Detecting Rogue Mobile Devices

Rogue devices are one of the fastest growing security issues that both private sector organisations and governments are faced with. These are unauthorised and unwanted devices that connect to the network and use up the organisations network resources. Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data. 

Cyber criminals often attempt to breach networks by  inserting doctored  mobile devices into the supply chain for final delivery to target organisations. Their aim is to get the rogue devices onto government and commercial premises.

Now the US Department of Homeland Security’s Science and Technology Directorate is testing portable technology that can detect, locate and identify all cellular, Bluetooth, Bluetooth LE and Wi-Fi devices operating within a 3,000 square-foot area. The ability to monitor the electromagnetic spectrum enables real-time detection of wireless devices so that protective operations and law enforcement can detect uninvited wireless devices in meeting spaces, remote offices, hotel rooms, or in the field.

The DHS and the wider government community are continuously in search of capabilities that can be rapidly deployed for temporary field applications, according to the agency’s announcement. The Silicon Valley Innovation Program awarded a Phase 5 Other Transaction Agreement to Bastille Networks, an enterprise threat detection firm, to continue working with DHS to demonstrate how its software-defined radios and machine learning technology can passively monitor an area for wireless device emissions.

Initially developed for the Defense Department, the Flyaway Kit is a portable version of its enterprise product. The self-contained system comes with five sensors, a mini-switch, laptop, cat6 cables and tripods, and it can fit into several types of protective cases for temporary mobile deployments.

The system can detect and locate cellphones and Wi-Fi, Bluetooth and BLE devices within 30 to 90 minutes and then shows the rogue devices as dots on a map.

DHS S&T has acquired the Flyaway Kit for additional independent testing and evaluation in a controlled setting to validate requirements, evaluate cost-benefits and determine the system’s usability in the field, according to gsn.com.

US Dept. Homeland Security:      Search Mobile:       IP Switch:          ResearchGate:    I-HLS

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« Six Big Features Of Cyber Security In 2021
AI Is The New Weapon In The Cyber Arms Race »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.

Netarx

Netarx

Netarx provide real-time deepfake detection for enterprise voice, video and email.