DOD mandates data encryption for mobile devices
According to a policy signed July 3 by CIO John Grimes, all unclassified data not approved for public release must be encrypted.
Pentagon officials must ensure certain data stored on mobile devices is encrypted in compliance with the National Institute of Standards and Technology's Federal Information Processing Standard 140-2, according to a new Defense Department policy. The policy, signed on July 3 by Pentagon Chief Information Officer John Grimes, mandates that all unclassified data not approved for public release should be treated as sensitive and must be encrypted. The policy does not apply to information cleared for public release. The term mobile devices describes laptop PCs and personal digital assistants, as well as removable storage media, like thumb drives and compact discs, Grimes wrote in a memo to senior Defense Department leaders. The policy instructs Pentagon officials to pay particular attention to the encryption of mobile devices used by senior DOD officials, like flag officers and senior executives, who travel frequently outside the continental United States. According to Grimes, the loss or theft of mobile devices storing U.S. defense information abroad is especially severe. The FIPS 140-2 specification was approved in 2001 and grew out of Federal Standard 1027, General Security Requirements for Equipment, which used the now-outdated Data Encryption Standard. NIST is now working on the next iteration, FIPS 140-3.
NEXT STORY: The hidden killers