Shield in the Cloud

Shield in the Cloud

Shield in the Cloud Working together to eradicate corruption by harnessing technology innovation 2 3 INTRODUCTION INTRODUCTION Message from C5 Andre Pienaar In the arid beauty of the Karoo desert in As the headlines and history books show us, a South Africa, where I grew up, when you strong and lasting peace in post conflict countries see a cloud, it is good news. The promise of is not possible without good governance. The rain and its transformative power is on the Middle East and Africa, corruption and innovation horizon. We knew that soon a beautifully are opposing forces. Where one is present, the bountiful harvest of flowers and life would other is invariably absent. Innovation thrives on burst forth from the barren landscape before good governance. Corruption corrodes and kills our eyes. Today, cloud computing offers us this innovation and opportunity thereby wasting the same incredible transformative power with talent of generations. Through this challenge, we unprecedented opportunities for innovation aim to strengthen the virtuous cycle between and entrepreneurship. good governance, innovation and opportunity, which the entrepreneurs with whom we partner Cloud is taking the computing power we have as investors need to thrive. come to know first on our personal computers From back row left to right: Jamie Lowther-Pinkerton LVO, MBE, DL, Ambassador George Moose, Raymond Donovan, Derek Maltz, and on-premises servers and industrializing As Admiral Mike Mullen, U.S. Navy admiral who Andy Powell, Andre Pienaar, GEN Keith Alexander (Ret.), Sir Iain Lobban, Alex Newman, Sheldon Himelfarb, Nancy Lindborg, Kurt Scherer, Eva Dimitriadis, Cheryl Carolus, Georgina Callander, Moira Andrews, Tami Longaberger, Sir Graeme Lamb its capacity with computing infrastructure on served as the chairman of the Joint Chiefs of a global scale, for everyone’s benefit. Amazon Staff (2007–11), said, “corruption is corrosive pioneered this by investing billions of dollars to to national and international security.” Thus, We are stronger as a collective than alone. this Shield in the Cloud white paper highlights build multiple industrial sized computing centres it is in our collective interest to stand against General Keith Alexander says, “In a networked the discussions we held and the experts around the world, and networking them cost- it. Corruption gives rise to vast criminal world, collective security is the best security we engaged with through the course of the effectively with high-speed fibre optic cables. enterprises, such as the toxic stream of illegal model.” However, fighting organised corruption is programme, enabling us to confront a universal This means that we need less capital and less narcotics whose damaging influence floods one of the loneliest tasks. Invariably, perpetrators issue through a global coalition of thinkers and infrastructure to grow organizations. We can global trade routes and ultimately poisons seek to isolate, target, and diminish those innovators, aiming to make the world a more displace capital with technology to build, scale our nations. Running through the same veins working towards the greater good. The same transparent and responsible place. Together, and innovate globally on an unprecedented of the illicit global trading routes that carry perpetrators often have reach, hiring lawyers, we can amplify counter-corruption efforts by scale. The power of cloud computing to scale heroin, cocaine and opioids, there are myriad investigators and public relations advisers of rapidly scaling and accelerating the innovative innovation, to reduce the cost of computing, and menaces and threats, ranging from human their own. The bigger the syndicate, the further ideas and platforms. More importantly, we to increase its accessibility to everyone is one trafficking to terrorist finance. Moreover, these their influence extends. This competition enabled can contribute to the future of the fight against of the drivers of growth in the global economy. same routes increasingly form the lines of us to find and support the leaders who are corruption by bringing the issue to the forefront, attack that adversaries are pursuing against our Peacetech is the purposeful application of the innovators in the fight against corruption and providing a collective initiative for our common nations, while camouflaging their hostile intent innovation that cloud computing enables for its causes. We then connected organizations defence, and by lighting the fire of the next in a twilight of war and peace. The corruption good. Through cloud-enabled innovation, we fighting corruption to build collective security generation of ideas and inventions to carry that enables these illegal networks and routes can rapidly scale technology to immediately while simultaneously accelerating the pace forth the fight against corruption now and well to thrive are a clear and present danger. With have strategic impact. Used for good, this can of anti-corruption innovation by sharing best into the future. each day, the problem becomes increasingly sustain national and international security gains practices across this network. complex and thus we need new tools and while building a strong peace and securing our models to combat it. Ultimately, as Former Vice Like the clouds over the Karoo, our “Shield in the children’s future. We launched the first global President Joe Biden rightly points out, “fighting Cloud” offers the hope of a better future. Acting anti-corruption challenge in order to support corruption is not just about good governance. It as one-part forum and one-part advocacy, the growth and impact of tech innovation in is patriotism, it is self-defence.” fighting the corrosive and destabilising force of corruption. The PeaceTech Accelerator Washington D.C. Contents is the first major international peacetech program powered by cloud innovation Keynote remarks from 6-7 and dedicated to scaling startups GEN Keith Alexander (Ret.), IronNet: Securing our common defense 6-7 from around the world. Briefing Paper: 8-11 Peacetech is recognized as the application of technology Combatting Corruption: Our Collective Responsibility 8-11 to assist communities in conflict and crisis zones. Innovator Interviews: 12-17 Sheldon Himelfarb, PeaceTech Lab 12-13 Startups are selected based on their ability to produce innovative technologies that manage, mitigate, predict, Steve Fehr, SAP NS2 14-15 or prevent conflict and promote sustainable peace. Mr. Mohamed Ali AlQaed, 16-17 Information & eGovernment Authority of Bahrain Anti-Corruption Innovation roundtable discussion, 18-27 Washington D.C. Partner Perspectives: 28-33 “The introductions and connections we’ve established through the PeaceTech AWS support of ICMEC 28-29 Accelerator have been invaluable.” Jay Collins, Citi 31-33 John Jaeger, Founder and CEO, Hala Systems Cloud Champions: 34-43 Mark Labs: 34-35 “The PeaceTech Accelerator propelled our Technology Innovation providing the tools to fight corruption business towards an inflection point. What PurpleTRAC: New Sanctions Impact Shipping & 36-39 we accomplished in just under 8 weeks Trade Transactions Worldwide would have taken a year and a half.” ProZorro.Sale: Reforming state assets in Ukraine 40-41 Kevin Barrow, Founder and CEO, MARK Labs Ushahidi: Accountability and transparency in the World today 42-43 Anti-Corruption Innovation roundtable discussion, 44-54 London Image courtesy of USIP of courtesy Image 6 7 KEYNOTE REMARKS KEYNOTE REMARKS Securing our common defense Gen. Keith Alexander (Ret.), IronNet Defending our Nations in cyberspace requires analog community to digital-analog to completely access and distribution of real-time cyber digital. This transformation happened not only in information among companies in the private networks but across the cyber spectrum and this sector, and between the public and private relentless progress is not subsiding. The amount of sector. Delays in sharing that information unique information created this past year is more than the last 5000 years combined. The amount creates gaps adversaries can and will exploit. of new technology tools launched each year is From our perspective, the cloud offers a unique growing exponentially. The top 10 in-demand jobs The private sector needs to find a way to build a aimed at bringing technology to bear in some of opportunity to rapidly share, correlate and in 2017 did not exist 10 years ago. The winds of collaborative and enduring framework to bolster society’s most intractable challenges like corruption. enrich data amongst all of the key participants. change are now full gales. the nation’s “common defence.” The myriad tools of technology now offer solutions At the height of the Iraq War, we struggled to Embracing transformation and adapting in order never dreamed of before. Organizations are provide signal intelligence in real-time that could In the military, elements do not fight alone but as to remain along the leading edge is critical not adding visibility to government property sales in effectively help save American lives on the ground. a collective group. Platoons support Companies, only on the battlefield but also in business and Ukraine, illuminating the flow of money between The signal intelligence we were providing was Companies support Battalions, Battalions support government. The digital arena is re-defining how financial supporters of extremist groups, and “historic,” but intelligence is only as good as it is Brigades; combat happens in coordination. Unity we do business,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    29 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us