Another of those creepy coincidences about which I wrote a few days ago. Last week I read a long article by James Bamford at Wired.com providing details of the zillions of dollars the Americans are putting into new facilities which will allow them not only to monitor and store every single electronic action in the USA but also most of the rest of the world as well. In building these capabilities they have to bear in mind that electronic communications world-wide are expanding at a phenomenal rate. You do not need to read the following quote if you don't want to, it can be summarised as: big, BIGGER, BIGGEST:
Given the facility’s scale and the fact that a terabyte of data can now be stored on a flash drive the size of a man’s pinky, the potential amount of information that could be housed in Bluffdale [the site of the facility] is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this “expanding array of theater airborne and other sensor networks,” as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)
It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.
Most of this ocean of information (in fact if you think of each piece of info as a raindrop in the Pacific Ocean it will give you some idea of the scale of the enterprise!) is of absolutely no interest. However, as any good intelligence man will tell you, that doesn't mean it's never going to be of interest, so a wise security agency will always hang on to it just in case! And whilst it might be necessary to sweep wide, it is even more important on occasions to be able to dig deep:
The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”
Needless to say, in this 'computer race', the equivalent of the Anglo-German naval race before WWI, the 'enemy' keep improving their techniques:
There is still one technology preventing untrammeled government access to private digital data: strong encryption. Anyone—from terrorists and weapons dealers to corporations, financial institutions, and ordinary email senders—can use it to seal their messages, plans, photos, and documents in hardened data shells. For years, one of the hardest shells has been the Advanced Encryption Standard, one of several algorithms used by much of the world to encrypt data. Available in three different strengths—128 bits, 192 bits, and 256 bits—it’s incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications. Most experts say that a so-called brute-force computer attack on the algorithm—trying one combination after another to unlock the encryption—would likely take longer than the age of the universe. For a 128-bit cipher, the number of trial-and-error attempts would be 340 undecillion (1036).
According to Bamford, in the great competition between the code makers and code breakers, the former were winning hands down. Hence, the multi-zillion effort to develop ever bigger and faster computers which, if what Hamlet said is true, that "there is providence in the fall of a sparrow", then pretty soon not only will these listening devices hear the fall but they will even hear and record the faint sigh of its last breath!
Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.
Legal quibbles concerny the privacy of US citizens which in the Bush years kept the MSM squawking like startled chickens are now ignored. Bamford records one NSA scientist who approached the White House on Obama's inaugeration and told them of the threat to privacy was given a polite brush off! So much for the difference between liberals in opposition and liberals in government.
Back to my original comment on coincidence, this morning our MSM are squeaking about similar threats to the privacy of British subjects whose electronic messaging is, according to the government, going to be monitered by GCHQ, our equivalent of the NSA. Cue the usual suspects leaping up an down in protest, including, I'm sorry to saythe normally sensible, David Davis MP. It is worth noting, and I am grateful to Richard North of EU Referendum for reminding me, that the government announcement of its proposals in this area does not actually come out of the blue. The EU issued a directive on this activity back in 2006 and recently have indicated that they will be formulating new directives to all member states to bring these procedures up to date. In other words, in this case, as in others, HMG is just doing what it is about to be told to do by Brussels!
I have run out of time so I will return later to discuss why I do not necessarily feel threatened by these procedures and what safeguards need to be established so that governments do not take advantage.
Recent Comments