Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Encryption companies rise as anxiety over data mounts
by Staff Writers
New York (AFP) March 29, 2014


US 'restrained' in cyber operations - Pentagon chief
Washington (AFP) March 28, 2014 - The United States will show "restraint" in cyber operations outside of US government networks, Secretary of Defense Chuck Hagel said Friday, urging other countries to do the same.

Hagel, speaking at the National Security Agency (NSA) headquarters at Fort Meade, Maryland, said that the Pentagon "does not seek to 'militarize' cyberspace."

Instead, Hagel said that the US government "is promoting the very qualities of the Internet -- integrity, reliability, and openness -- that have made it a catalyst for freedom and prosperity in the United States, and around the world."

The remarks came at the retirement ceremony for outgoing NSA chief, General Keith Alexander.

The Pentagon "will maintain an approach of restraint to any cyber operations outside the US government networks. We are urging other nations to do the same," Hagel said.

He also said that the United States "will continue to take steps to be open and transparent about our cyber capabilities" with Americans, US allies, "and even competitors."

The idea is to "use the minimal amount of force possible" in cyber operations, a senior defense official told reporters, speaking on condition of anonymity.

This would take place only when it would "either prevent conflict, de-escalate conflict or allow us to use the minimal amount of force," the official said.

"That is not always the approach that other nations in the world use," the official said.

Although he emphasized that there was "a clear difference" between espionage and cyber operations, restraint is also applicable "for espionage and communications intelligence" at both the NSA and Cyber Command, the official said.

"We think very carefully about the things we do outside of our own network," the official said.

The budget for the Pentagon's Cyber Command for fiscal 2015 is $5.1 billion. The Command must have 6,000 soldiers by 2016.

Alexander's successor is a US Navy officer, Vice Admiral Michael Rogers, who will take over as both head of the NSA and Cyber Command.

Hagel is set to begin next week a tour of Asia with a stop in China, where cyberspying will be a hot topic following a report in The New York Times and Germany's Der Spiegel that the NSA had secretly tapped Chinese telecoms giant Huawei for years.

The NSA had access to Huawei's email archive, communications between top company officials, and even the secret source code of some of its products, according to the reports based on information provided by fugitive former NSA contractor Edward Snowden.

Investors are pumping millions of dollars into encryption as unease about data security drives a rising need for ways to keep unwanted eyes away from personal and corporate information.

Major data breaches at Target and other retailers that have made data security a boardroom issue at companies large and small.

And stunning revelations of widespread snooping by US intelligence agencies have also rattled companies and the public.

For venture capital, that has opened up a new area of growth in the tech business.

In February, Google Ventures led a $25.5 million round of venture funding for Atlanta-based Ionic Security, a three-year old company that works in encryption, which scrambles data before it is shipped or stored.

Other encryption companies, including Toronto-based PerspecSys and San Jose, California-based CipherCloud, have announced major fundings.

The funding rush could hearken a "golden age" of encryption, as one expert puts it. But the industry also faces barriers to a tool that until recently was not a hot commodity.

Concerns about encryption range from practical challenges, such as the difficulty users have to search their encoded data, to government opposition towards encryption.

"People are afraid of it because they don't understand it," John Kindervag, a vice president and principal analyst at Forrester Research But he called the wider use of encryption "inevitable, because there's no other way to solve the problem."

Kindervag said the industry is between one and two years away from "some big revolutions" in the field. "It just needs to happen."

But Venky Ganesan, a managing director with venture capital firm Menlo Ventures, believes major advances are further off.

"Encryption slows down," Ganesan said. "Just imagine if every room in your house was locked and you had to open and close it every time you go in. You would be frustrated."

Another problem is "the government is sensitive," said Ganesan.

"They don't want encryption technology to be open so that anybody can use it, because their goal is to make sure they can always get access to the information."

He said governments have frequently insisted that they be given a master key to decrypt files, Ganesan said.

- Snowden seal of approval -

The need for better encryption vaulted to the top of the tech industry's agenda earlier this month by fugitive intelligence contractor Edward Snowden, who last year exposed the massive spying capabilities of the US National Security Agency.

Snowden urged industry leaders to make a "moral commitment" to safeguard customer data by integrating encryption into devices in a user-friendly way.

The NSA and foreign intelligence services are "setting fire to the future of the Internet," Snowden said via video from Russia. "You guys are the firefighters and we need you to help fix things."

Recent data security scandals underscore the new vulnerabilities as organizations process unprecedented amounts of data that are analyzed, shipped, stored in "the cloud" -- offsite commercial servers -- and accessed remotely by mobile technology.

It's a far cry from the days when security focused on safeguarding a stolen laptop.

"It's on every corporation's and every government's mind how they protect their data and their intellectual property," said William Bowmer, a technology stock specialist at Barclays.

Wall Street appears ready to commit more money to security companies as well. Shares of FireEye, which reportedly alerted Target to breaches in its security network even though the company did not take action, have more than tripled from the September 2013 IPO price of $20.

Industry insiders see some encryption firms as possibilities for entering the market: Voltage Security, SafeNet, Protegrity and Vormetric Data Security.

Voltage chief executive Sathvik Krishnamurthy described the market for encryption as "thriving and growing" and said the perception of government opposition to encryption is outdated.

Encryption can be integrated into policies that incorporate the lessons of the Snowden revelations with the need to protect national security, Krishnamurthy said.

Spying by authorities "has been going on forever," he said.

"In any society where you think you've had privacy, you've been grossly mistaken. It's just a question of the degree to which you were clueless about Big Brother actually looking at everything you were doing."

He called the NSA's sweep of data "really over the top."

"Did we have to spy on Angel Merkel's emails? No."

But the biggest problem with the NSA program was the lack of disclosure, Krishnamurthy said.

Disclosure by the government of its program "will normalize the line over which we would no longer cross," he said. "If you have to answer for your actions, then you are more likely to be reasonable in your actions."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Russian officials dump iPads over spy fears
Moscow (AFP) March 26, 2014
Russian government officials have swapped their iPads for Samsung tablets to ensure tighter security, the telecoms minister told news agencies on Wednesday. Journalists spotted that ministers at a cabinet meeting were no longer using Apple tablets, and minister Nikolai Nikiforov confirmed the changeover "took place not so long ago." He said the ministers' new Samsungs were "specially pro ... read more


CYBER WARS
Unique camera from NASA's moon missions sold at auction

Expeditions to the Moon: beware of meteorites

A Wet Moon

ASU camera creates stunning mosaic of moon's polar region

CYBER WARS
Mars-mimicking chamber explores habitability of other planets

Helpful Wind Cleans Solar Panels On Opportunity Mars Rover

NASA Mars Rover's Next Stop Has Sandstone Variations

Mars on Earth: vacuum chambers mimic the Red Planet

CYBER WARS
You've got mail: Clinton-to-space laptop up for auction

The NASA Z-2 Spacesuit Design Vote

E3-production - sustainable manufacturing

NASA Seeks Collaborative Partnerships With Commercial Space

CYBER WARS
Tiangong's New Mission

"Space Odyssey": China's aspiration in future space exploration

China to launch first "space shuttle bus" this year

China expects to launch cargo ship into space around 2016

CYBER WARS
Technical hitch delays US-Russia crew's ISS docking

New ISS Crew Wrapping Up Training for Launch

How astronauts survive diplomatic tensions in space

NASA Extends Lockheed Martin Contract to Support ISS

CYBER WARS
NASA Seeks Suborbital Flight Proposals

Arianespace Launches ASTRA 5B and Amazonas 4A

SpaceX Launch to the ISS Reset for March 30

Ariane 5 hardware arrives for next ATV mission

CYBER WARS
Space Sunflower May Help Snap Pictures of Planets

NRL Researchers Detect Water Around a Hot Jupiter

UK joins the planet hunt with Europe's PLATO mission

X-ray laser FLASH spies deep into giant gas planets

CYBER WARS
Parallel programming may not be so daunting

China's rare earth trade limits break global rules: WTO

Big Data keeps complex production running smoothly

Facebook takes $2 billion dive into virtual reality




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.