2 votes

Is the Utah NSA facility a Cyber warfare test range?

Is the Utah NSA facility a Cyber warfare test range?... the analyzing and data mining isn't a very computationally challenging problem nor a data storage problem...
Also funneling the worlds broadband traffic all the way to utah instead of just doing the basic analyzing and collection at the major hubs seems like a massive infrastructure problem that I would assume hasn't been solved nor would need to be solved since the existing tech is already in place AT the hubs.

So my idea is that they are making the utah center into a cyber warfare test range... simulating MASSIVE amount of communications traffic on the scale of citys or whole countries to test out various scenarios in both cyber security AND cyber warfare...

any one else follow me?

Trending on the Web

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

RE: Is the Utah NSA facility a Cyber warfare test range?

I think the facility is designed for any and all possibilities. Mostly I believe it's probably the juncture point where the data in phone records and internet transactions are merged. The analysis will likely be done in San Antonio.

These opinions are based on the excellent Wired article published last year and referenced on this website.

im not so sure they have the transmission capability

im not so sure they have the transmission capability to transfer and analyze the world or even 1/4 of the countries bandwidth.

they already have in place the data capture methods at the hubs... to upload all of that to a place in utah would require VAST infrastructure in magnitude to the already existing internet in size and scale.

In terms of brute forcing somthing like a 512 bit encryption would take longer then the universe, even if the super computer there were trillions of times faster then the top 10 known... it's nearly impossible. there are 2^256 combos in just SHA-2... SHA-3 has 1600 SHA-2 "words". and some methods have even larger encypt combos that are 100s of orders of magnitude over SHA-3

the above facts leads me to believe that this is a cyber test range or something not involved with data capture or encryption.

i think this is the article you mentioned

Tools of war are not always obvious. The worst weapon is an idea planted in the mind of man. Prejudices can kill, suspicion can destroy, and a thoughtless, frightened search for a scapegoat has an everlasting fallout all of its own.