Is Cloud Computing applicable in national security and law enforcement?

Lynn DeCourcey Showcased in ExecutiveBiz

By G C Network | August 9, 2012

Kudos to my colleague Lynn DeCourcey for her recent interview on  ExecutiveBiz.com! Lynn is NJVC vice president and general manager, cyber security. She oversees all aspects of the company’s cyber…

BISNOW Data Center Event Highlight’s Cloud

By G C Network | July 28, 2012

A big thank you to BISNOW and my fellow panel members for an outstanding discussion and very informative event, last week’s Data Center Investment Conference and Expo. The federal marketplace…

GSA Seeks Cloud Brokerage Information

By G C Network | July 18, 2012

GSA is using the RFI process to collect information about alternative models and/or solutions for future cloud acquisition vehicles and processes that further these goals. One emerging concept in cloud…

DoD Cloud Computing Strategy

By G C Network | July 15, 2012

The DoD recently released the department’s formal cloud computing strategy. DoD Cloud Computing Strategy View more documents from Kevin Jackson. In the forward, DoD CIO Teresa Takai said that: “The…

FedRAMP PMO Releases First Set of 3PAOs

By G C Network | May 14, 2012

Late today the FedRAMP Program Management Office released the first list of certified Third Party Assessment Organizations (3PAOs). These companies are accredited to perform initial and periodic assessment of cloud…

FedRAMP Releases Updated Security Assessment Plan Templates

By G C Network | May 8, 2012

Last week the GSA FedRAMP Program Office released the latest version of the cloud computing Security Assessment Plan (SAR) template.  This document is the most recent step toward the Federal…

NJVC® and Gravitant® Announce New Strategic Alliance: Partnership to Benefit Federal Agencies with Powerful Provision and Management of Cloud Services that Unify Multiple Providers

By G C Network | April 4, 2012

Vienna, Va., April 4, 2012 — NJVC®, one of the largest information technology solutions providers supporting the U.S. Department of Defense, and Gravitant®, a provider of cloud brokerage and management…

NJVC® VP and GM, Cloud Services, Kevin L. Jackson to Speak on Cloud Security at 2012 Emerging Threats and Cyber Defense Symposium

By G C Network | March 18, 2012

Vienna, Va., March 15, 2012 — NJVC®, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, is pleased to announce that Kevin L. Jackson,…

NJVC’s Kevin L. Jackson Co-Authors INSA White Paper on Cloud Computing for the Intelligence Community

By G C Network | March 13, 2012

Findings Reflect Insight from More than 50 Cloud Thought Leaders   VIENNA, Va.–(BUSINESS WIRE)–NJVC®, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, announces…

INSA Study on Cloud Computing in the Intelligence Community: Rollout 13 March 2012 | SYS-CON MEDIA

By G C Network | March 10, 2012

(Originally posted by Bob Gourley at CTOvision)         Over the last year I’ve had the pleasure of serving with a team of volunteers from the Intelligence and National Security Alliance…

Late last week I asked the following question on linkedIn

“Are Cloud Computing concepts applicable in secure national security and law enforcement arenas (i.e. Defense, Homeland Security, Intelligence, Justice)? If so, how? If not, why? “

The responses were very interesting:

Software Architect – I think they are certainly applicable. Speaking specifically of Amazon’s Web Services, security is one of the main pillars of the platform and all of their services provide the ability to lock down access. ….. Auditing security on well-known cloud computing platforms is actually much simpler than in-house computing as knowledge of the systems in use is much more broad and transparent.

Sr. Advisory Architect – They already are, and have been for quite some time

IT Business Consultant manager – I can image that many business strategists or security architects who are new to the concept will balk at the idea of allowing information to live in a cloud they don’t control and will likely propose some sort of “special cloud” of their own – thus defeating the ROI altogether

Senior Computer Systems Engineer – I have been asked to informally consult on this issue and I am a bit skeptical about the storage aspect of cloud computing. The client I was consulting for had some serious legal issues in relation to storing data outside certain geographical boundaries (where the cloud provider(s) where) which was a big obstacle from the very beginning.

Information Assurance Executive – Cloud Computing concepts in secure (trusted) information sharing environments are applicable however, involve some additional complexities that other environments do not. These environments should adhere to published data, security, infrastructure and interoperability standards (e.g. W3C, OASIS) and by default should be cross-domain (e.g. DoD, IC) compliant following prescribed national security requirements.

Team Lead – Compared to “on site” storage – I hear the argument that it is MUCH MORE secure in the cloud.

Serial Entrepreneur – Cloud computing is mainly about scale. Google and Amazon have such massive deployments that the operational costs of the resources dwarf most organizations. If we look at the governmental apparatus and think of it as a client of computational resources it is indeed very big. It would seem to me that given their possession of adequate scale they could simply run a private infrastructure for themselves and have their own cloud.

Director of Strategic Operations – I think we’re going to see an increase in grid computing and cloud computing concepts as the costs drop and the benefits become more tangible. I think national security implementations are prime candidates for early adoption of such technologies – beyond whatever may already be in place now – simply because of the massive scale of the computing effort, storage, and general computational requirements of such massive data sets.

Information Technology & Services Consultant – The whiteboard used to iron out all the ‘gotchas’ in a Cloud Computing environment for secure national security and law enforcement arenas would stretch around the Bronx Zoo (i.e. the baseball stadium)…

All the responses can be read at LinkedIn answers .

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Markus Klems on July 3, 2008 at 2:11 pm

    Kevin,
    thank you for your constant input to data security / SOA in the cloud. This is definitely a hot topic. I come from Germany where we have rather strict data protection laws. My 5 cents on my blog: http://markusklems.wordpress.com/2008/07/03/data-security-in-the-cloud/



  2. OCHomeTheater on July 5, 2008 at 4:53 am

    I am a computer engeenier. Certainly it has a major role to play .