Defense issues long-awaited wireless policy

The Defense Department has released its long-awaited wireless policy, making it mandatory for all DOD personnel, contractors and even visitors entering Defense facilities to encrypt unclassified information transmitted wirelessly.

The policy, DOD 8100.2, comes nearly two years after DOD issued a Pentagon wireless policy. The new policy, which supersedes the earlier Pentagon policy, takes effect immediately. DOD officials had suggested the policy was imminent for nearly three months.

"For data, strong authentication, nonrepudiation and personal identification are required for access to DOD information systems in accordance with published DOD policy and procedures," said Paul Wolfowitz, deputy secretary of Defense. "Identification and authentication measures shall be implemented at both the device and network level."

The directive views wireless devices, services and technologies that are integrated or connected to Defense networks as part of those networks. Data encryption, at a minimum, must be implemented end-to-end over an assured channel and must be validated against Federal Information Processing Standards requirements under the Cryptographic Module Validation Program.

The policy, released late Friday, will allow exceptions on a case-by-case basis.

The new law prohibits the use of wireless devices for storing, processing or transmitting classified information without "explicit written approval of the cognizant designated approving authority. If approved by the DAA, only assured channels employing National Security Agency-approved encryption shall be used to transmit classified information," Wolfowitz noted in the directive.

Furthermore, cellular, PC, radio frequency and infrared wireless devices are not allowed?without written approval?in areas where classified information is discussed, electronically stored, processed or transmitted.

Wolfowitz directed Defense agencies to screen for wireless devices within their organizations by using active electromagnetic sensing to detect and prevent unauthorized access of Defense systems.

Other parts of the directive require that:

  • Portable electronic devices that can connect directly to a DOD wired network not be operated wirelessly while connected.


  • Antivirus software be used on wireless systems that transmit data.


  • Defense establish a wireless knowledge management process to promote wireless expertise.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Trending

  • POWER TRAINING: How to engage your customers

    Don't miss our June 7 Washington Technology Power Training session on Mastering Stakeholder Engagement, where you'll learned the critical skills you need to more fully connect with your customers and win more business. Read More

  • PROJECT 38 PODCAST

    In our latest Project 38 Podcast, editor Nick Wakeman and senior staff writer Ross Wilkers discuss the major news events so far in 2019 and what major trends are on the horizon. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.