Home » » National Security Agency Utah Data Center

National Security Agency Utah Data Center

Written By Michael Reign on Monday, September 9, 2013 | 12:15 AM

Numerous published articles proffering insight into the exact origins of the massive data repository near Camp Williams, Utah maintain a semblance of ambiguity in relation to its exact purpose. In accordance with written statements obtained by various representatives within the intelligence community, specifically the National Security Agency itself, the Utah Data Center is purportedly a component of the Comprehensive National Cyber-security Initiative. The facility, upon its completion in September of 2013, will operate as a technological extension of the Department of Homeland Security - specializing in the collection of intelligence on potential cyber threats in the event of mass data systems compromise.
Oftentimes, the true scope of influence relevant to the formative implementation of such directives is deliberately obfuscated by telecommunications conglomerates on a supranational level. Documented evidence relevant to the project’s inception contradicts the assertions of these geopolitical luminaries, portraying the massive storage receptacle in a very different light. The highly-classified government initiative will, in reality, assume authority over every conceivable artifice specializing in the field of both domestic and internationally-based network communications through each of the following:

1) The interception of privately generated electronic mail interactions

2) Cell phone communications records

3) Logistical algorithms relevant to computer generated informational queries governed by the utilization of a wide variance of prospective search engines (Google, Yahoo!, Bing, etcetera)

4) Online purchase records

5) Comprehensive criminal background registries

6) Credit applications histories

7) Military records indices

An official source close to the project told the online magazine: Wired.com, that the Utah Data Center will, in actuality, focus on the process of deciphering accumulated data stores - cataloging such information, by subject, into vast digital storage matrices.

The above visual illustrates the Utah Data Center’s role in the retrieval and subsequent dissemination of various forms of internet communications records to prospective agencies within the intelligence community.

Following revelations of abuse by intergovernmental agencies, particularly those pertaining to the expectation of privacy, detailed by Edward Snowden in a series of written communications, the U.S. intelligence community was forced to clarify its purpose for the building and construction of the Utah-based storage receptacle. The following written accord, detailed in its entirety, as it appears on the following government sponsored registry:


DOMESTIC SURVEILLANCE DIRECTORATE | National Data Warehouse: The Purpose of Data Collection

Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by using advanced data mining systems to “connect the dots” to identify suspicious patterns.

Why We Collect Your Data

In the past, domestic law enforcement agencies collected data AFTER a suspect had been identified. This often resulted in lost intelligence and missed opportunities. But what if data could be collected in advance, BEFORE the target was known? What if the mere act of collecting data could result in the identification of new targets?

What if we could build a national data warehouse containing information about every person in the United States? Thanks to secret interpretations of the PATRIOT ACT, top-secret Fourth Amendment exceptions allowed by the Foreign Intelligence Surveillance (FISA) Court, and broad cooperation at the local, state, and federal level, we can!

What Data We Collect

Every day, people leave a digital trail of electronic breadcrumbs as they go about their daily routine. They go to work using electronic fare cards; drive through intersections with traffic cameras; walk down the street past security cameras; surf the internet; pay for purchases with credit/debit cards; text or call their friends; and on and on.

There is no way to predict in advance which crucial piece of data will be the key to revealing a potential plot. The standard operating procedure for the Domestic Surveillance Directorate is to “collect all available information from all available sources all the time, every time, always.”
In the spirit of openness and transparency, here is a partial list* of current and planned future data collection targets:

internet searches (ie; here’s a collection of searches by Federal Government workers)

websites visited

emails sent and received social media activity (Facebook, Twitter, etc)

blogging activity including posts read, written, and commented on - View our patent

videos watched and/or uploaded

online photos viewed and/or uploaded

online mobile phone GPS-location data

mobile phone apps downloaded

phone call records - View our patent

text messages sent and received

Skype video calls

online purchases and auction transactions

credit card/ debit card transactions

financial information

legal documents

travel documents

health records

cable television shows watched and recorded

commuter toll records

electronic bus and subway passes / Smartpasses

facial recognition data from surveillance cameras

educational records

arrest records

driver license information

NOTE* - The information housed within these digital matrices is admittedly, on the part of the Federal Government and its constituencies in the Intelligence Community, recognized as a partial synopsis, therefore it is logical to assume that there is a significant degree of data that has yet to be disclosed to the general public concerning the issue of domestic surveillance.

Sample Collection Data - In Real Time

The PRISM Program is our #1 source of raw intelligence and consists of data extracted from the servers of nine major American internet companies. In the spirit of openness and transparency, we have embedded the Twitter feed from the NSA_PRISMbot which periodically posts random samples of PRISM collection data.

How We Collect Your Data

For information on how we collect your data, visit our Surveillance Techniques page on this website. For information about our new state-of-the-art Surveillance Data Center, visit our Utah Data Center.
How We Use Your Data

We treasure the U.S. Constitution and the rights it secures for all the people. In a world in which privacy has become illusory in so many areas of our lives, the Domestic Surveillance Directorate maintains the highest standards of integrity and lawful action. Your private data is safely secured using our custom database software called Cloudbase, which has fine-grained security to control access down to the cell level.

Threat Matrix Processing

Incoming transactional data is analyzed against a continually evolving threat matrix and is assigned an action code. The vast majority of these transactions are routed directly to a permanent static storage state. In fact, for most Americans, your data is never accessed or viewed by anyone within the US Government unless some future event triggers an inquiry. We work closely with our partners in the Intelligence Community to ensure that your stored data is released only as a result of a “national security” request.  

Continuity of Government

Our strong commitment to keeping the Nation safe includes an important role in maintaining the Continuity of Government. Since the early 1980s, the federal government has used its secret Main Core database to track dissidents and watchlisted Americans in the event of a national emergency. The roots of the Domestic Surveillance Directorate can, in fact, be traced back to the early days of this program. We are proud to continue this tradition by sharing our data with the modern-day COG program. Learn more about this.

Future Uses of Domestic Intelligence Data

In 2006, the Intelligence Advanced Research Projects Activity (IARPA) was created to invest in high-risk, high-payoff classified programs uniquely designed to provide research and technical capabilities for the Intelligence Community. IARPA-funded researchers are currently studying novel ways of processing and analyzing the explosive growth of domestic data.

The Aladdin Program seeks to extract intelligence information from the high volume of videos uploaded to the internet.

The Babel Program is developing agile and robust speech recognition technology that can provide effective search capability for analysts to efficiently process massive amounts of real-world recorded speech.

The Knowledge Discovery and Dissemination (KDD) Program will develop advanced analytic algorithms that can effectively draw inferences across multiple databases to allow the Intelligence Community to create virtual fusion centers enabling analysts to produce actionable intelligence.

The Socio-cultural Content in Language (SCIL) Program will develop novel algorithms, techniques and technologies to uncover the social actions and characteristics of members of a group (ie; within discussion forums, online comment sections, social media, etc.) by examining the language used in relation to acceptable social and cultural norms.

The Reynard Program starts from the premise that “real world” characteristics are reflected in “virtual world” behavior. The program seeks to identify behavioral indicators in online virtual worlds and “massively multiplayer online games” that are related to the real world characteristics of the users. Attributes of interest include gender, age, economic status, educational level, occupation, ideology or “world view,” and physical geographic location.

The Facts About Our Surveillance Activities

In recent months, numerous Top Secret documents have been leaked to the media relating to surveillance activities carried out by the Intelligence Community. In an effort to increase transparency, a new website called “IC OFF THE RECORD” has been created to provide immediate, ongoing and direct access to these unauthorized leaks.

CONCLUSION: Considering the fact that a significant number of links initially included in the above synopsis have since been stricken from record [Aladdin Program, Babel Program, Knowledge Discovery and Dissemination (KDD) Program, Socio-cultural Content in Language (SCIL) Program, Reynard Program, etc.] it is therefore within reason to conclude that the disclosure of pertinent information related to the campaign of domestic surveillance operations is subject to individual interpretation. The Federal Government’s notion of openness and transparency in a public forum then becomes less credible in light of these developments.
Share this article :


Speak your mind and let your voice be heard.

This is a censorship free discussion area.

Support: Creating Website | Johny Template | Mas Template
Ωmnibus ™ and © Michael Reign. All Rights Reserved.
Template Created by Creating Website Published by Mas Template
Site modifications and enhancements by Michael Reign c/o Legerdemain Technologies