Is anyone concerned about having half the nodes at a facility that currently has a $600m contract with the CIA for use of their cloud servers, or is this a non-issue?
What are you talking about? This sounds like FUD.
They won a bid over IBM less than 6 months ago, its apparently to host a dedicated CIA cloud, but i wouldnt rule out them having access to the facility itself.
Can you source please? Thanks.
http://lmgtfy.com/?q=amazon+wins+cia+cloud+contractAmazone GovCloud ip is 96.127.0.0/18 (96.127.0.0 - 96.127.63.255)
You can rest assured that CIA won't be on Amazon GovCloud unless (or even if) they are hosting front-end web application services on there only. It will most likely be a private cloud offering for them.
Yeah from what i understand it is a private cloud, amazon got some shit for it because theyve always been against private clouds(i guess the money wasnt good enough)
Im not a code guy so im looking at it like, if amazons holding CIA intel then agents probably have direct physical access to the hardware, which theoretically means they have physical access to the facility itself, and thus (some) nodes, i guess depending on what data centers theyre at. Isnt it super easy for them to just go in and unplug a bunch of nodes because TERRISMZ? Again im not a code guy, so i dont even know if nodes can be readily recognized or anything, maybe putting darkcoin nodes, amazon cloud and cia together in my brain just threw up red flags(as far as safety, not intention).
Plus those guys dont really follow rules, they just issued an apology for pretending to give people vaccines while they were really collecting blood looking for bin laden dna. These are insane people.
If im reaching way too far, kindly disregard
There is guaranteed to be no physical or virtual connection between the two clouds. Maybe except for (not even) agency's simple website, nothing Defense or Intelligence can be hosted on the GovCloud, or anything tangent to it. Even if you are hosted on the GovCloud or commercial cloud, you have no right or expectation of a right to enter the data center unless for an initial site visit.
I mentioned this before, if you wish to be concerned with anything, read up on "key escrow". There is no need to physically touch anything touch to snoop, listen, manipulate, etc. There is no need for any software to have a backdoor, etc. All of those discussion sound quite non-technical. Those who wish to listen already are listening, know who is who, and what they are capable of.