Regardless of the stringent security measures practiced for mobility by the DoD, there are numerous attack surfaces on a smartphone or tablet. These attack surfaces appear in the form of the high volume of widely used apps. Each app represents a plethora of vulnerabilities not only for the device and all data on it but also for the networks to which the device is attached. Bringing a smartphone or tablet hosting a rogue app into a DoD building has the potential to compromise a DoD network in multiple ways, allowing an attacker to gain access through the many avenues a badly written or maliciously developed app offers.