FRAMINGHAM, 16 AUGUST 2010 - Hacked smartphones could endanger troops by sending location data to the enemy using mechanisms similar to those employed by recently discovered Android malware, experts say.
Malicious software that commandeers phone functions could give wartime enemies valuable information about troop locations and movements, according to Hugh Thompson, a software security professor at Columbia University and conference chairman for the RSA Confernece, and Markus Jakobsson, who works on the PayPal online security and malware strategy team.
"Even normal apps can send a lot of information back home," Thompson says, and individual users are generally ill equipped to determine whether these apps represent security risks.
Jacobsson says he has discussed the problem with the Defense Advanced Research Projects Agency (DARPA). In fact, DARPA brought it up. "I would say the military are aware of it but not very comfortable with it," he says.
Misuse of legitimate phone features can be dangerous, he says. For example, troops who send photos they've taken on their cell phones may not realize the phones embed GPS data giving out the longitude and latitude of where it was taken. Such photos intercepted by enemies or sent to them covertly by malware on the phone could reveal troop locations, he says.
In the case of the Android malware discovered in Russia, it sends SMS messages to a destination that charges the phone account $5, but that type of unauthorized activity could be sending critical information about troop locations, Jakobsson says. (Also see: Smartphone security thwarted by fingerprint smudges.)
For instance, malware that sent out geolocation data every half hour could potentially reveal troop movements, he says. Even timestamps on photos could be somewhat revealing. Time of day combined with lighting in outdoor conditions could reveal something about where in the world the camera was when it took the photo, he says.
These leaks could be enhanced by malware infecting phones, and such software could be deposited there via applications users buy and approve of. Whenever someone buys a smartphone app, the processes it requires access to are listed and the buyer has to OK the list. But that's not a question most users are qualified to answer. "It's difficult enough to use computers," Jakobsson says. "It's not a good question to ask them and we shouldn't ask them to answer it."
Instead, he proposes safety applications that monitor what processes are in use and that trigger pop-ups that warn users when something suspicious is going on. Such software could have a soldier setting that would block phone activity that poses potential threats in a military zone, he says.
Via his company FatSkunk, he proposes software for handsets that periodically detects active malware. If deployed on troops' phones it could trigger warnings and infected phones could be brought to facilities for cleaning.
Sign up for Computerworld eNewsletters.