Intelligence In The Cloud: Lockheed Martin And Esri Cloud Deployment Enables Geospatial Information Sharing Across Intel Community

CNN Money / PR Newswire,  Tuesday, February 17, 2015

The deployment of the portal for Esri's ArcGIS geographic information system (GIS) provides a single environment for analysts to securely organize and share data throughout the intelligence community and Department of Defense. It's also the foundational step in consolidating multiple geospatial intelligence portals into the single NGA-provided portal, resulting in technology and license cost savings. This is NGA's second pioneering step in the cloud, after the agency moved their Map of the World application to the C2S environment late last year.

Safe Harbor's Final Reckoning May Begin Next Month

Sam Pfeifle, IAPP,  Tuesday, February 17, 2015

Late last week, Max Schrems, the Austrian law student who began Europe-v-Facebook and has seen his suit against the Irish DPA regarding Facebook's handling of his data forwarded all the way to the European Court of Justice, posted a somewhat cryptic tweet... Contacted directly, Schrems could only say that he'd been given a "heads up" from the courts and that he's bound by court rules that don't allow for public statements that might be construed as trying to influence public opinion around the case. As a refresher, at issue is whether U.S. intelligence programs, such as PRISM, which involve sharing by U.S. companies of EU citizen data with organizations like the NSA, violate the fundamental rights of those EU citizens. If the ECJ finds that they do, then Safe Harbor could be invalidated as a program for cross-border data transfer between the EU and U.S.

The Impact of the Dark Web on Internet Governance and Cyber Security

Michael Chertoff and Tobby Simon, Global Commission on Internet Governance,  Tuesday, February 17, 2015

The term deep Web is used to denote a class of content on the Internet that, for various technical reasons, is not indexed by search engines. The dark Web is a part of the deep Web that has been intentionally hidden and is inaccessible through standard Web browsers. The deep Web has the potential to host an increasingly high number of malicious services and activities. In order to formulate comprehensive strategies and policies for governing the Internet, it is important to consider insights on its farthest reaches — the deep Web and, more importantly, the dark Web. This paper endeavours to provide a broader understanding of the dark Web and its impact on our lives.

Google warns against expanding FBI hacking power

Cory Bennett, The Hill,  Tuesday, February 17, 2015

Google urged a small government rules committee to block a Department of Justice (DOJ) request that would expand the FBI’s ability to remotely collect electronic information in the U.S. and abroad. The DOJ filed its request last year to the little-known Advisory Committee on Criminal Rules. The department wants the committee to give judges the power to authorize warrants for electronic searches in multiple jurisdictions, or when investigators don’t know the physical location of a device. Such a move, Google said in comments filed to the committee, “substantively expands the government’s current authority,” and “raises a number of monumental and highly complex constitutional, legal and geopolitical concerns.” The tech giant’s comments put them on the side of civil liberties and privacy advocates, who appeared before the committee in November to strongly protest the proposal.

Google defends its use of data, points finger at governments

Business Cloud News,  Monday, February 16, 2015

Google’s senior vice president communications and public policy Rachel Whetstone has defended the company’s evolving strategy on collecting and managing personal data, but said governments need to reform how they seek data from private firms and one another. She also said Google’s progressive policy on encryption “requires governments to go through the proper legal channels” for customer data, and hit out at how governments secure data from one another and private firms across borders for law enforcement purposes including surveillance. “The MLAT process is too slow, too complicated and in need of reform,” she said. “Europe is leading the way here. We now need the US to follow suit.”

Why Hybrid Cloud Continues to Grow: A Look at Real Use-Cases

Bill Kleyman, Data Center Knowledge,  Monday, February 16, 2015

Moving forward, the hybrid cloud model will give end-users even more services and benefits. A recent Gartner report found that the use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend. 2016 will be a defining year for cloud as private cloud begins to give way to hybrid cloud. By the end of 2017, nearly half of large enterprises will have hybrid cloud deployments.

Microsoft beats rivals to certify under new public cloud security standard

Business Cloud News,  Monday, February 16, 2015

Microsoft has adopted a relatively new ISO standard that specifies measures to protect Personally Identifiable Information (PII) in public cloud environments. The company claims it is the first public cloud provider to do so. Microsoft, a huge advocate of regulatory reform around data privacy rights in the US, is currently embroiled in a court case that has seen the IT giant repeatedly challenge US District Court rulings compelling it to hand over email and contact information stored in its cloud platform in Ireland as part of a drug-trafficking trial. The company is currently supporting a number of recently introduced laws that seek to limit the reach of US courts over data stored in cloud services located outside the US.

How Cyber-security Leaders Evaluate White House Strategy

Chris Preimesberger, eWeek,  Sunday, February 15, 2015

Before a capacity audience of Silicon Valley executives, invited guests and members of the media, the president signed and enacted an executive order for this back-channel information-sharing cooperation to actually get moving in real time. The order asks organizations to invest in improving cyber-security defenses, become proactive in helping each other out when crises arise and not be shy about asking the federal government for assistance. Industry leaders agree: Cyber-security is everyone's business. More significant public-awareness campaigns are needed.

US lawmakers propose reforms to limit government’s reach over cloud data

Business Cloud News (UK),  Friday, February 13, 2015

This would effectively force the US and other countries it currently has treaty agreements with which focus on or impact data sharing between countries (Safe Harbour, or MLAT, for instance) to lean more heavily on those treaties for regulatory clarity, while allowing for local providers to defer to legislation in their home countries in the event of a conflict between legal frameworks – even if the firm located outside the US is a subsidiary of an American company.

Proposed US law could deal knockout blow to FBI in overseas cloud privacy ding-dongs

Iain Thomson, The Register,  Friday, February 13, 2015

"The government’s position that ECPA warrants do apply abroad puts US cloud providers in the position of having to break the privacy laws of foreign countries in which they do business in order to comply with U.S. law. This not only hurts our businesses’ competitiveness and costs American jobs, but it also invites reciprocal treatment by our international trading partners." - Senator Chris Coons