Jump to content

Recommended Posts

Amazon web services does have a private cloud for government agencies, same value proposition that they offer companies. But, there is a sectiony directed at file sharing for intelligence assets. Supposedly intended for stuff that's too sensitive for the NSA's often compromised systems.

 

The main government site is Amazon GovCloud, with the restricted and isolated region in deep space.

Link to post
Share on other sites

Amazon web services does have a private cloud for government agencies, same value proposition that they offer companies. But, there is a sectiony directed at file sharing for intelligence assets. Supposedly intended for stuff that's too sensitive for the NSA's often compromised systems.

 

The main government site is Amazon GovCloud, with the restricted and isolated region in deep space.

 

Nope

Link to post
Share on other sites

Orik and Taon are right though. "Deep Web" is just a rebranding of what we've called the "Dark Web" for years. TOR, of course, was originally funded by the U.S. government as a way for dissidents in repressive countries to communicate. (In a nutshell it uses protocols that attempt to anonymize both the entry and end points of a communication. You can use it with the "regular" web, it's just that much of the traffic is to and from "anonymized" websites. Regular encrypted email/Proton/Mime and VPNs etc. encrypt the traffic...but do not anonymize the user, TOR attempts to anonymize the entry and end points as well.)

 

As a practical matter, the largest amount of traffic on the Deep/Dark Web relates to child porn and narcotics trafficking (false identification cards probably being the third largest. Firearms after that). But there is plenty of benign/normal traffic as well (from paranoid types).

Link to post
Share on other sites

 

Amazon web services does have a private cloud for government agencies, same value proposition that they offer companies. But, there is a sectiony directed at file sharing for intelligence assets. Supposedly intended for stuff that's too sensitive for the NSA's often compromised systems.

 

The main government site is Amazon GovCloud, with the restricted and isolated region in deep space.

 

Nope

 

 

 

The WSJ had a piece on the deep intelligence agency corner of AWS. Even intelligence agency access is restricted.

 

https://aws.amazon.com/government-education/government/

Link to post
Share on other sites

You're confusing a bunch of different things. (Or the WSJ was.)

 

Classified information at Secret or above is always air-gapped from the internet with one likely very limited exception: obviously you will receive information from sources in whatever format is possible for them to transmit it. After that it would be put on an air-gapped government system.

 

Once you get to TS/SCI data, it is always restricted access. Just because someone has a TS/SCI clearance does not mean they have access to everything SCI or even everything on JWICS or in a SCIF they have access to. It's always on a need-to-know basis (that's the point of SCI). Technically PII and HIPPA information are also "need to know" even though they are only classified as "Confidential."

 

The point of an air-gapped network is to prevent non-physical penetration by a "hacker", obviously it doesn't inherently penetrate betrayal by someone with physical access (the information taken in the OPM hack was PII/Confidential, not Secret)...which is why it could be on a non air-gapped server).

 

Confidential government information is indeed hosted on AWS. Not Secret or higher (which is what people usually mean by "Classified" -- but "classified" isn't a status, it just means the information has a status. Confidential (your SSN for example) is a status. If that makes sense. It wouldn't surprise me if file sharing with a foreign national source may take place over the internet...but that's hardly the storing of secret information.

Link to post
Share on other sites

Of course docs of all classifications are regularly found on employee home computers and senior management laptops. From there they have been know to find their way to the dark and not so dark web.

 

Right, that's the betrayal by someone with physical access. The unlawful removal of data across the air gap.

Link to post
Share on other sites

I've not encountered an organization where this doesn't take place on a regular basis because it is necessary to complete the work assigned, so it's unlawful in a very cynical sense.

 

It's probably even worse that the air gap then gets bridged again by usb drives being brought back in...

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...