Palantir Moving Operations Away From US:
Nicole Perlroth – Cyber-Security Expert On The Future Of Cybercrime:
Palantir’s Unique Philosophy:
Palantir Cyber Tool:
Palantir Moving Operations Away From US:
According to the Telegraph, Palantir has been forced to move their cyber operations away from the US, to the UK, after dangers associated with Russian Cyber-attacks have been spotted.
Palantir’s UK head, Louis Mosley said according to the Telegraph, that “protecting the UK’s most vital public and private organisations has never been more important.”
Palantir is taking its security operations away from the United States to the United Kingdom, amid concerns about the Kremlin launching an attack on cables laid under the Atlantic Ocean, according to the Telegraph.
According to a recent release by the UK Government, it has been confirmed that Russia is behind the cyber-attack in which struck European nations, just hours before the Ukraine invasion. To validify this point further, new UK & US intelligence suggests that Russia was behind an operation targeting commercial communications company Viasat in Ukraine.

Nicole Perlroth – Cyber-Security Expert On The Future Of Cybercrime:
Nicole Perlroth, a cyber-security lead stated recently within an exclusive interview with Lex Friedman that we are entering into a dangerous period in regards to cyber-crime & digital attacks by Nation States.
The under reported story of Colonial Pipeline could have been disastrous for the US & global economy said Nicole. She stated how, after the company was hit and was forced to freeze operations, there were leaked documents stating that as a country, the US could have only afforded 2-3 days of the pipeline being down. Any more downtime, said Nicole, would have majorly disrupted global prices for oil and gasoline.
Unfortunately, there has been ample examples of Russian attacks on the West. For example the, NotPetya attack by Russia on Ukraine hit any business that even had any relations with Ukraine. NotPetya infected the computer systems of Mondelez, disrupting the company’s email systems, file access, and logistics for weeks. This attack, said Nicole, paralysed Merck and their factories. Merk is an American multi-national pharmaceutical company located within New Jersey. Nicole mentions how, Merck had to tap into emergency supplies of vaccines from the CDC, because their vaccine line was ruined by cyber-attacks.
Nicole stated that any geopolitical conflict from now on, is guaranteed to have some cyber element to it. Nicole went on to proclaim that, the DOJ within the US recently released a report showing that China had been hacking into US pipelines – not for intellectual property threats – but to get a foothold if things escalate in Taiwan. Any time Nicole reads a report regarding physical aggression in war, she is always looking at this through a cyber lenses.
There is no way that these nation states will NOT use cybercrime to get a foothold, she proclaimed.
Nicole believes that, US adversaries have learned that they will never be as dominant physically with warfare. However, in the cyber space, this is where the West has a weak point in relation to cyber.
80% of software is owned and operated by private sector, she said. For the most part, there is no requirement for companies to tell government that they have been hit by a cyber-attack, nothing mandating a bare minimum standard of cyber security. This indicates the utter weakness of the West.
Even when there are attacks, most of the time we do not know about it, Nicole said.
In the last year, there were a record number of zero-day attacks.
“Zero-day” is a broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems. The term “zero-day” refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it.
In consideration of the geopolitical hot points present within society, nations have been investing in cyber tools more aggressively.
The major concern for Cyber Crime is that, there is a low barrier to entry for cyber war. “All you need is a laptop and the skills”, said Nicole.
A simplification of the main points Nicole mentioned within a recent exclusive podcast:
- We have stumbled into new era of digital damage.
- Often with cyber what we are seeing is just shy of war attacks: the question is – what happens when these attacks become more predominant and longer.
- Colonial Pipeline: took down biggest facility. This was because the company forgot to deactivate an old employees account, and there was no two factor authentication. This shows the inherent weakness of systems in the West.

Palantir’s Unique Philosophy:
Palantir has a unique, and very unconventional approach to business. The company has specifically stated that they will not be involved within any business against the West. In fact, early investor and co-founder Peter Thiel, publicly called out Google for their secretive plans to build AI functionalities and tools with China.
Palantir is focused on protection of the West, and works with an array of Western nations for commercial & Governmental software solutions aimed at empowerment of data within an ethical manner.
Palantir does not work with Russia, China or any Western adversary.
Back in January last year, the Center for Data, published a report on the progress made by leading artificial intelligence or AI superpowers namely China, the US and the EU. The report concluded that the US still holds a substantial lead globally, with China rapidly closing the gap, while the EU, for its part, “continues to fall behind.” However, this report is in opposition the recent Pentagon’s former software chief & his comments in regards to the US & their security capabilities. The former Pentagon software chief said that the United States “have no competing fighting chance against China in 15 to 20 years.” To put it simply, the US has already lost the AI fight to China.
Palantir Cyber Tool:
Whilst Palantir is not specifically a cyber-security company, the software solution does aid organisations in which are looking to protect themselves from digital attacks.
Within an exclusive report on Palantir Cyber, the documentation indicates how Palantir can enable:
Anomaly detection
Incident investigation
Knowledge management
& a range of other modules to enable safety within light of digital attacks.
“Analysts begin cyber threat investigations in Palantir by combing through massive amounts of data to find anomalous occurrences. Palantir Phoenix is a clusterable, distributed data store that enables the integration and sub-second querying of trillions of records at petabyte scale”

“Out of the box, Palantir can integrate the full spectrum of cyber data. Palantir’s pre-built integration pipelines allow our engineers to integrate key data sources just days after the start of a Palantir deployment. Integrated data is immediately available for automated correlation against threat detection algorithms as well as user-driven querying and analysis.”
“Palantir also ships with a suite of remote cloud-based applications to enhance your enterprise’s security posture, enable secure information sharing, and facilitate data reliability. Palantir provides access to collaborative and external cyber resources, including the Palantir Cyber Mesh, Palantir’s Cyber Intelligence Feed, and Palantir’s Cyber Operations Center.”
Palantir goes on to state how:
“We work with the most sophisticated cyber security organizations in the world, including top-tier financial institutions and international intelligence agencies. Our world-class engineers and cyber security experts enable government and commercial organizations around the globe to prevent and
defend against cyber attacks.”
“Recognizing that commercial institutions face a shared set of cyber threats, we created the Cyber Mesh, a platform for secure information sharing among peers. Drawing on successful models within the defense and intelligence communities, the Cyber Mesh enables secure peer-to-peer sharing between enterprises with automatic redaction of sensitive data.”
“A centrally hosted Palantir instance provides out-of-the-box cyber intelligence feeds, rolled up from suspicious activity patterns, third-party open source and licensed data feeds, and contextual data feeds.”
“By letting organizations leverage the subject matter expertise of Palantir engineers and insights from peer institutions, the Mesh provides immense analytic value over automated black box solutions.”
To read the full report on Palantir Cyber Tools: https://nsarchive.gwu.edu/sites/default/files/documents/3897084/Palantir-Palantir-Cyber-An-End-to-End-Cyber.pdf