CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

One of the most powerful organisations in the Western world is putting its money on cloud computing this year. Long rumoured reports of the US Government’s Central Intelligence Agency, better known as the CIA, seeking to land a deal with a major Internet giant have been all but confirmed. So what’s the deal with the spooks and the nerds ganging together and what does it all mean? Conspiracy theorists and Communists, listen up because the CIA just got more tech-savvy than ever. And that’s saying something.

The CIA collects data. That’s what it does. Some data is more interesting than others, some gets captured in the shutter-flash of a second and some takes hours, days or even years to compile. Yet whatever form it takes, data and overwhelmingly computer-based information is crucial to fighting all the baddies (or goodies, depending whose side you are really on). Now the gathering of data for the world’s best known intelligence agency is even more accessible and organised, reportedly thanks to Amazon.

data-privacy

(Image Source: Shutterstock)

Amazon, I hear you say? The giant cuddly tax-dodging provider of all things Christmas? That’s right. Amazon also sells web-based products and services and is one of the world leaders in this field. The giant corporation may have beaten rivals, most notably IBM, to the punch in agreeing a contract with the CIA for investing more than a few hundred million dollars into cloud computing. The agency has reportedly requested that Amazon create for them a parallel cloud which reflects the efficiency of the public services they sell, but is modelled to a bespoke and (obviously) private framework which is secure and fit for the purpose of protecting US national security.

So what is cloud computing? This is really kind of a slang term for a type of Internet-based infrastructure. It essentially joins lots of computers up, allowing programs, applications and files to be run on multiple computers simultaneously. The concept of a private ‘cloud’ basically means having your whole organisation interacting virtually on a server, often with specialised software, storage space or applications. This is kept under wraps and away from the rest of the Web, unlike public clouds such as Apple’s iCloud, which anyone with an Apple device can join or access. Private clouds are good for saving cash within organisations and bring online previously unwieldy processes and information-sharing, but can be more open to infiltration. Although it’s unlikely that the CIA will have anything less than the most sophisticated technology designed to prevent this.

The contract is thought to be moving into place for at least four years, although the tight-lipped CIA are not about to discuss this. IBM has reportedly been a little miffed about the prospect of Amazon taking up the deal indefinitely when it first came about, even though their service was far more expensive to purchase. They have been enlisting the support of the Government Accountability Office in challenging the CIA to re-list their offer and to set any contract as time-limited rather than continuously rolling. Therefore, the issue as it stands today sees the CIA with rapped knuckles, re-bidding like a weary Ebay seller for the right IT guy.

Although silence still reigns supreme in this who-dunnit of server provision, Internet rumours abound about Amazon’s friendliness with the CIA and with the desire for the government agency to work with them. Watch this space for more information on the latest move from the Men In Black.

By Alex Harrard

Freelance web data analyst and copywriter for large scale cloud computing businesses and virtual desktop suppliers

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Lingering Security Concerns Considering the cost and time-to-market advantages of SaaS applications in particular, it’s no surprise that companies are looking to the cloud to meet their business objectives. But what happens when a ‘cloud first’ company must also put security and compliance first? In a recent Bitglass survey report from a cloud access security…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor