The Warfighter Integrated Navigation System's sensors calculate a soldier's current location using footsteps, speed, acceleration, time and even altitude from his or her last known location.
An expert at the Federal Trade Commission has some ideas for how to make access requests and information flows more secure using incentives and opportunities based on the principle of least privilege.
According to the Office of Management and Budget's most recent estimate – done in 2012 – the federal government spends approximately $1.2 billion yearly on about 1.5 million mobile devices and related wireless services.
Searches are often driven by "need-to-know information" rather than passive consumption, "which aligns with a lot of the information and resources government agencies provide on their digital properties," according to the DigitalGov post.
The companies were among more than 140 civil society groups, corporations, trade associations and security and policy experts urging President Obama to promote rather than undercut data encryption technology.
The Federal Communications Commission is looking for feedback on whether cellphones that haven't been activated should be required to connect to 911.
The principle of least privilege, which holds that "every program and every user of the system should operate using the least set of privileges necessary to complete the job," is key to ensuring and maintaining security in a mobile world, says an FTC official.
Some "unscrupulous" third-party merchants obtained consumers' telephone numbers to cram illegal charges, ranging from one-time fees of 99 cents to $4.99 to monthly subscriptions of $9.99.
A much larger 11-member panel revisited the case, saying that Davis doesn't own the cellphone records because they were created by a third party telephone company for legitimate business purposes.
Although the digital divide in terms of technology haves and have-nots has narrowed, new research reveals racial differences in usage.