Principale Attualità Comunicati stampa CYBERPOL President Baretzky Dismisses Five Eyes’ Secret Cloud Development as Futile: Intelligence...

CYBERPOL President Baretzky Dismisses Five Eyes’ Secret Cloud Development as Futile: Intelligence Already Beyond Reach of Traditional Systems

In an assertive rebuff, CYBERPOL President Ricardo Baretzky has openly criticized the recent decision by the Five Eyes alliance—comprised of the United States, Canada, the United Kingdom, New Zealand, and Australia—to develop a cloud-based intelligence-sharing infrastructure. Designed to bolster secure data exchange among its intelligence agencies, this platform aims to centralize and protect intelligence data within a cloud-based system. However, according to Baretzky, these efforts are outdated and ultimately ineffective against the sophisticated technologies already in place.

“Intelligence has long since surpassed the capabilities of cloud computing,” Baretzky remarked. “Any attempt by the Five Eyes alliance to secure intelligence through a central cloud system is naïve. The reality is that the information flow has evolved well beyond traditional channels and is embedded in an advanced grid computing network, which operates globally and can’t be controlled by any one nation or group of nations.”

DEPSINT and the Rise of Deep Source Intelligence Grid Computing

President Baretzky highlighted a key concept known as DEPSINT (Deep Source Intelligence), a powerful system that integrates grid computing and AI to process and distribute information globally. Unlike conventional cloud computing, DEPSINT operates on a highly decentralized framework that allows data to traverse through the Deep Web. This infrastructure, Baretzky argues, cannot be intercepted, controlled, or shut down by the Five Eyes alliance—or by any single entity.

“DEPSINT essentially draws from grid computing technologies,” he explained. “These have been operational since the 1980s and were initially developed as part of major projects in Switzerland, including CERN’s research. Today, the technology is globally integrated. Intelligence data flows through a worldwide grid that transcends conventional internet protocols, existing almost as a parallel web. And because it doesn’t rely on centralized control, any intelligence efforts focused on secrecy within the Five Eyes cloud infrastructure are already outdated.”

Cloud Security Under Threat from Advanced AI Interception

Baretzky also cautioned that, rather than adding an extra layer of security, a centralized cloud could inadvertently expose intelligence to AI-driven interception mechanisms. According to him, the use of traditional cloud computing makes data more accessible to “intelligent” interception systems that can bypass security protocols due to their own integration within the grid network.

“AI interception has grown increasingly accurate and capable,” Baretzky warned. “If Five Eyes or any intelligence network thinks they can use a cloud to secure information, they’re overlooking how deep-learning AI has become intertwined with grid systems. Once data is stored or shared in a cloud, it passes through this grid at some level, where intelligent systems can intercept it. This makes it far more vulnerable than people realize.”

In effect, the issue lies in the very nature of cloud systems. While they offer centralized control, they are still bound to the internet’s underlying infrastructure—a structure that Baretzky argues is already obsolete in terms of security and privacy. DEPSINT, on the other hand, operates beyond these boundaries, embedded within a distributed computing network that spans 191 nations, leaving cloud-based systems open to unanticipated risks.

A Global Grid Beyond Control: The Impact of Deep Web Intelligence

According to Baretzky, the creation of a Five Eyes cloud is fundamentally flawed in its assumption that intelligence data can be isolated within traditional networks. What the alliance fails to account for, he noted, is that the grid computing network comprising DEPSINT is a decentralized system that doesn’t recognize national boundaries. This network, functioning as part of the Deep Web, distributes and stores intelligence data in real time, meaning that any attempt to control data within Five Eyes is merely “wishful thinking.”

“Intelligence doesn’t exist in a vacuum anymore,” he elaborated. “It exists in real time, distributed across systems that no longer adhere to the rules of central control. The days when nations could lock down sensitive data within their own infrastructures are over. Deep Web grid technology makes it possible for intelligence to move freely across borders, undetected by cloud safeguards.”

Baretzky pointed to early grid computing projects, such as those conducted at CERN, which laid the groundwork for today’s interconnected intelligence systems. Over the years, grid computing has evolved from a purely scientific pursuit to a foundational component of global intelligence networks. And, as Baretzky asserts, while the Five Eyes cloud may aim to add security, it inadvertently increases risk by centralizing data that could otherwise remain more diffused across grid networks.

Historical Roots: From CERN to Today’s Interconnected Intelligence Web

To understand the futility of the Five Eyes cloud, it’s important to recognize the history of grid computing and its relevance to intelligence. CERN, the European Organization for Nuclear Research, played a key role in grid computing’s inception. In 1986, it began developing grid technologies to facilitate collaboration and data sharing among scientists worldwide. This system enabled researchers across various countries to access shared data and computational resources.

Fast forward to the present day, and this system has evolved into a complex, integrated web of interconnected nodes and networks. As Baretzky noted, this distributed infrastructure has long since transcended national control, leading to a global intelligence web that operates autonomously from any centralized oversight.

“Grid computing was initially scientific, yes,” Baretzky stated. “But as its capabilities grew, it became the basis for a new form of intelligence distribution that doesn’t answer to governments. Today’s intelligence data circulates on a network that spans nearly 200 countries, all connected through this grid. The idea that it can be contained or controlled by cloud systems is an outdated assumption.”

The Futility of Cloud-Based Intelligence Control

Given the nature of DEPSINT and grid computing, Baretzky believes that efforts to control intelligence data within a Five Eyes cloud infrastructure are fundamentally misguided. In his view, this cloud technology represents an old paradigm that fails to grasp the extent to which intelligence has already dispersed into autonomous networks that no single alliance can command.

“The fact is, cloud computing is a legacy technology compared to grid computing,” he explained. “While it may provide a sense of security, it’s also an Achilles heel. Centralizing intelligence in a cloud doesn’t make it safer—it makes it a larger target. When intelligence exists within a globally distributed grid, it’s far less vulnerable to interception because it’s harder to isolate and access.”

Moreover, Baretzky suggested that a cloud-based system for Five Eyes intelligence might inadvertently open up the alliance’s data to manipulation. AI algorithms within DEPSINT could potentially interact with the cloud infrastructure, presenting a risk of “smart” interference by external actors. If cloud-stored intelligence becomes accessible to these grid-linked algorithms, it could be reinterpreted, duplicated, or altered by third-party networks without the alliance’s awareness.

Implications for Global Intelligence Security

The implications of Baretzky’s statements are significant. If intelligence is indeed embedded in an autonomous, grid-based system beyond any single nation’s control, then the strategies of the past will not work in this new paradigm. Cloud computing, even for purposes of intelligence sharing, becomes obsolete. The question facing intelligence agencies, then, is how they can adapt to a world where information is decentralized, distributed, and fundamentally beyond their reach.

“The Five Eyes’ investment in a secure cloud for intelligence is symptomatic of an outdated perspective,” Baretzky said. “The landscape has shifted. Intelligence agencies need to recognize that they’re operating in a world where information is fluid and cannot be ‘owned’ in the traditional sense. The sooner they acknowledge this, the better equipped they’ll be to navigate the new terrain.”

Baretzky’s remarks signal a need for re-evaluation within intelligence communities. Rather than doubling down on secure clouds, he suggested, agencies might better serve their goals by investing in understanding and adapting to the grid technology that defines today’s information landscape. Only then, he argues, can they develop approaches to intelligence that are both relevant and resilient in an era where data moves through channels far removed from traditional networks.

The Future of Intelligence in a Decentralized World

As the Five Eyes alliance presses forward with its cloud initiative, Baretzky’s warning stands as a stark reminder of the evolving nature of intelligence. The decentralized, grid-based distribution of data that defines DEPSINT reflects a shift from centralized control to global interconnectivity. In this framework, intelligence can no longer be confined, safeguarded, or restricted by conventional means.

“Intelligence is now in the hands of the collective,” Baretzky concluded. “The future lies in grid systems that operate independently of any one government or organization. Efforts to impose control over these flows will fail, as they run counter to the very nature of how information now exists and moves.”

In an era where intelligence data is not bound by physical borders or centralized systems, the Five Eyes cloud project might very well represent the last gasp of a bygone approach to data security. As the world embraces decentralized intelligence, Baretzky’s insights offer a compelling roadmap for adapting to the challenges—and opportunities—of this new reality. The evolution of intelligence is not just a matter of technology but of mindset, and those who fail to recognize this shift may find themselves unable to keep up in a world that has outpaced them.

“To the contrary, by any such attempts to developing such ‘Secret Cloud’ we could be sending secret information into space for aliens to intercept,” hello we are here, look at us stupid humans. We have plenty natural resources, come and get it, what a stupid idea” Baretzky said.

Baretzky was one of the founders of DEPSINT Deep Source Intelligence Grid Technologies and the IPO holder that was first used to Track and Trace Terrorism funding and protect Western assets in 2013.

LASCIA UNA RISPOSTA

Inserisci il tuo commento, grazie!
Inserisci il tuo nome qui, grazie

CAPTCHA ImageChange Image

Questo sito usa Akismet per ridurre lo spam. Scopri come i tuoi dati vengono elaborati.