Who’s in Big Brother’s Database?


James Bamford reviews The Secret Sentry: The Untold History of the National Security Agency by Matthew M. Aid in The New York Review of Books:

On a remote edge of Utah’s dry and arid high desert, where temperatures often zoom past 100 degrees, hard-hatted construction workers with top-secret clearances are preparing to build what may become America’s equivalent of Jorge Luis Borges’s “Library of Babel,” a place where the collection of information is both infinite and at the same time monstrous, where the entire world’s knowledge is stored, but not a single word is understood. At a million square feet, the mammoth $2 billion structure will be one-third larger than the US Capitol and will use the same amount of energy as every house in Salt Lake City combined.

Unlike Borges’s “labyrinth of letters,” this library expects few visitors. It’s being built by the ultra-secret National Security Agency—which is primarily responsible for “signals intelligence,” the collection and analysis of various forms of communication—to house trillions of phone calls, e-mail messages, and data trails: Web searches, parking receipts, bookstore visits, and other digital “pocket litter.” Lacking adequate space and power at its city-sized Fort Meade, Maryland, headquarters, the NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome.

Just how much information will be stored in these windowless cybertemples? A clue comes from a recent report prepared by the MITRE Corporation, a Pentagon think tank. “As the sensors associated with the various surveillance missions improve,” says the report, referring to a variety of technical collection methods, “the data volumes are increasing with a projection that sensor data volume could potentially increase to the level of Yottabytes (1024 Bytes) by 2015.”[1] Roughly equal to about a septillion (1,000,000,000,000,000,000,000,000) pages of text, numbers beyond Yottabytes haven’t yet been named. Once vacuumed up and stored in these near-infinite “libraries,” the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be—or may one day become—a terrorist. In the NSA’s world of automated surveillance on steroids, every bit has a history and every keystroke tells a story…

, , , , ,

  • nonanon

    Mark the location and set up for fine living space when the crash occurs. Hey – we taxpayers are funding it, we might as well be able to convert it to living space. Heck, you could do hydroponic gardening in a space that large. Make it a self sufficient village! When the economy totally tanks, as it will given the greed of our overseers, it will be time to take over all government (taxpayer financed) structures and set up communities within.

  • nonanon

    Mark the location and set up for fine living space when the crash occurs. Hey – we taxpayers are funding it, we might as well be able to convert it to living space. Heck, you could do hydroponic gardening in a space that large. Make it a self sufficient village! When the economy totally tanks, as it will given the greed of our overseers, it will be time to take over all government (taxpayer financed) structures and set up communities within.

21