NSA’s Utah Data Center

Posted by Sam Churchill on

The Utah Data Center is being built for the National Security Agency, reports James Bamford in Wired.

A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”

It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

According to Bill Binney, a former NSA analyst, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah that now stores copies of all e-mails transmitted in America. Whereas wiretap surveillance requires trained human operators, data mining is automated, meaning that the entire country can be watched.

In the late nineties, Binney estimated that there were some two and a half billion phones in the world and one and a half billion I.P. addresses. Approximately twenty terabytes of unique information passed around the world every minute. Binney started assembling a system that could trap and map all of it, says author Jane Mayer in The New Yorker.

Related articles include Drones Coming to US Airspace, Surveillance State, Top Secret America: The Book, How Your Location & Preferences are Recorded , Behavioral Targeting: Kill/Capture and Google Vs The Feds , Spy Video from Space, US Government: More Surveillance Power , Japan Tsunami, High School Builds Police Robot, The Secret Patriot Act , myBart Hacked in SF Protest, Communications in Libya, Earthquake Shakes Public Safety Radio, P-25 Radios Killed by $30 Toy

Posted by Sam Churchill on Friday, March 16th, 2012 at 9:00 am .

Leave a Reply