U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. About Us
  3. Site Links
  4. Archived
  5. News Archive
  6. News Release: DHS Delivers Study on Government Mobile Device Security to Congress

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

News Release: DHS Delivers Study on Government Mobile Device Security to Congress

Release Date: May 4, 2017

For Immediate Release
DHS S&T Press Office (202) 254-2385

Study on Mobile Device SecurityWashington—The Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile devices and recommends security improvements within the mobile device ecosystem. The DHS Science and Technology Directorate (S&T) led the study in coordination with the National Institute of Standards and Technology and its National Cybersecurity Center of Excellence.

Mandated by the Cybersecurity Act of 2015, the “ Study on Mobile Device Security” relied on significant input from mobile industry vendors, carriers, service providers and academic researchers.

“The Study on Mobile Device Security has found that threats to the mobile device ecosystem are growing, but also that the security of mobile computing is improving,” said Dr. Robert Griffin, Under Secretary (Acting) for Science and Technology. “It outlines several important recommendations to strengthen security that will help the Federal government keep pace with current and emerging threats.”                               

Along with S&T, several DHS components contributed to the mobile device security study:

  • Management Directorate Office of the Chief Information Security Officer
  • National Protection and Programs Directorate (NPPD)
  • NPPD Office of Emergency Communications
  • National Cybersecurity and Communications Integration Center, National Coordinating Center for Communications
  • NPPD United States Computer Emergency Readiness Team (US-CERT)
  • Office of Cybersecurity and Communications Network Security Deployment

The improvement in security can be attributed to significant safeguards implemented by mobile operating system vendors and Federal departments and agencies implementing enterprise mobility management systems to manage their mobile devices and applications. Meanwhile, the areas that need improvement will provide the opportunity for the Federal government, industry and the research community to work together to solve the gaps in mobile device defenses.

The study found that the threats to the Federal government’s use of mobile devices — smartphones and tablet computers running mobile operating systems — exist across all elements of the mobile ecosystem. These threats require a security approach that differs substantially from the protections developed for desktop workstations largely because mobile devices are exposed to a distinct set of threats, frequently operate outside of enterprise protections and have evolved independently of desktop architectures.

Threats to mobile devices range from those perpetrated by nation-states, organized crime or hackers to loss or theft of mobile phones. Additionally, threats that target consumers — such as social engineering, ransomware, banking fraud, eavesdropping, identity theft, and theft of services or sensitive data — also impact Federal government users, according to the study.

Further, Federal government mobile device users may be targeted with additional threats simply because they are public-sector employees. Lastly, the study warns that Federal government mobile devices could become an avenue to attack back-end computer systems containing the data of millions of Americans and sensitive information related to Federal government functions.

The study, which also drew support from the Department of Defense and General Services Administration, presents a series of recommendations to enhance Federal government mobile device security. Key recommendations include:

  • Adopt a framework for mobile device security based on existing standards and best practices.
  • Enhance Federal Information Security Modernization Act (FISMA) metrics to focus on securing mobile devices, applications and network infrastructure.
  • Include mobility within the Continuous Diagnostics and Mitigation program to address the security of mobile devices and applications with capabilities that are on par with other network devices (e.g., workstations and servers).
  • Continue the DHS S&T applied research program in Mobile Application Security to enable the secure use of mobile applications for government use.
  • Establish a new program in mobile threat information sharing to address mobile malware and vulnerabilities, including ways to handle Common Vulnerabilities and Exposures generation.
  • Coordinate the adoption and advancement of mobile security technologies into operational programs to ensure that future capabilities include protection and defense against mobile threats.
  • Develop cooperative arrangements and capabilities with mobile network operators to detect, protect against, and respond to threats (e.g., SS7/Diameter vulnerabilities, rogue IMSI catchers) and, if necessary, extend the legal authorities of the DHS National Protection and Programs Directorate to achieve these objectives.
  • Create a new defensive security research program to address vulnerabilities in mobile network infrastructure and increase security and resilience.
  • Increase active participation by the Federal government in key mobile-related standards bodies and industry associations.
  • Develop policies and procedures regarding U.S. Government use of mobile devices overseas based on threat intelligence and emerging attacker tactics, techniques, and procedures.

DHS has a responsibility to not only secure the means of communication used by departments and agencies, but to safeguard the nation against emerging threats in both the physical and cyber domains. Mobile technology is essential to the United States not just for government use, but also for the security and integrity of communications for businesses and citizens. DHS’s mission is to ensure a homeland that is safe, secure and resilient. This report outlines steps by which DHS could further these objectives against the proliferation of threats against mobile technologies and infrastructures.

###

Last Updated: 01/12/2023
Was this page helpful?
This page was not helpful because the content