{"id":15779,"date":"2012-05-21T12:15:37","date_gmt":"2012-05-21T17:15:37","guid":{"rendered":"http:\/\/www.friedyoda.com\/noisecast\/?p=15779"},"modified":"2024-01-15T06:03:40","modified_gmt":"2024-01-15T12:03:40","slug":"whats-going-down-in-the-utah-desert-nsa","status":"publish","type":"post","link":"https:\/\/www.friedyoda.com\/noisecast\/2012\/05\/whats-going-down-in-the-utah-desert-nsa\/","title":{"rendered":"What\u2019s going down in the Utah desert, NSA?"},"content":{"rendered":"\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"463\" data-attachment-id=\"15781\" data-permalink=\"https:\/\/www.friedyoda.com\/noisecast\/2012\/05\/whats-going-down-in-the-utah-desert-nsa\/utahdatacenter\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?fit=660%2C463&amp;ssl=1\" data-orig-size=\"660,463\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"UTAHDATACENTER\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: Withheld. Manipulation: Jesse Lenz&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?fit=602%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?resize=660%2C463&#038;ssl=1\" alt=\"\" class=\"wp-image-15781\" srcset=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?w=660&amp;ssl=1 660w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?resize=300%2C210&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?resize=602%2C422&amp;ssl=1 602w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?resize=180%2C126&amp;ssl=1 180w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><figcaption class=\"wp-element-caption\">Source: Withheld. Manipulation: Jesse Lenz<\/figcaption><\/figure>\n\n\n\n<p>Deep in Utah, among the beautiful landscape and polygamous sects, there\u2019s a big stir going on, and it involves you. The NSA has broken ground on a datacenter of epic proportions (and I don\u2019t just use that term because it sounds cool), involving yottabytes of data, a $40 million a year electricity bill and \u2013 oh yeah \u2013 nearly all of the electronic communication in the United States and abroad. Sounds spiffy, doesn\u2019t it? Let&#8217;s meet the Utah Data Center.<\/p>\n\n\n\n<p>In early January 2011, NSA deputy director Chris Inglis and others broke ground on the facility and spoke of a \u201c\u2026state-of-the-art facility designed to support the intelligence community\u2026 and protect the nation\u2019s cybersecurity.\u201d What they don\u2019t mention is the fact that they will most likely be tracking all of the data that comes across their collection points as well. Where are those collection points?<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"753\" data-attachment-id=\"15786\" data-permalink=\"https:\/\/www.friedyoda.com\/noisecast\/2012\/05\/whats-going-down-in-the-utah-desert-nsa\/utahnsa\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?fit=974%2C753&amp;ssl=1\" data-orig-size=\"974,753\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"utahNSA\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?fit=602%2C465&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?resize=974%2C753&#038;ssl=1\" alt=\"\" class=\"wp-image-15786\" title=\"utahNSA\" srcset=\"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?w=974&amp;ssl=1 974w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?resize=300%2C231&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?resize=602%2C465&amp;ssl=1 602w, https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/utahNSA.png?resize=180%2C139&amp;ssl=1 180w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/a><\/figure>\n\n\n\n<p>As you can see, there are quite a few types of data being picked up from different locations. Satellites pick up almost everything on radio frequencies, from handheld two-way radios to cell phones (as well as communications from other nations), which is then passed on to Buckley AFB in Colorado where it is processed. NSA posts such as the ones in Georgia, Texas and Hawaii deal with intercepts from different areas, such as Europe, the Middle East, Latin America and Asia.<\/p>\n\n\n\n<p>Domestic listening posts, such as the ones installed in telecoms in the post-9\/11 hype, transmit data from major data hubs in the US. It is estimated that there are ten to twenty of these, and they weren\u2019t always legal, but since 9\/11, they\u2019ve been given the green light (and the telecoms have been given amnesty for breaking the law prior to that). These listening posts perform \u201cdeep packet&nbsp; inspection\u201d on all data zipping through the 10-gigabit-per-second cables, searching for specific words, phrases, addresses, phone numbers, etc. All of this is run by software created by Narus, a company that was purchased by Boeing, and is controlled from NSA headquarters. It automatically saves \u201csuspicious\u201d traffic and forwards a copy to the NSA. Overseas listening posts serve much the same purpose as domestic ones, but are much sneakier.<\/p>\n\n\n\n<p>Once the data is sent to the blandly-named \u201cUtah Data Center\u201d, it is processed, decoded (as needed), and sent to analysts. Documents can be cracked with the aid of the Multiprogram Research Facility in Oak Ridge, Tennessee, which employs 300 scientists, computer engineers and other digital wizards. Analysts in the NSA headquarters in Fort Meade can access the data to piece together intelligence reports, which are forwarded to the Whitehouse, CIA, or Pentagon.<\/p>\n\n\n\n<p>What does that mean to you?&nbsp; It means that the National Security Agency is building a giant data center in a geologically stable region, sucking 65 megawatts of power down to not only monitor global <em>and<\/em> domestic traffic, but to decrypt, analyze and <strong>store <\/strong>it. Of course, this data is supposed to be used to track high-interest groups, intercept transmissions between terrorist cells and generally defeat evil. If they weren\u2019t reading this over my digital shoulder, with willing permission from my ISP, I\u2019d be impressed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Source: <a href=\"http:\/\/www.wired.com\/threatlevel\/2012\/03\/ff_nsadatacenter\/all\/1\">Wired: Threatlevel<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uncover the secrets of the Utah Data Center \u2013 the NSA&#8217;s colossal facility in Utah, poised to handle yottabytes of data and revolutionize global surveillance. Delve into the intricacies of their data collection points, decoding processes, and the potential impact on your digital privacy. Read more on the Utah Data Center&#8217;s role in cybersecurity and global intelligence.<\/p>\n","protected":false},"author":6,"featured_media":15781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[738],"tags":[2891,2890,1853,210,646,1845,50,2894,2892,2893],"class_list":["post-15779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybercrime","tag-cybersecurity","tag-nsa","tag-security","tag-spotlight","tag-spying","tag-telecom","tag-udc","tag-utah","tag-utah-data-center"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.friedyoda.com\/noisecast\/wp-content\/uploads\/2012\/05\/UTAHDATACENTER.jpg?fit=660%2C463&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pelghY-46v","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/posts\/15779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/comments?post=15779"}],"version-history":[{"count":10,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/posts\/15779\/revisions"}],"predecessor-version":[{"id":23404,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/posts\/15779\/revisions\/23404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/media\/15781"}],"wp:attachment":[{"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/media?parent=15779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/categories?post=15779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.friedyoda.com\/noisecast\/wp-json\/wp\/v2\/tags?post=15779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}