NSA Backgrounder


Carl Writes:
“There are ways for me to hijack your Facebook and Twitter and your email accounts and things like that … intercept all of your wireless traffic … I developed a tool called ‘Stalker‘ that can reconstruct all of the data that’s coming across the wire and put it in a database where I can view it. It’s a profile of all of your data — usernames, passwords, emails, text messages in some cases, where your phone has been in the past — all of the secrets that you don’t think you’re giving up. I mean it is also gets your pizza preference.”  Read more HERE
 One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. ― George Orwell1984

Obama said the programs represented “modest encroachments on privacy” that do not involve listening to people’s calls and do not involve reading the emails of U.S. citizens and U.S. residents. “Nobody is listening to your telephone calls,” he assured repeatedly.  Read more HERE

“I differed as a whistleblower to Snowden only in this respect: in accordance with the Intelligence Community Whistleblower Protection Act, I took my concerns up within the chain of command, to the very highest levels at the NSA, and then to Congress and the Department of Defense. I understand why Snowden has taken his course of action, because he’s been following this for years: he’s seen what’s happened to other whistleblowers like me.” – Thomas Drake – Former NSA Employee  

Gilia Adds – Here’s a recent interview of Drake:

More From Carl – Utah Data Center

1. Wired Magazine

2. Defense Systems Magazine

3. Obama’s Power Grab


The Utah Data Center will gather data from intercepted satellite communications and underwater ocean cables. Analysts will decipher, analyse and store the information in order to spot potential national security threats. The facility will be heavily fortified with backup generators and powerful equipment to keep the vast computer network cool.

The Utah Data Center, also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center,[1] is a data storage facility for the United States Intelligence Community that is designed to store data on the scale of exabytes.[2][3] Its purpose is to support theComprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified.[4] TheNational Security Agency (NSA), which will lead operations at the facility, is the executive agent for theDirector of National Intelligence.[5] It is located at Camp Williams, near Bluffdale, Utah, between Utah Lake andGreat Salt Lake.

In August 2012, The New York Times published short documentaries by independent filmmakers entitled The Program,[7] based on interviews with a whistleblower named William Binney, a designer of the NSA’s Stellar Wind project. The project had been designed for foreign signals intelligence (SIGINT) collection but, Binney alleged, after the September 11, 2001 terrorist attacks, controls that limited unintentional collection of data pertaining to U.S. citizens were removed, prompting concerns by him and others that the actions were illegal and unconstitutional. Binney alleged that the Bluffdale facility was designed to store a broad range of domestic communications for data mining without warrants.[8]

Documents leaked to the media in June 2013 described PRISM, a national security electronic surveillanceprogram operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information.[9][10] Reports linked the data center to the NSA’s controversial expansion of activities, which store extremely large amounts of data. Privacy and civil liberties advocates raised concerns about the unique capabilities that such a facility would give to intelligence agencies.[11][12]

The UDC is expected to store Internet data as well as phone records from the controversial NSA call database when it opens in 2013.[13]

Previous NSA Leakers, Thomas Drake And Mark Klein, Speak Out In Defense Of Ed Snowden


1.      “NSA Utah Data Center”Facilities Magazine. 14 September 2011. Retrieved 24 April 2013.

2.      Bamford, James (15 March 2012). “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)”Wired Magazine. Retrieved 5 April 2012.

3.      Kenyon, Henry (Jan 07, 2011). “New NSA data center breaks ground on construction — Defense Systems”. Defense Systems. Retrieved 11 August 2011.

4.      Fidel, Steve (6 Jane 2011). “Utah’s $1.5 billion cyber-security center under way”Deseret News. Retrieved 29 March 2013.

5.      “U.S. agency denies data center to monitor citizens’ emails”Reuters. 15 April 2013. Retrieved 16 April 2013.

6.      Eric Lichtblau and James Risen (April 15, 2009). “Officials Say U.S. Wiretaps Exceeded Law”. The New York Times. Retrieved September 5, 2012.

7.      Poitras, Laura, The Program, New York Times Op-Docs, August 22, 2012

8.      Lawson, Kent, What Does the NSA Know About You?, Private WiFi, August 27, 2012

9.      Gellman, BartonPoitras, Laura (June 6, 2013). “US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program”.The Washington Post. Retrieved June 11, 2013.

10.   Greenwald, Glenn; MacAskill, Ewen (June 9, 2013). “Edward Snowden: The Whistleblower Behind Revelations of NSA Surveillance”The Guardian (Hong Kong). Retrieved June 9, 2013.

11.  James Risen and Eric Lichtblau (June 8, 2013). “How the U.S. Uses Technology to Mine More Data More Quickly”. New York Times. Retrieved June 11, 2013.

12.  Howard Berkes (June 10, 2013). “Amid Data Controversy, NSA Builds Its Biggest Data Farm”. National Public Radio. Retrieved June 11, 2013.

13.  Thomas Burr (June 6, 2013). “Phone records could end up at NSA’s Utah Data Center”. Salt Lake Tribune. Retrieved June 11, 2013.

14.  “NSA to store yottabytes in Utah data centre”CNET Networks. Retrieved 11 August 2011.

15.  Bamford, James. “Who’s in Big Brother’s Database? by James Bamford”The New York Review of Books. Retrieved 11 August 2011.

16.  LaPlante, Matthew D. (July 2, 2009). “New NSA center unveiled in budget documents”Salt Lake Tribune (MediaNews Group). Retrieved 2009-07-05.

17.  LaPlante, Matthew D. (July 2, 2009). “Spies like us: NSA to build huge facility in Utah”Salt Lake Tribune (MediaNews Group). Retrieved 2009-07-05.

What is an exabyte? How big?

These terms are usually used in the world of computing to describe disk space, or data storage space, and system memory. For instance, just a few years ago we were describing hard drive space using the term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it gets quite confusing because there are at least three accepted definitions of each term.

According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte is 1,000,000 bytes in decimal notation. But when the term megabyte is used for real and virtual storage, and channel volume, 2 to the 20th power or 1,048,576 bytes is the appropriate notation. According to the Microsoft Press Computer Dictionary, a megabyte means either 1,000,000 bytes or 1,048,576 bytes. According to Eric S. Raymond in The New Hacker’s Dictionary, a megabyte is always 1,048,576 bytes on the argument that bytes should naturally be computed in powers of two. So which definition do most people conform to?

When referring to a megabyte for disk storage, the hard drive manufacturers use the standard that a megabyte is 1,000,000 bytes. This means that when you buy an 80 Gigabyte Hard drive you will get a total of 80,000,000,000 bytes of available storage. This is where it gets confusing because Windows uses the 1,048,576 byte rule so when you look at the Windows drive properties an 80 Gigabyte drive will report a capacity of 74.56 Gigabytes and a 250 Gigabyte drive will only yield 232 Gigabytes of available storage space. Anybody confused yet? With three accepted definitions, there will always be some confusion so I will try to simplify the definitions a little.

Exabyte: An Exabyte is approximately 1,000 Petabytes. Another way to look at it is that an Exabyte is approximately one quintillion bytes or one billion Gigabytes. There is not much to compare an Exabyte to. It has been said that 5 Exabytes would be equal to all of the words ever spoken by mankind.

Question: If the NSA is not collecting every phone call and e-mail (US and all others as well), then storing it, why have a facility that has multiples of computing storage capacity equal to every computer currently on earth? 




Tags: , , , ,

About giliar

An American patriot who has gone rogue - I will remember in November!

One response to “NSA Backgrounder”

  1. Tom says :

    Technology cannot be un-invented. If we do not exploit it, the other side will. Thus, we must use this technology to its full extent in order to keep us safe. To challenge that is treason.

    And btw, if you question who “we” are in this by attacking America, you are a traitor. The answer to all of the concerns is to get people on your end of the political spectrum in power, accept that you won’t get all you want policy-wise, and then do EVERYTHING you can to crush your political opposition.

    Reality is what it is. This technology exists, the world is as it is, and certain changes WILL occur. The only issue you need to concern yourself with is making sure the right side–both in terms of international geopolitics and domestic partisan/ideological politics–has control of it.

%d bloggers like this: