Skip to content
Go back

DoD IG report on mobile apps uncovers serious operational and cybersecurity risks - Mobile Security Briefing 2023.092

| Last edited: Yesterday

The Department of Defense’s Inspector General released a management advisory on 9 Feb 2023 titled “The DoD’s Use of Mobile Applications” (version with highlights). The advisory determined that:

A significant area of risk stems from DoD components offering users mobile apps without security assessments and they found:

many unmanaged applications routinely require access to a user’s contact list, location data, and photo library that could reveal sensitive DoD locations and information. Unmanaged applications could also contain malicious code to record screen activity, log keystrokes, or activate the microphone posing a risk of cyber espionage.

The report goes on to provide specific examples (details redacted) demonstrating the real risks present today.

These are, in my opinion, significant and very overdue findings that are of strategic importance to the national security of the United States. Why? Because war fighters and other personnel in the DoD are just like everyone else: they use mobile apps extensively. However, unlike citizen who are not directly involved in the defense of the United States, the information they possess or inadvertently transmit (i.e. GPS, contacts, etc) can lead to serious risks to both DoD information but also our war fighters.

There are many instances of these security incidents in the news (and many that never see the lights of day) and I’ve included just a few examples include:

The Management Advisory goes on to make 16 recommendations, 14 of which they “consider unresolved because management officials did not fully address or did not respond to the recommendations.”

While the advisory does not contain all of the recommendations, the recommendation to periodically vet mobile apps remains contested. DoD IG responded to the DoD CIO’s push back with:

Although we acknowledge that DISA assesses applications before adding them to the application stores, DISA does not have a process to periodically review the list of authorized unmanaged applications and remove those applications from the list that do not have a justifiable need, have known cybersecurity risks, or are banned by the DoD.

This topic is obviously an area where I am an expert and can validation that continuous vetting of mobile apps is possible via automation and software-assisted penetration testing. If you’d like to learn more, please contact me on LinkedIn or through my company’s (NowSecure) contact us page.


Share this post on:

Previous Post
How to build an iOS app with GitHub Actions [2023]
Next Post
Mobile Security and Privacy Weekly Digest - 2003.08