CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

One of the most powerful organisations in the Western world is putting its money on cloud computing this year. Long rumoured reports of the US Government’s Central Intelligence Agency, better known as the CIA, seeking to land a deal with a major Internet giant have been all but confirmed. So what’s the deal with the spooks and the nerds ganging together and what does it all mean? Conspiracy theorists and Communists, listen up because the CIA just got more tech-savvy than ever. And that’s saying something.

The CIA collects data. That’s what it does. Some data is more interesting than others, some gets captured in the shutter-flash of a second and some takes hours, days or even years to compile. Yet whatever form it takes, data and overwhelmingly computer-based information is crucial to fighting all the baddies (or goodies, depending whose side you are really on). Now the gathering of data for the world’s best known intelligence agency is even more accessible and organised, reportedly thanks to Amazon.

data-privacy

(Image Source: Shutterstock)

Amazon, I hear you say? The giant cuddly tax-dodging provider of all things Christmas? That’s right. Amazon also sells web-based products and services and is one of the world leaders in this field. The giant corporation may have beaten rivals, most notably IBM, to the punch in agreeing a contract with the CIA for investing more than a few hundred million dollars into cloud computing. The agency has reportedly requested that Amazon create for them a parallel cloud which reflects the efficiency of the public services they sell, but is modelled to a bespoke and (obviously) private framework which is secure and fit for the purpose of protecting US national security.

So what is cloud computing? This is really kind of a slang term for a type of Internet-based infrastructure. It essentially joins lots of computers up, allowing programs, applications and files to be run on multiple computers simultaneously. The concept of a private ‘cloud’ basically means having your whole organisation interacting virtually on a server, often with specialised software, storage space or applications. This is kept under wraps and away from the rest of the Web, unlike public clouds such as Apple’s iCloud, which anyone with an Apple device can join or access. Private clouds are good for saving cash within organisations and bring online previously unwieldy processes and information-sharing, but can be more open to infiltration. Although it’s unlikely that the CIA will have anything less than the most sophisticated technology designed to prevent this.

The contract is thought to be moving into place for at least four years, although the tight-lipped CIA are not about to discuss this. IBM has reportedly been a little miffed about the prospect of Amazon taking up the deal indefinitely when it first came about, even though their service was far more expensive to purchase. They have been enlisting the support of the Government Accountability Office in challenging the CIA to re-list their offer and to set any contract as time-limited rather than continuously rolling. Therefore, the issue as it stands today sees the CIA with rapped knuckles, re-bidding like a weary Ebay seller for the right IT guy.

Although silence still reigns supreme in this who-dunnit of server provision, Internet rumours abound about Amazon’s friendliness with the CIA and with the desire for the government agency to work with them. Watch this space for more information on the latest move from the Men In Black.

By Alex Harrard

Freelance web data analyst and copywriter for large scale cloud computing businesses and virtual desktop suppliers

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…