Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA Utah ‘Data Center’: Biggest-ever domestic spying lab?
RT News ^ | March 17, 2012 | Staff

Posted on 06/11/2013 4:43:27 AM PDT by IbJensen

Overview of Camp Williams site before the construction works began. UDC will be located on the west side of the highway, on what was previously an airfield (Image from www.publicintelligence.net)

The biggest-ever data complex, to be completed in Utah in 2013, may take American citizens into a completely new reality where their emails, phone calls, online shopping lists and virtually entire lives will be stored and reviewed.

­US government agencies are growing less patient with their own country with every month. First, paying with cash, shielding your laptop screen and a whole list of other commonplace habits was proclaimed to be suspicious – and if you see something you are prompted to say something. Then, reports emerged that drones are being fetched for police forces. Now, the state of Utah seems to be making way in a bid to host the largest-ever cyber shield in the history of American intelligence. Or is it a cyber-pool?

Utah sprang to media attention when the Camp Williams military base near the town of Bluffdale sprouted a vast, 240-acre construction site. American outlets say that what's hiding under the modest plate of a Utah Data Complex is a prospective intelligence facility ordered by the National Security Agency.

­Cyber-security vs. Total awareness

The NSA maintains that the data center, to be completed by September 2013, is a component of the Comprehensive National Cyber-security Initiative. The facility is to provide technical assistance to the Department of Homeland Security, collect intelligence on cyber threats and carry out cyber-security objectives, reported Reuters.

But both ordinary Americans and their intelligence community were quick to dub it “a spy center.”

­The Utah Data Center will be built on a 240-acre site near Camp Williams, Utah. Once completed in September 2013, it will be twice as large as the US Capitol. The center will provide 100,000 square feet of computer space, out of a total one million square feet. The project, launched in 2010, is to cost the National Security Agency up to $2 billion.

The highly-classified project will be responsible for intercepting, storing and analyzing intelligence data as it zips through both domestic and international networks. The data may come in all forms: private e-mails, cell phone calls, Google searches – even parking lot tickets or shop purchases.

“This is more than just a data center,” an official source close to the project told the online magazine Wired.com. The source says the center will actually focus on deciphering the accumulated data, essentially code-breaking.

This means not only exposing Facebook activities or Wikipedia requests, but compromising “the invisible” Internet, or the “deepnet.” Legal and business deals, financial transactions, password-protected files and inter-governmental communications will all become vulnerable.

Once communication data is stored, a process known as data-mining will begin. Everything a person does – from traveling to buying groceries – is to be displayed on a graph, allowing the NSA to paint a detailed picture of any given individual’s life.

With this in mind, the agency now indeed looks to be “the most covert and potentially most intrusive intelligence agency ever,” as Wired.com puts it.

William Binney, NSA’s former senior mathematician-gone-whistleblower, holds his thumb and forefinger close together and tells the on-line magazine:

“We are that far from a turnkey totalitarian state.”

­‘Everybody is a target’

Before the data can be stored it has to be collected. This task is already a matter of the past, as the NSA created a net of secret monitoring rooms in major US telecom facilities – a practice that was exposed by people like William Binney in 2006.

The program allowed the monitoring of millions of American phone calls and emails every day. In 2008, the Congress granted almost impecible legal immunity to telecom companies cooperating with the government on national security issues.

By this time, the NSA network has long outgrown a single room in the AT&T building in San Francisco, says Binney:

“I think there are ten to twenty of them. This is not just San Francisco; they have them in the middle of the country and also on the East Coast.”

Binney suspects the new center in Utah will simply collect all the data there is to be collected. Virtually, no one can escape the new surveillance, created in the US for the War on Terror.

Some data, of course, would be crucial in the anti-terrorism battle: exposing potential adversaries. The question is how the NSA defines who is and who is not a potential adversary.

“Everybody is a target; everybody with communication is a target,” remarks another source close to the Utah project.

­Breaking the unbreakable

Now, the last hurdle in the NSA’s path seems to be the Advanced Encryption Standard cipher algorithm, which guards financial transactions, corporate mail, business deals, and diplomatic exchanges globally. It is so effective that the National Security Agency even recommended it for the US government.

Here, the Utah data complex may come in handy for two reasons. First: what cannot be broken today can be stored for tomorrow. Second: a system to break the AES should consist of a super-fast computer coupled with a vast storage capabilities to save as many instances for analysis as possible.

The data storage in Utah, with its 1 million square feet of enclosed space, is virtually bottomless, given that a terabyte can now be stored on a tiny flash drive. Wired.com argues that the US plan to break the AES is the sole reason behind the construction of the Utah Data Center.

The eavesdropping issue has been rocking the US since the Watergate scandal in the 1970s, when domestic spying was eventually outlawed. Nowadays, a lot of questions are still being asked about the secret activities of the US government and whether it could be using the Patriot Act and other national security legislation to justify potentially illegal actions. The NSA’s former employees, who decided to go public, wonder whether the agency – which is to spend up to $2 billion on the heavily fortified facility in Utah – will be able to restrict itself to eavesdropping only on international communications.


TOPICS: Constitution/Conservatism; Crime/Corruption; Government
KEYWORDS: evilobamaregime; spyingonamericans
Navigation: use the links below to view more comments.
first 1-2021-23 next last
Here's the progress photo as of this month. This threat to our freedom will be completed by October of this year.

The US goverment is clealry in panic mode knowing that even the most gullible people are waking up and will eventually revolt. They can spy all they want but if even 5% of Americans revolt with guns a new American Revolution begins.

This central socialist government is using our own extorted money in order to imprison us. Soon this complex and the power that comes with it will make the IRS abuses look like child's play.

1 posted on 06/11/2013 4:43:27 AM PDT by IbJensen
[ Post Reply | Private Reply | View Replies]

To: IbJensen

That constitution shredder is a massive waste of money.


2 posted on 06/11/2013 4:44:12 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: IbJensen
are waking up and will eventually revolt.

Couldn't disagree with you more.

Got cable? Check!

Obamaphone? Check!

Disability/welfare/fool stamps? Check!

Compelling garbage on a 55" LCD TV? Check!

Gas in the whip? Check!

Nah! Ain't nobody got time for a revolt! I've got my wagyu beef, my champagne, lobster tail, and Duck Dynasty is on in a half hour.

3 posted on 06/11/2013 4:50:44 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: IbJensen
A very simple example of what this facility will be used for...

Using Metadata To Find Paul Revere

Swirling around us
Data blows - Snow in the Wind.
We can track each flake.

4 posted on 06/11/2013 5:03:23 AM PDT by Haiku Guy (Gun Control Haiku: Say "Registration" / And they call you paranoid / So say "Privacy")
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

How much you wanna bet that within a few years, all businesses that accept cash payments will be required to scan all incoming currency for inclusion in this database...

If it saves just one child, it will be worth it!


5 posted on 06/11/2013 5:07:18 AM PDT by Haiku Guy (Gun Control Haiku: Say "Registration" / And they call you paranoid / So say "Privacy")
[ Post Reply | Private Reply | To 3 | View Replies]

To: IbJensen

The Center is a TOOL.

In the hands of a patriot President, it could
minimize domestic terrorism and its infiltration.

In the hands of Tyrant pRes_ _ent
Obama-the-Undocumented-by-Electon-Fraud,
it will be used to indict honest Americans.

Here is how it works:

Boston Terrorists? - data flushed.

DNC RICO? - data flushed.

Judge Roberts children? Passed to White House and DO”J”.

Patriotic Tea Party? Passed to IRS and White House.


6 posted on 06/11/2013 5:10:05 AM PDT by Diogenesis
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diogenesis
Judge Roberts children? Passed to White House and DO”J”.

Gestapo rendered coward. Primo example of political extortion.

7 posted on 06/11/2013 5:22:49 AM PDT by Tugo (Never Submit!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Tugo

Roberts should have resigned and taken his chances. He is no patriot, he is a traitor to his country!


8 posted on 06/11/2013 5:36:55 AM PDT by seeker41 (Take back your country before it is too late-STOP islamic expansion in the USA remove zero)
[ Post Reply | Private Reply | To 7 | View Replies]

To: rarestia

This would be an interesting reason to ensure everyone, even the poor, HAVE a phone - to keep tabs on them.


9 posted on 06/11/2013 5:39:59 AM PDT by tbw2
[ Post Reply | Private Reply | To 3 | View Replies]

To: IbJensen
How is the NSA and the Able Danger program related?

Able Danger

10 posted on 06/11/2013 5:41:13 AM PDT by FreeAtlanta (sue the DNC for the IRS abuse! Can RICO laws be used against the DNC?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: IbJensen

Perhaps they should reconsider the name. Camp Himmler would seem more appropriate.


11 posted on 06/11/2013 5:46:03 AM PDT by cld51860 (Oderint dum metuant)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FreeAtlanta
Some people have alleged regarding the events of 9/11 that Pentagon obstructed the Senate Judiciary Committee's investigation and that there was a cover-up.
12 posted on 06/11/2013 5:46:29 AM PDT by IbJensen (Liberals are like Slinkies, good for nothing, but you smile as you push them down the stairs.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: cld51860

For posterity, Camp Obama will be used. In fact any new government schools, buildings, bridges, etc. will be named for our illustrious leader.

When you’re rotting away in a concentration camp you can thank an Obama voter.

Obama voters leave their campaign stickers on their bumpers. They can then park in the handicapped spots.

This nearly-completed domestic spying complex in Utah needs to be razed, NOW!


13 posted on 06/11/2013 5:49:41 AM PDT by IbJensen (Liberals are like Slinkies, good for nothing, but you smile as you push them down the stairs.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: IbJensen
According to Fox News this morning the facility will have approx. 5 zetabytes of storage.

The entire internet content exists on approximatly one-half zetabyte.

14 posted on 06/11/2013 6:09:27 AM PDT by Bob Buchholz
[ Post Reply | Private Reply | To 1 | View Replies]

To: cripplecreek
That constitution shredder is a massive waste of money.

Amen, Brother!

They totally missed the Tsarnev Brothers. But they can tell you what 100 reporters at the AP ordered for lunch every day.


15 posted on 06/11/2013 6:11:00 AM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 2 | View Replies]

To: IbJensen

16 posted on 06/11/2013 6:16:01 AM PDT by JoeProBono (Mille vocibus imago valet;-{)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bob Buchholz
Finally, a thread where folks are grokking the significance of the "Batcave". Here's some light reading from the good folks at Cisco - The Zettabyte Era - Trends and Analysis"
17 posted on 06/11/2013 6:28:41 AM PDT by Ol' Sox (Research, Resolve, Remediate, Repeat)
[ Post Reply | Private Reply | To 14 | View Replies]

To: IbJensen
I wonder if the "gang of 8" will include a provision in their bill allowing all future illegal immigrants to be identified, hunted down and captured using the NSA surveillance. I wonder if it will be used to find drug users posting pot photos on twitter. How about underage drinkers? I am sure they will be able to tell if women are having abortions after the legal time limit. Are they going to use it to stop welfare, food stamp and SSI disability abuse? How about voter fraud?

I am certain that even the suggestion of using the NSA for such practices would be met with howls of anger.

This shows it is not meant to catch law breakers. It is meant to be a political tool to control those who want to follow the law.

It is not meant to be proactive but reactive.

They will first identify a target and then this system will be the tool they use to eliminate it. The administration and the bureaucracy will pick the targets as they do now. This will simply give them the power to efficiently eliminate any target they wish as quickly as possible. Those who were not the target before, (criminals, thugs, sociopaths, lowlifes) will still not be the target. Those who were the target, (conservatives, anti-establishment, political enemies, non "team-players") will continue to be the target.

18 posted on 06/11/2013 7:24:18 AM PDT by nitzy (You can avoid reality but you can't avoid the consequences of avoiding reality.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nitzy

How can these neo-conservative types we’ve voted for to protect our Constitution stand idly by while an installation of this magnitude and import is being constructed? Why would the news media keep a lid on this to the point where we have to dig to find obscure articles about this evil on the part of our central socialist government?

It takes the UK Guardian to alert us to the intrusive surveillance project going on in Utah.

Wonder how chances will be for a facilities tour after it’s online this fall?


19 posted on 06/11/2013 7:55:50 AM PDT by IbJensen (Liberals are like Slinkies, good for nothing, but you smile as you push them down the stairs.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: IbJensen
Two scenarios for this data center come to mind - one is malevolent and is being discussed at length. The other is benevolent and hasn't been discussed at all.

Backup... Of Everything.

20 posted on 06/11/2013 8:28:38 AM PDT by Ol' Sox (Research, Resolve, Remediate, Repeat)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson