British Spies Trust Amazon With Their Secrets

The British three spy agencies, GCHQ, MI5 and MI6, have awarded a contract to Amazon Web Services (AWS) to host classified material.  MI5 and MI6 will also use the AWS system to store secret data with the aim is to increase the use of data analytics and Artificial Intelligence (AI) for espionage.

The deal, estimated to be worth £500 million to £1 billion over the next decade, was signed earlier this year and the cloud storage system will make it easier for spies to share information from abroad and improve the use of voice recognition and other technologies.

GCHQ had supported the procurement of a high-security cloud system, which would be used by its sister services, MI5 and MI6. Other government departments, including the Ministry of Defence, will also use the system during joint operations. 

GCHQ has been using basic forms of AI, such as translation technology, for years but is stepping up its use, partly in response to the use of AI by hostile states and partly due to the data explosion that makes it effective. In February, British spies at GCHQ said they had fully embraced artificial intelligence (AI) to uncover patterns in global data to counter hostile disinformation and catch child abusers.

The contract with Amazon is likely to ignite concerns over sovereignty because the Britian’s most secret data will be hosted by a single US technology company although GCHQ has declined comment on reports about its relationships with suppliers.

Gus Hosein, the executive director of Privacy International, told the Financial T there were many things parliament, regulators and the public needed to know about the deal. “This is yet another worrying public-private partnership, agreed in secret,” he said. “If this contract goes through, Amazon will be positioned as the go-to cloud provider for the world’s intelligence agencies. Amazon has to answer for itself which countries’ security services it would be prepared to work for.”

Financial Times:      Guardian:       Telegraph:    Times:    Newsbreak:    PressReader:      Bharat Express

You Might Also Read:

The Risks &  Benefits Of Cloud Security:

 

« GCHQ Boss Says Ransomware Attacks Have Doubled In A Year
Cambridge University Rejects £400m Over Pegasus Hacking »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Presidio

Presidio

Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.