Who’s spying on your portable electronic device? Published July 28, 2010 By Chris Engler 319 Air Refueling Wing Information Protection GRAND FORKS AIR FORCE BASE, N.D. -- Our communication capabilities have mushroomed into a vast array of personal choices that are re-shaping the world. Cell phones, blackberries and the IPAD are all part of this growing industry. Despite the many pros associated with using these devices there are increased risks and vulnerabilities when introduced into a classified environment. Air Force Instruction 31-401 prohibits the use of personally owned information systems storage media in areas where classified information is processed. Whatis.com defines storage media as any device or material on which data can be electronically placed, kept and retrieved. Some examples of storage media are compact discs, memory sticks, cell phones and digital audio tapes. Professional and personal dependency on storage media has become the basis for linking people and information together. That dependency can lead to compliancy, which could lead to a security incident. A security incident occurs when a cell phone, or any other electronic device with transmit and receive capability, is introduced into a secure environment. Security incidents involving a cell phone complicates an inquiry into whether classified information "spillage" occurred. Since an inquiry official cannot attest to the phone being 100 percent cleared the only suitable action is to destroy the phone. The security incident inquiry process is complicated due to software available on the open market that can be used undetected to "spy" on the phone or steal data. Flexispy is one such software. Flexispy can be installed on a cell phone or blackberry without a users knowledge and it won't show up anywhere in the phone's software. Once installed, whether a phone is on or off, the spy software can record information about phone calls, text messages and conversations. The best way to combat being victimized by such software is to password protect your devices at all times. Although most common, cell phones are not the only media we have to be aware of in a classified environment. Wireless devices such as blackberry sleds and routers also pose a risk to national security due to their capability to transmit information undetected. Some other devices that can be activated remotely include microphones and webcams. All personnel, active duty, civilians and contractors have a responsibility to safeguard classified and controlled unclassified information at all times. Everyone should be aware that advancing technology provides constantly changing means to quickly collect and transport information.