaway Kit for additional independent testing and evaluation in a controlled setting to validate requirements, evaluate cost-benefits and determine the system’s usability in the field, according to gsn.com.

US Dept. Homeland Security:      Search Mobile:       IP Switch:          ResearchGate:    I-HLS

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« Six Big Features Of Cyber Security In 2021
AI Is The New Weapon In The Cyber Arms Race »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.