Feeds

Australian spooks want mobile dev to build ... something

ASIO changes IT hiring policy to bring more specialists aboard

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

The Australian Security Intelligence Organisation (ASIO) seems set to equip Australian spooks with mobile apps.

The Reg is happy to make that assertion on the back of this job ad seeking a “Mobile Applications Developer” with “Development experience with iOS and/or Android (desirable).”

We asked ASIO why it needs a mobile developer and got the non-committal response one would expect from an intelligence agency's press spokesthing.

But the organisation's response did yield two interesting nuggetoids of information.

One is that “ASIO has changed its recruitment strategy to advertise roles individually with a view to attracting a more specialised workforce (some ICT roles in ASIO were previously undertaken by what we called ‘Technical Generalists’ who were employed for their range of technical skills)”.

Which goes some way to explaining why a mobile dev is needed while also raising the question of just how ASIO did its job with a recruitment policy that made it hard to find those with specialist skills.

On the matter of mobile development, the response said “ASIO is seeking candidates who have a keen interest in IT security and experience developing for iOS and Android platforms, however ASIO has no plans to develop apps for the general public.”

Are there plans for in-house apps? We're not sure and ASIO isn't saying. But the answer provided certainly leaves the door open for the possibility of apps only ASIO can access.

Why would ASIO staff need mobile apps? Your guess is as good as ours, dear readers, although we imagine any intelligence agency that relies on the email clients shipped with mobile devices is not worthy of the name. We've also heard, in the past, of secure over-the-top VoIP on smartphones, albeit in the hands of the bad guys, but it sounds like a useful way for spooks to chat.

Perhaps modern surveillance can be better achieved with a smartphone that records all it sees but looks entirely workaday in the hands of its intelligence officer wielder?

Here's another possibility: the dev will be asked to peer under the hood of mobile apps that ASIO finds interesting.

Feel free to let us know what you think an intelligence agency's apps might usefully do in the comments below. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.