Feeds

Australian spooks want mobile dev to build ... something

ASIO changes IT hiring policy to bring more specialists aboard

  • alert
  • submit to reddit

The Power of One Infographic

The Australian Security Intelligence Organisation (ASIO) seems set to equip Australian spooks with mobile apps.

The Reg is happy to make that assertion on the back of this job ad seeking a “Mobile Applications Developer” with “Development experience with iOS and/or Android (desirable).”

We asked ASIO why it needs a mobile developer and got the non-committal response one would expect from an intelligence agency's press spokesthing.

But the organisation's response did yield two interesting nuggetoids of information.

One is that “ASIO has changed its recruitment strategy to advertise roles individually with a view to attracting a more specialised workforce (some ICT roles in ASIO were previously undertaken by what we called ‘Technical Generalists’ who were employed for their range of technical skills)”.

Which goes some way to explaining why a mobile dev is needed while also raising the question of just how ASIO did its job with a recruitment policy that made it hard to find those with specialist skills.

On the matter of mobile development, the response said “ASIO is seeking candidates who have a keen interest in IT security and experience developing for iOS and Android platforms, however ASIO has no plans to develop apps for the general public.”

Are there plans for in-house apps? We're not sure and ASIO isn't saying. But the answer provided certainly leaves the door open for the possibility of apps only ASIO can access.

Why would ASIO staff need mobile apps? Your guess is as good as ours, dear readers, although we imagine any intelligence agency that relies on the email clients shipped with mobile devices is not worthy of the name. We've also heard, in the past, of secure over-the-top VoIP on smartphones, albeit in the hands of the bad guys, but it sounds like a useful way for spooks to chat.

Perhaps modern surveillance can be better achieved with a smartphone that records all it sees but looks entirely workaday in the hands of its intelligence officer wielder?

Here's another possibility: the dev will be asked to peer under the hood of mobile apps that ASIO finds interesting.

Feel free to let us know what you think an intelligence agency's apps might usefully do in the comments below. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.