Is Cloud Computing applicable in national security and law enforcement?

The Endpoint Imperative: Global Security Compliance. Are you ready?

By G C Network | November 12, 2017

    China has its Cybersecurity Law. Next May, the General Data Protection Regulation – or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t…

The Endpoint Imperative: IT Spending: Setting Priorities in a Volatile World

By G C Network | November 5, 2017

  Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user…

Top 1000 Tech Bloggers

By G C Network | October 24, 2017

The Rise “Top 1000 Tech Bloggers” leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger’s twitter conversations on…

IBM – The Power of Cloud Brokerage

By G C Network | October 14, 2017

Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud…

More SMB Love Needed

By G C Network | September 29, 2017

    In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB…

ATMs Are IT Too!

By G C Network | September 5, 2017

That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared.  Operations today require efficient and global management of technologically heterogeneous environments. The challenges and…

Digital Transformation Asset Management

By G C Network | August 30, 2017

Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi.  Dealing with this type of change in business even…

The Game of Clouds 2017

By G C Network | July 30, 2017

The AWS Marketplace is growing at breakneck speed, with 40% more listings than last year! This and more insights were revealed when CloudEndure used their custom tool to quickly scan the…

Managing Your Hybrid Cloud

By G C Network | July 14, 2017

Photo credit: Shutterstock   Runaway cloud computing cost may be causing an information technology industry crisis.  Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. …

American Airlines Adopts Public Cloud Computing

By G C Network | June 30, 2017

Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the…

Late last week I asked the following question on linkedIn

“Are Cloud Computing concepts applicable in secure national security and law enforcement arenas (i.e. Defense, Homeland Security, Intelligence, Justice)? If so, how? If not, why? “

The responses were very interesting:

Software Architect – I think they are certainly applicable. Speaking specifically of Amazon’s Web Services, security is one of the main pillars of the platform and all of their services provide the ability to lock down access. ….. Auditing security on well-known cloud computing platforms is actually much simpler than in-house computing as knowledge of the systems in use is much more broad and transparent.

Sr. Advisory Architect – They already are, and have been for quite some time

IT Business Consultant manager – I can image that many business strategists or security architects who are new to the concept will balk at the idea of allowing information to live in a cloud they don’t control and will likely propose some sort of “special cloud” of their own – thus defeating the ROI altogether

Senior Computer Systems Engineer – I have been asked to informally consult on this issue and I am a bit skeptical about the storage aspect of cloud computing. The client I was consulting for had some serious legal issues in relation to storing data outside certain geographical boundaries (where the cloud provider(s) where) which was a big obstacle from the very beginning.

Information Assurance Executive – Cloud Computing concepts in secure (trusted) information sharing environments are applicable however, involve some additional complexities that other environments do not. These environments should adhere to published data, security, infrastructure and interoperability standards (e.g. W3C, OASIS) and by default should be cross-domain (e.g. DoD, IC) compliant following prescribed national security requirements.

Team Lead – Compared to “on site” storage – I hear the argument that it is MUCH MORE secure in the cloud.

Serial Entrepreneur – Cloud computing is mainly about scale. Google and Amazon have such massive deployments that the operational costs of the resources dwarf most organizations. If we look at the governmental apparatus and think of it as a client of computational resources it is indeed very big. It would seem to me that given their possession of adequate scale they could simply run a private infrastructure for themselves and have their own cloud.

Director of Strategic Operations – I think we’re going to see an increase in grid computing and cloud computing concepts as the costs drop and the benefits become more tangible. I think national security implementations are prime candidates for early adoption of such technologies – beyond whatever may already be in place now – simply because of the massive scale of the computing effort, storage, and general computational requirements of such massive data sets.

Information Technology & Services Consultant – The whiteboard used to iron out all the ‘gotchas’ in a Cloud Computing environment for secure national security and law enforcement arenas would stretch around the Bronx Zoo (i.e. the baseball stadium)…

All the responses can be read at LinkedIn answers .

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Markus Klems on July 3, 2008 at 2:11 pm

    Kevin,
    thank you for your constant input to data security / SOA in the cloud. This is definitely a hot topic. I come from Germany where we have rather strict data protection laws. My 5 cents on my blog: http://markusklems.wordpress.com/2008/07/03/data-security-in-the-cloud/



  2. OCHomeTheater on July 5, 2008 at 4:53 am

    I am a computer engeenier. Certainly it has a major role to play .