: Mobile applications can use sensors like GPS, microphones, and cameras to disclose non-public information or Personally Identifiable Information (PII) without user consent. Use of Unclassified Mobile Applications in ... - DoD CIO
: These are the most commonly permitted forms of mobile code due to their minimal threat profile. Core Security Risks Dod Mobile Code Risk Categories
: Technologies that support limited functionality with no capability for unmediated access to system resources. : Mobile applications can use sensors like GPS,
The DoD typically organizes mobile code into three distinct levels: Dod Mobile Code Risk Categories
: Use of this category is strictly controlled and often prohibited unless the code is signed by a trusted US certificate signing authority. Category 2: Limited Access (Medium Risk)