• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / Latest News / The Pentagon Cloud – Suggestions

The Pentagon Cloud – Suggestions

June 1, 2018 by Stephen Bryen

The Pentagon has given up, at least for now, its attempt to ram through a massive procurement for cloud-based computer services – a procurement it had rigged in the opinion of many in the industry to go to Jim Bezos’ Amazon which already has a contract with the CIA.

However, there are conflicting stories so no one can yet be sure the proposed deal is fully in the waste bin.

It should be trashed for operational reasons.

The Pentagon’s proposed single award contract included no backup system should the cloud go down.  This means one of two things: either the Pentagon thinks it does not need a backup or, more likely it will continue to operate its disparate computer networks as the actual backup.

In the first instance, if there is no backup you are looking at a recipe for disaster.

In the second instance, using the old system which has repeatedly been subject to successful cyber attacks including cyber thefts and denial of service, the existing vulnerabilities of the backup will simply transit to the new cloud and expose it to multiple threats.

Most commercial businesses that use cloud computing have multiple providers that both help segment the risk by appropriating it among different suppliers and assuring prompt recovery in case of failure.

For a variety of reasons, but mostly because the Pentagon does not know how to put in place security around multiple cloud environments, the Pentagon did not follow this common sense approach.

In fact, outsourcing highly sensitive information is the Achilles heel not only of the Pentagon but of the entire security establishment.  Consider NSA.  NSA has outsourced all sorts of work to contractors and has paid the price as spies have found it much easier to go after contractors than try and penetrate NSA itself.

Edward Snowden, for example –the former CIA employee– was hired by Dell, and later by Booz Allen Hamilton, which was contracted by the NSA, giving Snowden unprecedented access to super-sensitive spying operations which he systematically leaked and –though not proven– may have shared with foreign governments, especially Russia (where he now has temporary asylum).

Outsourcing is a risky business, and it is especially risky where the private company has limited or no experience in operations in a secure environment.

But simply avoiding costs and responsibilities by going to a single source cloud solution introduces an even more significant risk: namely creating a single target for an adversary.

If in a crisis the adversary can disable the cloud network source, Pentagon operations would suffer a severe hit.  While cloud systems are built to be redundant and often integrate the latest security protections, most of the cloud hardware and software is commercial, meaning it is relatively easy for an adversary to understand its flaws and vulnerabilities.  More broadly, the entire US critical infrastructure suffers from the same disease, whether or not it is using cloud computing.  But, by creating a single target the Pentagon jacks up the risk for a successful attack on its operations.

During the pause, which may or may not be indefinite, the Pentagon needs to figure out:

  1. how it can distribute its vital classified and operational information to multiple platforms to reduce the risk of a denial of service, disruption of military operations and theft of command and control and data;
  2. how it can support security measures and put in place the mechanisms to protect security if outsourced to a cloud service;
  3. figure out the costs of supporting security measures
  4. figure out how qualified personnel can be hired for both the operational and supervisory tasks and how they can receive necessary security clearances
  5. decide how currently employed and cleared military and civilian cyber personnel can be retained if cloud operators offer them better deals
  6. invest in R&D to get away from commercial high-risk computing and networking platforms
  7. develop cloud monitoring systems that can be operated by military commands and that can watch cloud network activity and report disruptions, breaches, and intrusions (such systems right now either don’t exist or are entirely in the hands of the cloud operators)
  8. put in place disclosure requirements on contractors in order to make sure negative information is reported in a timely manner
  9. evaluate whether the Pentagon should think of alternatives to just a “rent a cloud” approach –for example, joint operation, shared ownership, and locating cloud systems in secure places such as military bases or trusted research organizations
  10. consider how to avoid being vendor trapped if cloud performance is unsatisfactory.

It remains to be seen if the Defense Department has the guts and courage to do the job the right way.

*This commentary was posted on Bryen’s blog, on June 1, 2018

Filed Under: Latest News Tagged With: Cloud, Cybersecurity, Pentagon, Pentagon Cloud

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.