Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
the_actors:corporations:darktrace [2020/09/26 20:00] – bab | the_actors:corporations:darktrace [2023/06/13 06:15] (current) – logo bab | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{ : | ||
====== Darktrace ====== | ====== Darktrace ====== | ||
- | {{ :the_actors: | + | A company [[the_actors: |
- | a firm heavily invested in a company | + | |
- | ---- | + | |
- | [[the_actors: | + | * Partners with [[the_actors: |
- | [[the_actors: | + | |
+ | < | ||
+ | |||
+ | Arbuthnot himself states, “We aim to change the world of personal information.” | ||
+ | |||
+ | Darktrace has particularly focused on breaking into the US market and has recruited former | ||
+ | |||
+ | In November 2013, Mike Lynch, the investor initially approached with the idea of Darktrace, extolled the virtues of the company on a conference platform in London with Alec Ross, the then secretary of state Hillary Clinton’s technology adviser, and Martin Howard, GCHQ’s director of cyber policy. Ross has been personally critical of Julian Assange. | ||
+ | |||
+ | The conference was organised by the Cheltenham cyber-security consultancy IRM, on whose advisory board Lady Arbuthnot’s husband, Lord Arbuthnot, sat until November 2018. | ||
+ | |||
+ | The company quickly tapped the US intelligence community for new personnel. In July 2014, Darktrace announced the recruitment of “two senior officials from the US intelligence community”, | ||
+ | |||
+ | One was Jim Penrose, who spent 17 years at the agency as an expert in data security, and served as chief of the Operational Discovery Center, helping to develop new signals intelligence capabilities – the mass surveillance programmes revealed by Edward Snowden. | ||
+ | |||
+ | The other recruit was Jasper Graham, another NSA veteran who – as technical director – worked with US Cyber Command to develop strategic planning for responding to cyber-attacks. | ||
+ | </ | ||
---- | ---- | ||
===sources=== | ===sources=== | ||
* [[https:// | * [[https:// | ||
* https:// | * https:// |