The increased threat from connected adversaries, coupled with advancements in classified mobile capabilities, makes now the right time for C2I agencies to make mobile a priority—designing new mission-enhancing mobile services and mapping their secure path to a more digital, mobile-empowered future. In doing so, old practices—rather than mobile devices—can be left at the door.
Ask a civilian how they imagine their government’s intelligence agencies’ communication systems working and they’ll likely conjure up a James Bond-like world of advanced gizmos that can quickly access everything from classified satellite images to the location of friendly forces in the field.
However, the reality is that most Command, Control and Intelligence (C2I) agency employees literally get asked to leave all mobile devices at the door, to guard against the very real threat of information leakage.
This is the cultural status quo in many C2I agencies, but it is also a growing risk to mission effectiveness, with slow adoption of mobile technologies potentially leaving C2I agencies at an operational disadvantage, lagging behind more connected adversaries.
The question is: Are C2I agencies adequately protecting themselves if leaving the benefits of mobile at the door?