Is Cloud Computing applicable in national security and law enforcement?

Mobile device security: A new frontier for hackers

By G C Network | February 1, 2015

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized…

Learn How To Buy Cloud From GovLoop & ViON

By G C Network | January 28, 2015

“Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since…

A VETS 360 BENEFIT – LATINO FILM INDUSTRY POST OSCAR PARTY

By G C Network | January 21, 2015

   GUESS WHO SUPPORTS VETS 360? You can support them too at the: THE OFFICIAL LATINO FILM INDUSTRY POST OSCAR PARTY The Veterans 360 mission is to support our young combat…

South Asia’s Biggest Tech Event – “Digital World 2015”

By G C Network | January 19, 2015

 I am proud and honored to announce that I have been added as a speaker at SouthAsia’s biggest tech event “Digital World 2015” , 9th – 12th February, 2015 at…

Fear Hackers? First invest in an IT security culture change

By G C Network | January 14, 2015

by Kevin L.Jackson  With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew…

CloudCamp Bangladesh In Dhaka! – February 11, 2015

By G C Network | January 13, 2015

Did you know that….. Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) – a list of eleven countries having strong potential for becoming the world’s largest economies…

Agile is not the absence of ITIL!

By G C Network | January 12, 2015

 by Jodi Kohut ITIL (formerlyknown as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations.  The 5 stage framework:…

Cloud Security: Understanding the Cloud Computing Threat Landscape

By G C Network | January 10, 2015

In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy…

Federal Cloud Computing Summit on January 14-15, Washington, DC

By G C Network | January 9, 2015

The Federal Cloud Computing Summit will be held on January 14-15, 2015 at the Marriott Metro Center in Washington, D.C. (Complimentary government and academic registration) This educational symposium will feature cloud computing…

CONGRATULATIONS! Inaugural Cloud Computing Class at Mira Costa College Graduates!!

By G C Network | January 8, 2015

Anthony Dorrah, Jose Chapman, Mike Chatelain,  Lisa Heiden, Ginelle Johnson, Robert Minson, Alfredo Morales  We are so proud of the success of out first cloud computing training class.  This group…

Late last week I asked the following question on linkedIn

“Are Cloud Computing concepts applicable in secure national security and law enforcement arenas (i.e. Defense, Homeland Security, Intelligence, Justice)? If so, how? If not, why? “

The responses were very interesting:

Software Architect – I think they are certainly applicable. Speaking specifically of Amazon’s Web Services, security is one of the main pillars of the platform and all of their services provide the ability to lock down access. ….. Auditing security on well-known cloud computing platforms is actually much simpler than in-house computing as knowledge of the systems in use is much more broad and transparent.

Sr. Advisory Architect – They already are, and have been for quite some time

IT Business Consultant manager – I can image that many business strategists or security architects who are new to the concept will balk at the idea of allowing information to live in a cloud they don’t control and will likely propose some sort of “special cloud” of their own – thus defeating the ROI altogether

Senior Computer Systems Engineer – I have been asked to informally consult on this issue and I am a bit skeptical about the storage aspect of cloud computing. The client I was consulting for had some serious legal issues in relation to storing data outside certain geographical boundaries (where the cloud provider(s) where) which was a big obstacle from the very beginning.

Information Assurance Executive – Cloud Computing concepts in secure (trusted) information sharing environments are applicable however, involve some additional complexities that other environments do not. These environments should adhere to published data, security, infrastructure and interoperability standards (e.g. W3C, OASIS) and by default should be cross-domain (e.g. DoD, IC) compliant following prescribed national security requirements.

Team Lead – Compared to “on site” storage – I hear the argument that it is MUCH MORE secure in the cloud.

Serial Entrepreneur – Cloud computing is mainly about scale. Google and Amazon have such massive deployments that the operational costs of the resources dwarf most organizations. If we look at the governmental apparatus and think of it as a client of computational resources it is indeed very big. It would seem to me that given their possession of adequate scale they could simply run a private infrastructure for themselves and have their own cloud.

Director of Strategic Operations – I think we’re going to see an increase in grid computing and cloud computing concepts as the costs drop and the benefits become more tangible. I think national security implementations are prime candidates for early adoption of such technologies – beyond whatever may already be in place now – simply because of the massive scale of the computing effort, storage, and general computational requirements of such massive data sets.

Information Technology & Services Consultant – The whiteboard used to iron out all the ‘gotchas’ in a Cloud Computing environment for secure national security and law enforcement arenas would stretch around the Bronx Zoo (i.e. the baseball stadium)…

All the responses can be read at LinkedIn answers .

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Markus Klems on July 3, 2008 at 2:11 pm

    Kevin,
    thank you for your constant input to data security / SOA in the cloud. This is definitely a hot topic. I come from Germany where we have rather strict data protection laws. My 5 cents on my blog: http://markusklems.wordpress.com/2008/07/03/data-security-in-the-cloud/



  2. OCHomeTheater on July 5, 2008 at 4:53 am

    I am a computer engeenier. Certainly it has a major role to play .