It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by MsAphrodite
reply to post by JohnPhoenix
Interesting, so are you suggesting what I think you are? Are you suggesting that the funding is coming from the mega-corporations that have been cooperating with the NSA? Sort of a you scratch our back and we will scratch yours operation? We will help you protect your intellectual property and stop pirating, and you will pay for the apparatus for us to do this?
The Information Security Oversight Office’s (ISOO) 2011 cost report discloses a 12 percent increase from 2010 for the security classification systems of 41 executive branch agencies, including the Department of Defense (DoD).
But the report did not tally money spent by some of the most secretive government agencies like Central Intelligence Agency (CIA), the Defense Intelligence Agency, the Office of the Director of National Intelligence, the National Geospatial-Intelligence Agency, the National Reconnaissance Office and the National Security Agency (NSA).
In 2011 Congress appropriated $54.6 billion for the government's 16 intelligence agencies, which was an increase over the previous two years, according to Andrea Stone of the Huffington Post.
But that number doesn't seem to even begin to quantify how much is spent on secrecy as it doesn't include the Pentagon's $51 billion "black budget."
And like the CIA, the NSA's activities and budget are kept secret. What is known is that the NSA intercepts 1.7 billion U.S. electronic communications every day and is currently undertaking a $2 billion, 1.8-million-square-foot expansion of its headquarters in Fort Meade, Md., in addition to building a $2 billion, a one-million-square-foot data collection center in Utah.
Originally posted by ProfEmeritus
The more data they collect, the less likely they will be to actually process that data in a meaningful way.
reply to post by Rocker2013
This is just yet more evidence that this facility and the intentions of the NSA have little to do with terrorism.
“this is more than just a data center.” It hopes to be the ultimate code-cracking facility:
Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication,
"NSA would like to confirm, on the record, that the Utah Data Center is a state-of-the-art data facility designed to support the U.S. intelligence community's efforts to further strengthen and protect the nation.
"It's just a big file cabinet out in the Western area," said George, once a senior technical leader at the agency. "There is no spying going on there."
reply to post by leolady
Think about all that data being stored and run through programs all the time... Makes me Ponder... What kind of code are they trying ot crack ?
Originally posted by Wrabbit2000
reply to post by kloejen
".......Now the OP here didn't seem to take as obvious and without saying that the NSA may well have much more, MILES from this visible construction and connected underground. So, it seemed a worthwhile thing to mention, but more importantly? Such observations tend to start additional conversation. The sharing of information and details often follows...and that often leads to NEW knowledge *I* didn't have before.
So, you see, there really is a method to my madness beyond simply posting stupid crap for people to make such comments to me about. Thanks for the observation though.
The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances. The Information Assurance mission confronts the formidable challenge of preventing foreign adversaries from gaining access to sensitive or classified national security information. The Signals Intelligence mission collects, processes, and disseminates intelligence information from foreign signals for intelligence and counterintelligence purposes and to support military operations. This Agency also enables Network Warfare operations to defeat terrorists and their organizations at home and abroad, consistent with U.S. laws and the protection of privacy and civil liberties.
The stages of supercomputer application may be summarized in the following table: Decade Uses and computer involved 1970s Weather forecasting, aerodynamic research (Cray-1). 1980s Probabilistic analysis, radiation shielding modeling (CDC Cyber). 1990s Brute force code breaking (EFF DES cracker), 2000s 3D nuclear test simulations as a substitute for legal conduct Nuclear Proliferation Treaty (ASCI Q). 2010s Molecular Dynamics Simulation (Tianhe-1A)
Department of Energy DOE National Laboratories Argonne National Laboratory Brookhaven National Laboratory Idaho National Engineering and Environmental Laboratory (INEEL) Lawrence Berkley National Laboratory Lawrence Livermore National Laboratory Los Alamos National Laboratory Oak Ridge National Laboratory Pacific Northwest National Laboratory Sandia National Laboratory
Originally posted by FreeEnergyChick
reply to post by neo96
This is probably necessary where I live. I live in the planet's most ethnically diverse region. I am currently in some type of war with my nationalistic landlord who lives in the front house and who is terrorizing me, in my opinion. I am a true American Boy Scout, and I am glad to know we are ready to kick ass at a moment's notice. God Bless the USA!
It takes lots of space to keep our recorded calls.
Yes, I said recorded calls. Does anybody think they are not recording calls.