Smartphone security should not only include preventing potential access to personal data by malicious software, it should also restrict access to the entire system, in order to ensure that the data stays private at all times. The problem is that many smartphone users do not realize how dangerous their phones are for their security needs. For example, if a malicious software program accesses your smartphone’s central system data storage, it can easily get away from you. You can’t expect that your smartphone will act in a self-protective way, even if you have all the security measures in place. This is why smartphone security for enterprise needs includes much more than just protecting your own data.
As an example, change the application manifest, which is the address book for the central system, and make the relevant IP corresponding to different marketing domain names unavailable to the malicious software, thereby achieving the necessary protection. Use two smartphones, one is an ordinary non-smartphone, dedicated solely to communication, and the second is a smart phone for daily use, which has the applications installed. That way, should a hacker to access the central database, he would be unable to access your non-smartphone. In the case of an ordinary smartphone, this protection might be too broad, but a smart phone on the other hand cannot be expected to be as robust. For this reason, a secure connection is needed between the applications and the data, so that only the authorized data gets accessed. A secure connection to the internet is necessary for both phones.
When Al Qaeda tried to use free blogging software to recruit spies in the United States, they inadvertently got a pretty big tech companies like Google into a lot of trouble. Because of their anti-spyware technology, Google was able to uncover Al Qaeda’s plans to use YouTube as a tool to recruit spies, in an effort to gather information on the wars in Afghanistan and Iraq. The Justice Department has since slapped Google with a lawsuit related to the case, because the anti-spyware program that Google used to detect Al Qaeda’s plans was not sufficiently effective.
In a similar case in the UK, GCHQ, the British spy agency, discovered an Al Qaeda plot to attack the New York City subway system with bombs hidden in electronic backpacks. This was, of course, just the beginning. It turns out that Al Qaeda also had plans to use cell-phone encryption technology to communicate with operatives overseas. The new encryption protocols could not be detected by normal security surveillance tools. GCHQ realized that they needed a smart phone for daily use in order to detect and track terrorist activity.
The US government’s inability to properly enforce existing laws regarding telecommunications made it necessary for the creation of smart phone software. The same kind of software would have been completely useless at detecting the massive amounts of data being exchanged through cell phones. The problem with trying to enforce federal laws regarding telecommunications is that the rules are constantly changing. The latest amendment to the USA Freedom Act states that all calls made by cell phones must be recorded and stored, regardless of whether the call is made or received. This means that the communications of anyone using a cell-phone in the United States will be recorded and available to the Government, if it so chooses. This means that the owner of the cell-phone will find himself on the wrong side of the law, because his communications can easily be accessed by the Government if he is thought to be involved in any criminal activity.
Fortunately for Americans, state governments are more interested in protecting their citizens from terrorists than they are in spying on them. Smart phone technology makes it very easy to do this. You can use your smart phone to make calls, send text messages, use the Internet, get online, check your e-mails, play games, take pictures, videos, etc. You can also use your smart phone to listen to music, see videos, or do any other kinds of activities that you would normally do on a regular laptop or computer. Therefore, it is very likely that smart phones will become more popular in the future, as more of our activities are handled via our smart phone.