Feeds

Government, military scramble for encryption technology

Spend will grow more than 150% by 2007

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

The government and military are investing more heavily in encryption technology as a defence against hackers who are beginning to deploy more sophisticated cracking techniques.

That's the conclusion of a study by industry analysts Frost & Sullivan who said sales of encryption technologies to military and government agencies, along with contractors, are growing from $176 million to a projected $457.6 million by 2007.

"Hackers are no longer solely focused on disrupting service and implanting viruses," said Frost & Sullivan senior analyst Brooks Lieske.

"They are also doing less noticeable, but potentially more damaging activities such as reading e-mail and gathering restricted information from Internet sites and computers."

Frost & Sullivan reports that international agencies ranging from the National Security Agency (NSA) to NATO are increasing network defence spending and modernising equipment to ensure privacy. Interestingly, Frost & Sullivan reports a particular interest from the military in wireless encryptors.

Contractors to the military are as wary of corporate espionage from competitors as subversive attacks, according to Lieske, who added military suppliers require the same high-speed encryptors as their clients in order to comply with government security regulations.

Brian Gladman, a noted encryption expert and ex-technical director at NATO, said that the military had always led the commercial sector in adoption of encryption technology, and wider uptake of the technology depends in large part in making it easier to use.

Traditional government has used custom designed cryptographic products but it is beginning to adopt commercial technology, according to Gladman, who added that, for example, the UK's Ministry of Defence has begun using PGP to protect its less sensitive traffic. ®

Related Stories

UK govt new encryption system only works with MS kit
Cyber-crime justifies world government
Euro Parliament calls ECHELON a paper tiger
NAI belatedly joins OpenPGP Alliance

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.