Making Sensitive Data Location Aware 69
An anonymous reader writes "In a breakthrough that could aid spies, keepers of medical records, and parents who want to prevent their kids from 'sexting,' a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown. The phones are given permission to access sensitive data while in a particular room, but when the devices leave the room, the data is completely wiped. A general, for example, could access secret intelligence while visiting a secure government facility without fear that his or her smart phone or tablet computer might later be lost or stolen, the team's lead researcher said. 'This system provides something that has never been available before. It puts physical boundaries around information in cyberspace.'" Unless the phone or other device can also take screenshots, or doesn't have that software installed.
like what happened with Anthony Weiner (Score:3)
a radio host just took a picture of the pictures on the phone's screen with his phone's camera
Re: (Score:2)
Re: (Score:2)
The External Transmitter Feature Disabler that'll really work is called a nuclear bomb.
Unless the phone can copy files (Score:1)
Re: (Score:3)
The issue is not necessarily that it can be gotten around, so much as that it will make it harder for someone to use the information from an unauthorized location.
Re: (Score:2)
Re: (Score:2)
sexting (Score:1)
"parents who want to prevent their kids from 'sexting,'" - so they can only sext from a particular room?
Re: (Score:2)
I guess taking pictures would be allowed only in areas where other people are expected to be around. It's highly unlikely the kids would 'sext' there, and if they did, it certainly wouldn't go unnoticed.
Re: (Score:2)
I don't see how this is related to "sexting", though.
Re: (Score:2)
The only way this would work if it was ubiquitous and mandatory. "No pictures here" signal in public bathrooms, changing rooms etc would be grand. I don't see how this is related to "sexting", though.
It's related in the "this is a buzzword that will get us in the newspapers". See "protect the children".
Re: (Score:2)
Ah, another engineer who thinks they can outsmart the combined hormones of every high school student in America.
Re: (Score:2)
Ah, I understand now... (Score:2)
It's Genius!
Re: (Score:1)
how has region encoding been working on DVD's for the mpaa?
Re: (Score:1)
Re: (Score:1)
if you're already in a secure facility (Score:1)
why would you ever bother looking at information on your smart phone? the example given of a general viewing classified information inside a secure facility is idiotic. They're in a secure facility, with some sort of digital copy of the information present. Why would they ever transfer that information to their phone or tablet instead of just viewing it on a terminal in the facility?
Re: (Score:3)
maybe because sometimes you want to be able to take those documents to a meeting with you...which may very well be in the same secure facility, but not near a terminal.
sometimes when i am at work i like carrying my laptop to a meeting so i can show others the stuff i was working on, so even in a facility with terminals all over the place it is still nice if the data can remain somewhat portable.
Re: (Score:2)
Re: (Score:2)
And, assuming that the government approves this technology for handling classified materials, this will be included in among those strict conditions. Obviously there are procedural and regulatory hurdles to overcome here, but what you point out is precisely the problem that this technology seeks to solve. In the non-classified world, many of us carry some sort of laptop, tablet or phone with us all the time, and use it to take notes, respond to e-mail, etc in meetings and classes. this tech could give a
Re: (Score:2)
Depends on what is "classified".
True classified/sec/TS/SCI stuff, no way.
However, company data like next model releases and such are a different story, and if leaked, may hit a rumor mill, but won't be as damaging as a list of agent names (and their families) winding up public.
I would love to see this implemented on servers in an encrypted HDD controller. If the server is moved, access to the data on the HDDs is lost until a proper smart card is inserted and a PIN given. This would help deter data loss if
Prevent "sexting"? (Score:3, Insightful)
Seriously, the prudish "adult" world needs to grow the fuck up and stop treating teens as children. They're exploring their sexuality, and they need guidance showing how their actions have repercussions, not a digital chastity belt. This arbitrary "16 and no younger" is great for protecting teens from predators, but crap for biology; Teens' hormones don't comply to the Whatever The Hell Law Makes "Sexting" a Crime Act.
Re: (Score:1)
2) It's up to the parent, not to you, me or anyone else, to determine what constitutes healthy sexual exploration and behavior..
3) There are plenty of people like you who will not use the software, you can all pat yourselves on the back, somehow liking sex means you're more intelligent than the rest of people... somehow..
4) There are plenty of people who will use this software and not bother you at all about what you do, so
Re: (Score:1)
1) It's scientific fact their brians aren't as mature as you seem to think at 16.
But the day of their 16th birthday they magically become mature?
Re: (Score:1)
bah, sorry, meant 18th.
Re: (Score:2)
Re: (Score:1)
No, it's more like 30 or 32. I'm not even there yet (almost, couple more years), and I know I have a long way to go, so stop kidding yourself.
You're kidding yourself by thinking you are still climbing the brain power totem pole. We are at the peak (27-28) right now, man... it's all downhill from a nuts and bolts perspective afterwords. :)
I can't learn quite a easily as I used to be able to, but hopefully the accumulated knowledge (wisdom?) makes up for it.
Re: (Score:2)
1) It's scientific fact their brians aren't as mature as you seem to think at 16.
I don't think they're mature at all; I've worked in secondary education, and know very well how teens often have very short term ideas regarding consequence. That is why they need education, not prohibition; To prepare them for later life when consequences can take years to manifest.
2) It's up to the parent, not to you, me or anyone else, to determine what constitutes healthy sexual exploration and behavior..
Yes. However, the parent is often, in this day and age, absent. They rely in daycare education to bring up their child, and this kind of technology is just the kind of thing they would grasp with two hands in order to avoid taki
Re: (Score:3)
1) Its a scientific fact that people were popping babies out as early as 12, 2000 years ago.
2) Its a scientific fact that people are not totally monogamous
3) Its a scientific fact that people have been "doing it" before marriage for over 50,000 years
4) Its a scientific fact that people crave sex for reproduction of the human race
5) Its a scientific fact that STD's can be minimized significantly with protection
6) Its a scientific fact that during puberty, your hormones are encouraging sex more than as a
Re: (Score:1)
Re: (Score:2)
NPR just did a piece on this:
Brain Maturity Extends Well Beyond Teen Years [npr.org]
Re: (Score:3)
Re: (Score:2)
Your comment deals with issues which are not related to the subject at all. Important issues, but totally irrelevant here.
naughty or nice (Score:2)
Santa just called. He wants his elf-master of the list back before this junket of free association into the infinite void permanently curls his toes into cranky hang nails. Santa's old experiment with CRM114 automation did not go well. Return the elf, now!
in related news (Score:1)
In related news, a team at Harvard/MIT/(your favorite school here) has developed stupidity-aware smartphones. On detecting the low brainwave activity of a stupid person, the phone immediately shuts down. The device was invented last year, but public relations officials at the universities had been unable to get the news out by phone. They hit upon the strategy of using the internet only earlier this week.
Re: (Score:2)
Dang, no more pictures of naked cheerleaders!
There are some neat things you can do with GPS (Score:2)
The one I like the most is location-based reminders, where the alarm is activated when you go at a specific place, like 'don't forget to buy milk' when you go to the supermarket.
Re: (Score:1)
The one I like the most is location-based reminders, where the alarm is activated when you go at a specific place, like 'don't forget to buy milk' when you go to the supermarket.
In that case, don't forget about the alarm for "don't forget to go to the supermarket" when you are anyplace but the supermarket.
Re: (Score:3)
Re: (Score:1)
fourth year students
Second-year students. It's the time when students know enough to do something but not enough to avoid doing it seriously wrong.
Won't work (Score:2)
I'll just chime in like the rest. A system like this fails to appreciate that data is the thing and it is not executable.
Once data is made accessible, then the device accessing it, can do whatever it wants. Such software based systems rely on the integrity of the client which should never be relied upon.
All one would need is some means of capturing and copying the data once presented. After that, the game is over.
Would this work for 95% of all users? Probably... unless the purpose is restricting teens.
Re: (Score:2)
I think the examples involving cooperative clients who WANT to protect themselves but might make an error made a lot more sense. This technology makes a great deal more sense in that context.
Re: (Score:2)
in the case of teens, it is going to be a rate between 33% and 75% in my estimation depending on how difficult the solution is to implement.
Actually, they'll probably just do it the old fashioned way - pull her boyfriend into the bathroom and show him in person.
Entirely off topic, except for the VT part (Score:2)
Don't bother watching this, unless you happened to click through from the main page because it had Virginia Tech in the headline.
http://www.youtube.com/watch?v=-4LssHXZjIA [youtube.com]
I'm not sure whether to be excited that VT had made it so mainstream in the last 25 years, or saddened that it took football to raise the profile of a primarily academic/technical institution. Actually, now that I come to think of it, I don't give a shit - I'm just happy to see us on TV. :-)
More about that general. (Score:3)
More likely: that general would leave the room, discover that the data he needed for his upcoming meeting had been removed from the phone, and then raise holy hell to have the damn system shut down forever.
Re: (Score:2)
Serious 3D Info Protection (Score:2)
I don't have any idea how this works, but one of the biggest problems facing any company is information that "migrates" outside the company and most of it is confidential files.
They seemed to talk of phones and pads/tablets in the article, but I wonder if it extends to laptops and other computer equipment. More info is needed.
Obviously a photo from any camera can not be locked down as there is no electronic connection to an isolated camera.
Circular reasoning (Score:2)
Problem: You can't trust your device to reliably store information without leaking it.
Solution: Trust your device to reliably delete that data automatically.
Actual solution: Stop relying on untrusted blackbox devices. Particularly in the military, which can theoretically afford the technical manpower to scrutinize and audit source code, closed-source software should be banned. The general in the example is smart enough to know when to delete stuff from his phone, but he needs to be sure the information is a
Re: (Score:1)
Oh, this is a Software Solution..... (Score:2)
Oh, this is a Software Solution..... yeah, that will will work properly 100% of the time. Move along.
Previous work (Score:2)
Re: (Score:2)
I was thinking along the same lines. Why just transmit a binary in-range/not-in-range signal, when you can transmit a key instead (with proper anti-sniffing safeguards)?
Another possible solution to this problem is remote storage of the sensitive files; out of range, can't access the files.
Of course, all of these options require a modification to the device so that the application gets killed and memory gets wiped when you leave the range of the file.
another dodge (Score:2)
or the phone can fake the location data. which I suspect isn't hard if you have a reason to do it.
Little behind at VT eh? (Score:2)
There is already software in the market place that does this? Even McAfee offers it in their mobile device management solution.