According to Jeff Larson, for the last five months, military officials and officers have continued to use phones that can be attacked by the “Stagefright” bugs, a collection of flaws in the phones’ software code that gives attackers access to everything that flows through compromised devices.
1. How is the military adding to the vulnerability of its cell phone systems?
2. What government agencies have been compromised by Chinese and Russian hackers during this year?
3. What are some of the reasons for the potential vulnerability problems for the military?
4. After reading this article, what are some of the unnecessary risks that the military could eliminate with good internal controls?
Larson, J. (2015) Telecoms, Manufacturers Delaying Critical Patches for Classified Military Smartphones. ProPublica.org, Nov. 9 (Retrievable online at http://www.propublica.org/article/critical-patches-for-classified-military-smartphones-delayed)