secure phone to transmit medical data from battlefield

Army looks to digitize battlefield medical data

When a wounded U.S. soldier is rushed from the battlefield to a medical facility, the injury and treatment data that accompanies the casualty comes on paper, pinned to his or her uniform. 

Digitizing that process would bring obvious benefits -- data from the front could precede a patient to the hospital, and it would be far less likely to get lost or destroyed in transit.  So the Army and the Defense Health Agency have turned to Management Sciences Inc. (MSI) and Cog Systems to develop a secure mobile solution. 

Since Army field medics already carry secure mobile devices, the communications infrastructure is already in place.  But the very security of that network is part of the challenge. 

Those devices are running on a classified network, Cog Systems Co-Founder and Chief Marketing Officer Carl L. Nerup explained "because they have battlefield data on there."   And while protecting medical data is critical, running at the classified level makes it impossible for doctors at a field hospital or at Landstuhl Regional Medical Center in Germany -- to which injured warfighters are often transported within hours -- to access the records in real time.

"Once data is marked as classified," Cog Systems CEO Daniel Potts said, "it’s got to go through the cleansing process" to be declassified, "which obviously is manual and takes a lot of time."

Cog Systems and MSI are developing a "dual persona" solution that will separate the unclassified medical data from the classified tactical data.  Field medics and treatment facilities will connect and share information over an unclassified virtual private network that tunnels through the classified battlefield network. 

"Back in the day, our friends at Fort Meade used to have two computers on their desk," Nerup said, until secure virtualization "allowed DOD to collapse to one machine."   

"We have been able to take that same technology and apply it to connected devices."

The prototype solution, which Nerup and Potts said they hope to deliver by the end of the year, also will provide a two-way voice channel for remote telemedicine teams to communicate with combat medics in real time.  The prototype will use HTC devices rather than the Samsung Galaxy S5 units are that currently in the field.  The Army will soon upgrade to new equipment, Nerup said, and "our technology can be ported to just about any device."

But because Cog Systems' D4 Secure Platform technology, which is what isolates the classified and unclassified data, lives "just above the chipset and below the operating system … we need the cooperation on the OEM," he added.

The contract, which was awarded under the Army’s Small Business Innovation Research program, is relatively small -- 18 months to develop a prototype solution. (MSI is an Albuquerque, N.M.-based small business; Cog Systems a Sydney, Australia-based firm with a U.S. subsidiary that handles all the SBIR work.)  But Potts said he's bullish on the broader potential -- not just for battlefield medicine, but for any government mission that requires multiple mobile security environments.

"We have a really cool technology that’s actually quite mature," Potts said, noting that Cog Systems has worked with "most of the western governments" on other projects. "This is exciting because it puts it all together."

About the Author

Troy K. Schneider is editor-in-chief of FCW and GCN, as well as General Manager of Public Sector 360.

Prior to joining 1105 Media in 2012, Schneider was the New America Foundation’s Director of Media & Technology, and before that was Managing Director for Electronic Publishing at the Atlantic Media Company. The founding editor of, Schneider also helped launch the political site in the mid-1990s, and worked on the earliest online efforts of the Los Angeles Times and Newsday. He began his career in print journalism, and has written for a wide range of publications, including The New York Times,, Slate, Politico, National Journal, Governing, and many of the other titles listed above.

Schneider is a graduate of Indiana University, where his emphases were journalism, business and religious studies.

Click here for previous articles by Schneider, or connect with him on Twitter: @troyschneider.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected