CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

CIA Set To Invest In Cloud Computing

One of the most powerful organisations in the Western world is putting its money on cloud computing this year. Long rumoured reports of the US Government’s Central Intelligence Agency, better known as the CIA, seeking to land a deal with a major Internet giant have been all but confirmed. So what’s the deal with the spooks and the nerds ganging together and what does it all mean? Conspiracy theorists and Communists, listen up because the CIA just got more tech-savvy than ever. And that’s saying something.

The CIA collects data. That’s what it does. Some data is more interesting than others, some gets captured in the shutter-flash of a second and some takes hours, days or even years to compile. Yet whatever form it takes, data and overwhelmingly computer-based information is crucial to fighting all the baddies (or goodies, depending whose side you are really on). Now the gathering of data for the world’s best known intelligence agency is even more accessible and organised, reportedly thanks to Amazon.

data-privacy

(Image Source: Shutterstock)

Amazon, I hear you say? The giant cuddly tax-dodging provider of all things Christmas? That’s right. Amazon also sells web-based products and services and is one of the world leaders in this field. The giant corporation may have beaten rivals, most notably IBM, to the punch in agreeing a contract with the CIA for investing more than a few hundred million dollars into cloud computing. The agency has reportedly requested that Amazon create for them a parallel cloud which reflects the efficiency of the public services they sell, but is modelled to a bespoke and (obviously) private framework which is secure and fit for the purpose of protecting US national security.

So what is cloud computing? This is really kind of a slang term for a type of Internet-based infrastructure. It essentially joins lots of computers up, allowing programs, applications and files to be run on multiple computers simultaneously. The concept of a private ‘cloud’ basically means having your whole organisation interacting virtually on a server, often with specialised software, storage space or applications. This is kept under wraps and away from the rest of the Web, unlike public clouds such as Apple’s iCloud, which anyone with an Apple device can join or access. Private clouds are good for saving cash within organisations and bring online previously unwieldy processes and information-sharing, but can be more open to infiltration. Although it’s unlikely that the CIA will have anything less than the most sophisticated technology designed to prevent this.

The contract is thought to be moving into place for at least four years, although the tight-lipped CIA are not about to discuss this. IBM has reportedly been a little miffed about the prospect of Amazon taking up the deal indefinitely when it first came about, even though their service was far more expensive to purchase. They have been enlisting the support of the Government Accountability Office in challenging the CIA to re-list their offer and to set any contract as time-limited rather than continuously rolling. Therefore, the issue as it stands today sees the CIA with rapped knuckles, re-bidding like a weary Ebay seller for the right IT guy.

Although silence still reigns supreme in this who-dunnit of server provision, Internet rumours abound about Amazon’s friendliness with the CIA and with the desire for the government agency to work with them. Watch this space for more information on the latest move from the Men In Black.

By Alex Harrard

Freelance web data analyst and copywriter for large scale cloud computing businesses and virtual desktop suppliers

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Destroying Cloud Data In The Age Of Data Multiplication

Destroying Cloud Data In The Age Of Data Multiplication

The Age of Data Multiplication We are surrounded by data, whether in our personal or professional lives with digital elements that are constantly being captured about us. This leads to exponentially increasing volumes of data whether from Internet-connected devices, video, cell records, customer transactions, healthcare and government records. Today, there is a growing awareness and…

AWS re:Invent: Billions & Billions of Dollars

AWS re:Invent: Billions & Billions of Dollars

AWS re:Invent The massive AWS re:Invent show this week in Las Vegas is a celebration of cloud computing. What was formerly debatable is now inevitable: the world is moving to cloud. Amazon’s annual cloud revenues of about $7 billion, combined with an estimated $5 billion annual run rate by competitor Microsoft Azure, and the odd…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Implication Of Consumers Not Having Their Heads In The Cloud

The Implication Of Consumers Not Having Their Heads In The Cloud

Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data and digital assets stored in the cloud. As a result most consumers are their own worst enemy when it comes to putting themselves at risk…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

The Rise Of The iPro: How Cloudware Has Helped To Develop A Responsive Business Generation

The Rise Of The iPro: How Cloudware Has Helped To Develop A Responsive Business Generation

The Rise Of The iPro Overview: Independent professionals are playing a more important role in business by the day, but how much has the introduction and adoption of cloudware helped to develop a generation of workers that are working more flexibly and efficiently than ever before? iPros, or ‘independent professionals’, are becoming increasingly common in…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor