The future of Defense is on the "Cloud": 600 million dollars invested with Amazon Web Services

The US Intelligence Community (IC) is moving at lightning speed to leverage the benefits of migrating its networks to the cloud to enable faster data consolidation, wider access to sensitive information, and network integration significant from an operational point of view.

Working closely with Amazon Web Services, IC entities have pursued a multivalent and multi-year initiative to move their networks to the cloud.

market 

600 million dollars is the value of the agreements with Amazon dating back to 2013. Amazon Web Services has the ability to create the C2S cloud for the CIA in order to collect and organize a myriad of data. A Bloomberg report cites CIA Director of Digital Innovation Sean Roche who reported at an Amazon conference that the migration to the cloud was "nothing short of momentous": It has transformed our potentials into building new capabilities.

Public and Private Interaction

A phenomenon often discussed is what is happening as a result of rapid commercial migration to the cloud, ie the existence of multi-annual government development programs that may run the risk, in some cases, of generating obsolete and non-current technical systems for the cloud. The commercial innovation of the cloud using an open architecture framework, is designed to allow faster and wider updates, more consistent with the most current and strong impact innovations. Commercial security solutions can also bring advantages in other ways, such as allowing networks to download the most advanced patches or fixes in a quicker time frame. At the same time, Cybersecurity experts they say that the innovations, safety practices and progress the government wants can lead to increasingly advanced solutions of commercial systems.

Advantages in the military world

Indeed, an ideal mix, the developers point out, is to unite government plans, concepts and technological discoveries with elements of rapid progress in the private sector. The multifaceted cloud initiative includes data consolidation, hardware footprint reduction, cyber hardening weapons systems, and efforts to connect satellite ground terminals more seamlessly to one another. other; the key concept, of course, is to increase access to otherwise disparate groups of information, share data quickly, and offer intelligence analysts and battlefield commanders tactical options faster.

Cloud and Artificial Intelligence (AI)

Of great importance, even improved AI applications in the cloud can perform real-time analysis and achieve rapid decisions by comparing the new input with a large database. Based on a dual cloud migration strategy that aims to maximize both decentralized nodes and centralized servers, cloud-enabled operations can achieve seemingly limitless benefits.

Security problems

There are a variety of aspects in which cloud migration, strengthened by AI, changes the paradigm for information security and data access. In a sense, cloud-based systems could potentially increase security challenges if intruders gain greater access to large data systems through fewer access points. However, at the same time, cloud-enabled virtualization can network many security-oriented software applications and other measures that detect anomalies much more quickly, defend large networks, and counter intruders. Leveraging cloud technology, this type of software can simultaneously protect multiple nodes in a more ubiquitous and far-reaching way. Finally, given the presence of extremely advanced governments in the development of cybersecurity applications, the merging of commercial and government initiatives could prove to be the best strategy possible.

Therefore, migration to the cloud is largely intended to involve a particular paradox; while cloud technology can enable more homogeneous or ubiquitous virtualized security systems, it can also pose the risk of exposing large amounts of data to potential intruders if an attack were successfully achieved.

However, this is exactly the kind of challenge experienced cloud developers like Amazon Web Services and Microsoft are ready to solve. Additionally, given the effective reach of cloud-oriented security practices and technologies, Amazon's cloud migration efforts are already increasing security. For example, it can increase data sharing within secure networks, keeping them separate from the most vulnerable systems. Additionally, cloud-enabled security “fixes” can instantly reach entire networks in real time. Furthermore, artificial intelligence and machine learning are rapidly evolving to the point where algorithms can interpret the "context" to a greater extent and analyze the variables deemed more subjective, such as speech patterns or linguistic nuances, as long as there is a some kind of precedent or existing information on which to organize and interpret new data.

The future soldier

Commercial cloud technology is already increasing security for the US military and further extends security to the limit of tactical combat operations by bringing secure networks, such as SIPRnet, to mobile devices such as smartphones and tablets. This allows soldiers, moving in advanced positions, to engage in a safer network during combat. Surely it is useless to say that this is a big potential advantage for the IC. In fact, this - and the benefits of more dispersive, but secure, mobile networking has been anticipated in an essay by the 2013 of the US Army Command and Staff College. "There are clear definitions between the permanent networks in garrison locations and the temporary and portable networks used in tactical environments," says the essay, called "The military applications of cloud computing technologies". (Maj. Dallas Powell Jr.)

Aeronautica Militare

Cloud technology can also accelerate the types of computer automation by offering a much broader scope. For example, the developers ofAir Force they are using advanced computer automation to replicate online human behavior for the specific purpose of attracting and tracking potential intruders. Algorithms can create online activities that resemble those of a single user, leading intruders to think of tracing a person when, in reality, they are monitored. In addition, AI can be used to perform real-time analysis of incoming traffic that may contain malware, viruses or any type of intrusion attempt. If the source, the characteristics or the distinguishable model of a cyberattack are quickly identified, the IT defenders are in a better position to respond. The cloud offers the opportunity to perform these functions simultaneously through a large number of interconnected "nodes". By facilitating interoperability of satellite land terminals, improved network data sharing, cloud-based systems can also accelerate SATCOM connectivity and enable command and control technology to accelerate directives, explained developers of the sector.

Navy

For example, the Navy is working with CISCO to leverage AI-powered cloud technology to offer instant connectivity between ship-based networks, command and control centers, and on-board systems such as engines, developers explain. The concept, now explored through laboratory prototypes, is to use cloud-based real-time artificial intelligence to measure on-board systems on a historical database full of highly relevant information for navigation technologies.

 

The future of Defense is on the "Cloud": 600 million dollars invested with Amazon Web Services

| Economics, EVIDENCE 2 |