DoD and IT supply chain risk
The scenario is one that information security experts dread: widespread dissemination of commercial technology that is secretly wired to function in unintended ways or even spy on its users. From this vantage point, mobile phones, network routers, computer work stations and any other device hooked up to a network can provide a point of entry for an adversary.
7701 Las Colinas Blvd., Ste. 800, Irving, TX 75063