Armed with powerful mobile devices, consumers and employees have become the force behind a wireless wave of change. Whether they are seeking where their tax refund is, looking for discounted prices, discussing/following/liking an idea or person, these mobile end-users are growing impatient with enterprises that are still trying to control behavior and the sharing of information. Enterprises that fail to learn how to give ...more »
Implement a task command interface that allows a severely disabled user to "Ask What They Need to Know", "Say What They Want to Do" or access a Task Menu Display to perform application tasks and receive audio/visual feedback.
Analyze the proposed architecture for security and recovery defects.
Too often government strategic plans neglect legislative and regulatory requirements imposed on the agencies. Rightly the focus is on opportunities to modernize and participate in new models technical transformations can offer. For the Federal Mobility Strategy to be successful, it must be implementable without unduly exposing agencies to legal and administrative risks. Legal and regulatory requirements for security, ...more »
What if...? The Federal Government is the legal owner or tennant of tens or hundreds of thousands of servers, network and storage devices and probably millions of desktops and laptops worldwide... Imagine if a mobile app available on all pupular mobile devices could automatically scan, identify and assign location to every federal IT asset with a barcode. Then it could communicate that encrypted information over existing ...more »
A federal identity management standard combined with set of mobile applications for communication (web, voice, text, e-mail, video), collaboration (online document sharing), productivity (word processing, spreadsheets, presentations, online publishing), HR, travel and expense reporting that would empower all federal workers to fully support their mission at any time from anywhere on any device.
A Mobile Strategy should not be developed in a vacuum from an agency’s Cloud Strategy. Mobility is dependent on where data is stored, how it is accessed, and how you can manipulate it. Understanding where and how an agency will store and secure the data that is necessary to make the applications useful and empower the end user will make a mobile strategy more effective. The Federal Mobility Strategy must integrate, ...more »
Federal Agencies should consider using multi factor authentication and risk based authentication, similar to what the mobile banking industry as adopted. The challenge with mobile devices, is that they can be easily lost, stolen or in some cases even hacked. Strong credential based authentication is not enough to stop unwanted access. Adding a risk- based challenge layer behind existing authentication can greatly increase ...more »
Instead of requiring Government test and certification of solutions, publish IA standards and require industry to certify their solutions' compliance with those standards. Mobile technologies change at a rate that far outpaces the Government's ability to remain current. If Industry knew in advance what standards were required, they could certify compliance themselves with periodic investigation by a trusty entity or ...more »
Government should foster secure, NIST compliant, collaboration and crowdsourcing technologies within and across government agencies to make information sharing more efficient and effective. A variety of information is collected across agencies, and agency-specific security limitations inhibit information transfer. Creating one collaboration platform accessible across agencies will increase speed of communication and information ...more »
Government enterprise-wide mobile strategy cannot be limited to simply purchasing mobile devices. Agencies and departments need to recognize the need to establish short- and long-term plans and strategies for mobile deployment and mobile application development. Without a strategy for effectively using mobile in the federal space, mobile application and device deployment will be inefficient and costly.
End nodes (mobile devices in this case) are by far easier to penetrate than big, federal networks/clouds and are used in both risky and trusted areas (thus the End Node Problem). AFRL is developing (and will soon deploy) a authentication testbed any federal agency may use to evaluate (mobile) devices while accessing Google Apps for Government. Recommend the FMS include support for R&D of security since most commercial ...more »
Before any major initiative can even be discussed, the US government MUST pass laws to protect online speech at the same levels of offline speech. This must include, but not be limited to: - Warrants to access GPS signals - Bans on data mining of personal data (including anonymized approaches) - Bans on roving wiretaps - Bans against Deep Packet Inspection - Strict limitations on acceptable uses of cookies - 4th amendment ...more »