SlideShare a Scribd company logo
1 of 2
Download to read offline
92 GlobeAsia January 2014
Technology
Can cloud computing
survive the NSA
disclosures?
not just named some of the most
valuable companies in the world.
The cloud computing market (which
estimates have valued at over $200
billion) is seriously in jeopardy. A recent
survey by the industry group Cloud
Security Alliance had over half its non-
US members report that they are less
likely to use US-based cloud services in
the future. Even more troubling, a good
10% of these members have gone on to
cancel their agreements with US-based
cloud services.
The lack of trust is not only evident
among individuals. Governments
around the world have been tripping
over themselves trying to limit their
exposure to the long arm of the NSA.
This is particularly evident in the
so-called BRIC countries, nations
considered to have successfully
navigated the seas towards advanced
economic development.
Brazil’s President Dilma Rousseff
– herself a target of NSA spying – has
been particularly vocal about the need
for increased internet governance to
combat illegal snooping. Rousseff went
so far as to lodge a formal protest and
cancel a planned state visit to the US in
protest at the revelations.
Russia, for its part, has also
(somewhat hypocritically) derided
US encroachment of civil liberties
and offered Snowden temporary
asylum. The country has also taken
further steps to ensure that its official
data is safe – and it is not alone. In
the subcontinent for example, recent
reports out of India indicate that the
country could ban services like Yahoo
and Gmail for official communication
even before the new year rolls around.
India’s Deputy National Security
Advisor has asked the Department
of Telecom to look into requiring
telecommunications and internet
companies to route their traffic through
the NIXI (National Internet Exchange
ver the past several
months, the disclosures
by former National
Security Agency (NSA)
contractor Edward
Snowden have hit internet companies
hard. Lately, there has been a steady
migration to the cloud services. People
were increasingly comfortable with
storing important documents online.
The NSA disclosures have stopped this
trend in its tracks, and could possibly
lead to its reversal.
According to a report in the
Financial Times, the NSA disclosures
could cost tech firms such as Google
and Apple $35 billion over the next
three years. The negative effects on
the industry itself are likely to be
especially acute, given the increased
reliance the modern economy places
on knowledge-based industries.
Studies quoted by a recent Financial
Post article indicate that “products and
services that rely on cross-border data
flows are expected to add an estimated
$1 trillion in value to the US economy
annually over the next 10 years.”
Of course this increased value will
never materialize if consumers are
unable to trust that data they store
in the cloud is free from prying eyes.
More worrying, perhaps, than strict
dollars and cents, the revelations have
cost these companies trust and that
could have a permanent effect on the
industry.
US-based tech companies are
struggling
The success of companies like Google,
Apple, Amazon and Facebook are
wholly predicated on whether or not
customers trust their data to these
firms. Unfortunately, if anything,
people have become even more
concerned about their privacy. This
would not be such a concern if I had
January 2014 GlobeAsia 93
by Jason Fernandes
 
of India), in order to limit the ability of
foreign (read: US) intelligence agencies
to spy on domestic traffic.
China, too, has not stood by
quietly. State-owned media in China
have condemned US spying and
have strongly suggested, if not quite
mandated, that local companies stick
to buying technology from domestic
sources. Another potentially crushing
blow to US companies.
The reaction of BRIC nations
to spying is particularly important
and could be regarded as both the
proverbial canary in the mine and the
raven that croaks “never more” in Poe’s
masterpiece. That these developing
nations are introducing institutional
controls should be very worrying to
US-based tech firms.
Other developed and so-called first
world nations like Germany have also
joined the increasingly-vocal clamor
for control over citizens’ data. All this
government interest will likely lead to
increased legislation that will make it
costly for US companies to compete
overseas.
China’s reaction has been
particularly instructive, if only for the
massive negative impact it has had on
US companies. Both Qualcomm and
Cisco have found the environment
in China increasingly hostile to
their interests post-NSA disclosures.
Qualcomm recently announced that
while they continue to expect growth
in China, growth has slowed, owing to
fallout from the Snowden revelations.
Cisco, on the other hand, is in
even hotter water and was forced to
cut revenue predictions down 10% for
the quarter, again in part owing to the
backlash over the US spying scandal.
The road ahead
With the shuttering of Snowden’s email
service Lavabit and others, people are
turning to overseas services like Mega.
co.nz (run by the flamboyant Kim
Dotcom) in order to better protect their
data. Unfortunately, the overall effect has
been a gradual and perhaps permanent
erosion of trust in the concept of cloud
computing and privacy.
The news is not all bad, however.
Ultimately the fates of these major
tech companies will be determined in
large part by how they address these
allegations. It’s not too late to restore
consumer confidence if they move
swiftly. Encouragingly, companies
like Google, Yahoo and Microsoft
have shifted focus to the encryption
of data that is in transit, an area where
they were particularly susceptible to
government snooping.
Further, many of these companies,
particularly Microsoft, have taken to
voluntarily disclosing information on
the number and nature of requests
for information they receive from the
government. This is in sharp contrast
to AT&T, which has reacted instead by
clamping down on information even
further and has fought vociferously
to keep its interaction with the NSA
secret. This is a study in how not to
handle a crisis.
Possibly the only way the industry
is going to survive is if it goes on the
offensive and advocates for customer
privacy instead. Case in point, this
month Microsoft publicly declared
the US government an “advanced
persistent threat.” A designation more
commonly used for state-sponsored
terrorists, these are strong words
indeed, coming from one of the tech
industry’s behemoths.
Microsoft has clarified that it
intends to notify government and
business customers when it receives
legal orders relating to their data, and
vigorously challenge such orders when
it is prevented by law from disclosing
the data’s existence.
The only thing that can banish
secrets is the cold, hard light of truth
and if the US tech sector is to survive, it
must show an increased dedication to
data privacy and transparency.
Recent revelations indicate that
it is inevitable that, at some point,
the people of the world will be living
in a modern version of 18th century
philosopher Jeremy Bentham’s
Panopticon. The idea behind Bentham’s
theoretical construct was that humans
would self-regulate if they assumed
they were always and continuously
being watched. Revolutionaries
overthrowing Nicolae Ceausescu
learnt that Romania’s dreaded state
surveillance system functioned on
just such a Wizard of Oz-like myth of
control.
Lately we have learned that reality in
modern America is quite the opposite
and its surveillance capabilities are far in
excess of what was previously thought.
The government has massive and
far-reaching surveillance powers and
ultimately it is up netizens themselves
to stand up and reject this control by
voting with their eyeballs. Only once US
surveillance starts affecting its balance
sheet are things likely to change.
Jason Fernandes is a tech commentator
and the founder of SmartKlock.
Unfortunately, the overall effect has been a gradual and
perhaps permanent erosion of trust in the concept of
cloud computing and privacy.

More Related Content

What's hot

Social-Final_TheDarkNet
Social-Final_TheDarkNetSocial-Final_TheDarkNet
Social-Final_TheDarkNet
Kurt Callaway
 
“The Powers That E - CIO”
“The Powers That E - CIO”“The Powers That E - CIO”
“The Powers That E - CIO”
Jeff Kaplan
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
YogeshIJTSRD
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
Gary Kazmer
 
Data and Power - Excerpt for LinkedIn
Data and Power - Excerpt for LinkedInData and Power - Excerpt for LinkedIn
Data and Power - Excerpt for LinkedIn
Liam McCarty
 

What's hot (20)

Social-Final_TheDarkNet
Social-Final_TheDarkNetSocial-Final_TheDarkNet
Social-Final_TheDarkNet
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
“The Powers That E - CIO”
“The Powers That E - CIO”“The Powers That E - CIO”
“The Powers That E - CIO”
 
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
Protect the American Investor From Financing CCP’s Surveillance State, Keith ...
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Data and Power - Excerpt for LinkedIn
Data and Power - Excerpt for LinkedInData and Power - Excerpt for LinkedIn
Data and Power - Excerpt for LinkedIn
 
CIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureCIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the Future
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Tech won't build it zine
Tech won't build it zineTech won't build it zine
Tech won't build it zine
 
2017 12-10 13 d
2017 12-10 13 d2017 12-10 13 d
2017 12-10 13 d
 
Research Paper
Research PaperResearch Paper
Research Paper
 
AMO 2010 Urban Symposium
AMO 2010 Urban SymposiumAMO 2010 Urban Symposium
AMO 2010 Urban Symposium
 
Does government matter in a digital world?
Does government matter in a digital world?Does government matter in a digital world?
Does government matter in a digital world?
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
ANA/BAA Law Conference Future of Media Presentation
ANA/BAA Law Conference Future of Media PresentationANA/BAA Law Conference Future of Media Presentation
ANA/BAA Law Conference Future of Media Presentation
 
Vietnam ICO Market - Asean Insight Vietnam
Vietnam ICO Market - Asean Insight VietnamVietnam ICO Market - Asean Insight Vietnam
Vietnam ICO Market - Asean Insight Vietnam
 
The Growth of the Digital Payment Ecosystem in China
The Growth of the Digital Payment Ecosystem in ChinaThe Growth of the Digital Payment Ecosystem in China
The Growth of the Digital Payment Ecosystem in China
 

Viewers also liked (6)

Oferta Specjalna
Oferta SpecjalnaOferta Specjalna
Oferta Specjalna
 
Imputan a Mestre por desvíos de fondos de subsidios
Imputan a Mestre por desvíos de fondos de subsidiosImputan a Mestre por desvíos de fondos de subsidios
Imputan a Mestre por desvíos de fondos de subsidios
 
Animales en peligro de extinción
Animales en peligro de extinciónAnimales en peligro de extinción
Animales en peligro de extinción
 
Respuesta al traumatismo
Respuesta al traumatismoRespuesta al traumatismo
Respuesta al traumatismo
 
Facebook marketing, un must pour les marques en tourisme!
Facebook marketing, un must pour les marques en tourisme!Facebook marketing, un must pour les marques en tourisme!
Facebook marketing, un must pour les marques en tourisme!
 
REVISTA Nº32 FERIA Y FIESTAS DE QUESADA, JAÉN.
REVISTA Nº32 FERIA Y FIESTAS DE QUESADA, JAÉN.REVISTA Nº32 FERIA Y FIESTAS DE QUESADA, JAÉN.
REVISTA Nº32 FERIA Y FIESTAS DE QUESADA, JAÉN.
 

Similar to Can cloud computing survive the NSA disclosures

www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
John Davis
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
ronak56
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 

Similar to Can cloud computing survive the NSA disclosures (20)

Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Medical study needs reform : Kapil Khandelwal, www.kapilkhandelwal.com
Medical study needs reform : Kapil Khandelwal, www.kapilkhandelwal.comMedical study needs reform : Kapil Khandelwal, www.kapilkhandelwal.com
Medical study needs reform : Kapil Khandelwal, www.kapilkhandelwal.com
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 

More from Jason Fernandes

More from Jason Fernandes (20)

Bitcoin for Dummies
Bitcoin for DummiesBitcoin for Dummies
Bitcoin for Dummies
 
Bitcoin- MansWorld june 2013
Bitcoin- MansWorld june 2013Bitcoin- MansWorld june 2013
Bitcoin- MansWorld june 2013
 
Bitcoin: Future Of Money or Curse
Bitcoin: Future Of Money or CurseBitcoin: Future Of Money or Curse
Bitcoin: Future Of Money or Curse
 
Bitcoin and the future of money
Bitcoin and the future of moneyBitcoin and the future of money
Bitcoin and the future of money
 
Goa should model its IT policy on Singapore
Goa should model its IT policy on SingaporeGoa should model its IT policy on Singapore
Goa should model its IT policy on Singapore
 
SONY PS4 VS. MICROSOFT XBOX ONE – MansWorld
SONY PS4 VS. MICROSOFT XBOX ONE – MansWorldSONY PS4 VS. MICROSOFT XBOX ONE – MansWorld
SONY PS4 VS. MICROSOFT XBOX ONE – MansWorld
 
KILLER APPS - MansWorld
 KILLER APPS - MansWorld KILLER APPS - MansWorld
KILLER APPS - MansWorld
 
HOW TO BUILD YOUR OWN CLOUD - MansWrold
HOW TO BUILD YOUR OWN CLOUD - MansWroldHOW TO BUILD YOUR OWN CLOUD - MansWrold
HOW TO BUILD YOUR OWN CLOUD - MansWrold
 
BREAKING IN THE PEBBLE – MansWorld
BREAKING IN THE PEBBLE – MansWorldBREAKING IN THE PEBBLE – MansWorld
BREAKING IN THE PEBBLE – MansWorld
 
A BRIEF HISTORY OF SOUND – MansWorld
A BRIEF  HISTORY OF SOUND – MansWorldA BRIEF  HISTORY OF SOUND – MansWorld
A BRIEF HISTORY OF SOUND – MansWorld
 
5 KICKSTARTER PROJECTS WORTH BACKING - MansWorld
5 KICKSTARTER PROJECTS WORTH BACKING - MansWorld5 KICKSTARTER PROJECTS WORTH BACKING - MansWorld
5 KICKSTARTER PROJECTS WORTH BACKING - MansWorld
 
Will whatsapp anti-corruption campaign reduce graft in the police department?
Will whatsapp anti-corruption campaign reduce graft in the police department?Will whatsapp anti-corruption campaign reduce graft in the police department?
Will whatsapp anti-corruption campaign reduce graft in the police department?
 
Has the state govt done enough to ease the way for entrepreneurs
Has the state govt done enough to ease the way for entrepreneursHas the state govt done enough to ease the way for entrepreneurs
Has the state govt done enough to ease the way for entrepreneurs
 
CUT THOSE UMBILICAL TIES. OR NOT…-  The Goan
CUT THOSE UMBILICAL TIES. OR NOT…- 	The Goan CUT THOSE UMBILICAL TIES. OR NOT…- 	The Goan
CUT THOSE UMBILICAL TIES. OR NOT…-  The Goan
 
IT INVESTMENT POLICY - Digital Family
IT INVESTMENT POLICY - Digital FamilyIT INVESTMENT POLICY - Digital Family
IT INVESTMENT POLICY - Digital Family
 
I. genius - DNA
I. genius - DNAI. genius - DNA
I. genius - DNA
 
Has the state govt. done enough to ease the way for entrepreneurs- -Times of ...
Has the state govt. done enough to ease the way for entrepreneurs- -Times of ...Has the state govt. done enough to ease the way for entrepreneurs- -Times of ...
Has the state govt. done enough to ease the way for entrepreneurs- -Times of ...
 
GOAN WINS ACCLAIM AT ASIAN SCIENCE WRITING PRIZE, 2015 -  The Times Of India
GOAN WINS ACCLAIM AT ASIAN SCIENCE WRITING PRIZE, 2015 - 	The Times Of IndiaGOAN WINS ACCLAIM AT ASIAN SCIENCE WRITING PRIZE, 2015 - 	The Times Of India
GOAN WINS ACCLAIM AT ASIAN SCIENCE WRITING PRIZE, 2015 -  The Times Of India
 
Times of india article
Times of india articleTimes of india article
Times of india article
 
TEENAGER WITH DYSLEXIA WINS AWARD FOR HIS WEB SITE -  India Abroad
TEENAGER WITH DYSLEXIA WINS AWARD FOR HIS WEB SITE - 	India Abroad TEENAGER WITH DYSLEXIA WINS AWARD FOR HIS WEB SITE - 	India Abroad
TEENAGER WITH DYSLEXIA WINS AWARD FOR HIS WEB SITE -  India Abroad
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Can cloud computing survive the NSA disclosures

  • 1. 92 GlobeAsia January 2014 Technology Can cloud computing survive the NSA disclosures? not just named some of the most valuable companies in the world. The cloud computing market (which estimates have valued at over $200 billion) is seriously in jeopardy. A recent survey by the industry group Cloud Security Alliance had over half its non- US members report that they are less likely to use US-based cloud services in the future. Even more troubling, a good 10% of these members have gone on to cancel their agreements with US-based cloud services. The lack of trust is not only evident among individuals. Governments around the world have been tripping over themselves trying to limit their exposure to the long arm of the NSA. This is particularly evident in the so-called BRIC countries, nations considered to have successfully navigated the seas towards advanced economic development. Brazil’s President Dilma Rousseff – herself a target of NSA spying – has been particularly vocal about the need for increased internet governance to combat illegal snooping. Rousseff went so far as to lodge a formal protest and cancel a planned state visit to the US in protest at the revelations. Russia, for its part, has also (somewhat hypocritically) derided US encroachment of civil liberties and offered Snowden temporary asylum. The country has also taken further steps to ensure that its official data is safe – and it is not alone. In the subcontinent for example, recent reports out of India indicate that the country could ban services like Yahoo and Gmail for official communication even before the new year rolls around. India’s Deputy National Security Advisor has asked the Department of Telecom to look into requiring telecommunications and internet companies to route their traffic through the NIXI (National Internet Exchange ver the past several months, the disclosures by former National Security Agency (NSA) contractor Edward Snowden have hit internet companies hard. Lately, there has been a steady migration to the cloud services. People were increasingly comfortable with storing important documents online. The NSA disclosures have stopped this trend in its tracks, and could possibly lead to its reversal. According to a report in the Financial Times, the NSA disclosures could cost tech firms such as Google and Apple $35 billion over the next three years. The negative effects on the industry itself are likely to be especially acute, given the increased reliance the modern economy places on knowledge-based industries. Studies quoted by a recent Financial Post article indicate that “products and services that rely on cross-border data flows are expected to add an estimated $1 trillion in value to the US economy annually over the next 10 years.” Of course this increased value will never materialize if consumers are unable to trust that data they store in the cloud is free from prying eyes. More worrying, perhaps, than strict dollars and cents, the revelations have cost these companies trust and that could have a permanent effect on the industry. US-based tech companies are struggling The success of companies like Google, Apple, Amazon and Facebook are wholly predicated on whether or not customers trust their data to these firms. Unfortunately, if anything, people have become even more concerned about their privacy. This would not be such a concern if I had
  • 2. January 2014 GlobeAsia 93 by Jason Fernandes   of India), in order to limit the ability of foreign (read: US) intelligence agencies to spy on domestic traffic. China, too, has not stood by quietly. State-owned media in China have condemned US spying and have strongly suggested, if not quite mandated, that local companies stick to buying technology from domestic sources. Another potentially crushing blow to US companies. The reaction of BRIC nations to spying is particularly important and could be regarded as both the proverbial canary in the mine and the raven that croaks “never more” in Poe’s masterpiece. That these developing nations are introducing institutional controls should be very worrying to US-based tech firms. Other developed and so-called first world nations like Germany have also joined the increasingly-vocal clamor for control over citizens’ data. All this government interest will likely lead to increased legislation that will make it costly for US companies to compete overseas. China’s reaction has been particularly instructive, if only for the massive negative impact it has had on US companies. Both Qualcomm and Cisco have found the environment in China increasingly hostile to their interests post-NSA disclosures. Qualcomm recently announced that while they continue to expect growth in China, growth has slowed, owing to fallout from the Snowden revelations. Cisco, on the other hand, is in even hotter water and was forced to cut revenue predictions down 10% for the quarter, again in part owing to the backlash over the US spying scandal. The road ahead With the shuttering of Snowden’s email service Lavabit and others, people are turning to overseas services like Mega. co.nz (run by the flamboyant Kim Dotcom) in order to better protect their data. Unfortunately, the overall effect has been a gradual and perhaps permanent erosion of trust in the concept of cloud computing and privacy. The news is not all bad, however. Ultimately the fates of these major tech companies will be determined in large part by how they address these allegations. It’s not too late to restore consumer confidence if they move swiftly. Encouragingly, companies like Google, Yahoo and Microsoft have shifted focus to the encryption of data that is in transit, an area where they were particularly susceptible to government snooping. Further, many of these companies, particularly Microsoft, have taken to voluntarily disclosing information on the number and nature of requests for information they receive from the government. This is in sharp contrast to AT&T, which has reacted instead by clamping down on information even further and has fought vociferously to keep its interaction with the NSA secret. This is a study in how not to handle a crisis. Possibly the only way the industry is going to survive is if it goes on the offensive and advocates for customer privacy instead. Case in point, this month Microsoft publicly declared the US government an “advanced persistent threat.” A designation more commonly used for state-sponsored terrorists, these are strong words indeed, coming from one of the tech industry’s behemoths. Microsoft has clarified that it intends to notify government and business customers when it receives legal orders relating to their data, and vigorously challenge such orders when it is prevented by law from disclosing the data’s existence. The only thing that can banish secrets is the cold, hard light of truth and if the US tech sector is to survive, it must show an increased dedication to data privacy and transparency. Recent revelations indicate that it is inevitable that, at some point, the people of the world will be living in a modern version of 18th century philosopher Jeremy Bentham’s Panopticon. The idea behind Bentham’s theoretical construct was that humans would self-regulate if they assumed they were always and continuously being watched. Revolutionaries overthrowing Nicolae Ceausescu learnt that Romania’s dreaded state surveillance system functioned on just such a Wizard of Oz-like myth of control. Lately we have learned that reality in modern America is quite the opposite and its surveillance capabilities are far in excess of what was previously thought. The government has massive and far-reaching surveillance powers and ultimately it is up netizens themselves to stand up and reject this control by voting with their eyeballs. Only once US surveillance starts affecting its balance sheet are things likely to change. Jason Fernandes is a tech commentator and the founder of SmartKlock. Unfortunately, the overall effect has been a gradual and perhaps permanent erosion of trust in the concept of cloud computing and privacy.