Feeds

Government, military scramble for encryption technology

Spend will grow more than 150% by 2007

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The government and military are investing more heavily in encryption technology as a defence against hackers who are beginning to deploy more sophisticated cracking techniques.

That's the conclusion of a study by industry analysts Frost & Sullivan who said sales of encryption technologies to military and government agencies, along with contractors, are growing from $176 million to a projected $457.6 million by 2007.

"Hackers are no longer solely focused on disrupting service and implanting viruses," said Frost & Sullivan senior analyst Brooks Lieske.

"They are also doing less noticeable, but potentially more damaging activities such as reading e-mail and gathering restricted information from Internet sites and computers."

Frost & Sullivan reports that international agencies ranging from the National Security Agency (NSA) to NATO are increasing network defence spending and modernising equipment to ensure privacy. Interestingly, Frost & Sullivan reports a particular interest from the military in wireless encryptors.

Contractors to the military are as wary of corporate espionage from competitors as subversive attacks, according to Lieske, who added military suppliers require the same high-speed encryptors as their clients in order to comply with government security regulations.

Brian Gladman, a noted encryption expert and ex-technical director at NATO, said that the military had always led the commercial sector in adoption of encryption technology, and wider uptake of the technology depends in large part in making it easier to use.

Traditional government has used custom designed cryptographic products but it is beginning to adopt commercial technology, according to Gladman, who added that, for example, the UK's Ministry of Defence has begun using PGP to protect its less sensitive traffic. ®

Related Stories

UK govt new encryption system only works with MS kit
Cyber-crime justifies world government
Euro Parliament calls ECHELON a paper tiger
NAI belatedly joins OpenPGP Alliance

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.