The popular cloud storage platform, Amazon has announced to launch a service designed to assist CIA and other intelligence agencies. Amazon was already been in news due to the Pentagon data leak, however, on Monday they introduced a so-called Secret Region service.
Unlike its name, the service is not really a fully secret one. It’s just called the secret one due to its ability to host software and data which is classified into the “secret” level. With such capability, the Amazon web service will become more effective for intelligence agencies that have to deal with the sensitive information regularly.
Amazon being the super cloud managing service has many regions among the newly launched Secret Region. The largest region of its network is US-East-1 which is located in Northern Virginia. Therefore, when the services of US-East-1 are down, all of its connected apps have to face the hassle.
Since 2014, Amazon has launched a top-secret region for the US intelligence community. This service was constructed especially for the US intelligence in an amount of $600 million. The new Secret Region is a part of same Amazon-CIA deal.
But, there is a difference between the previous region and the new one. This Secret Region would also allow non-governmental intelligence agencies to file their paperwork assuming that they would be legitimate. The launched service is a collective work of Amazon and government to promote it as a way for US intelligence community to upgrade its infrastructure and more information could be delivered to the appropriate individuals in less time.
Share this article
About the Author
Zehra Ali is a Tech Reporter and Journalist. She has done her Masters in Mass Communication. Topics related to cybersecurity, IoT, AI, Big Data and other privacy matters are extensively covered by her on various platforms. You can follow her on twitter.
More from Zehra AliRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...