NSA & RSA

, not just the metadata but the audio content as well?

New NSA Bluffdale Utah Data Center was revealed long ago. Just for telephone number metadata? Sure! LOL

formatting link
/ap132411996867.jpg
formatting link
s%202.jpg
formatting link
formatting link
et.shtml NSA's Massive Utah Datacenter Having Serious Electrical Problems: Has Alrea dy Had 10 Fiery Explosions from the frying-our-data dept (Mis)Uses of Technology by Mike Masnick Tue, Oct 8th 2013 12:12pm It's no secret that government computing projects tend to be something of a boondoggle for government contractors. There are way too many stories of p rojects that are massively over-budget while never actually working. It's a lmost to be expected these days. Still, when it came to the NSA's infamous Utah data center they've been building over the past few years, you would h ave thought that maybe these guys would plan things out a little more caref ully. While we can mock the NSA for the lies and misleading statements they make to the public, most people agree that they do have pretty damn good t echnical skills. But, no, it appears that the Bluffdale data center is a complete mess. The data center, which was supposed to open up last month, has apparently been massively delayed due to major electrical problems -- and we're not just ta lking about some issues with not having enough power, but with setting stuf f on fire: According to the Wall Street Journal, the data center's electrical prob lems include "arc failures," a.k.a. "a flash of lightning inside a 2-foot b ox," which results in fiery explosions, melted metal and circuit failure. M ore terrifying, this has happened ten times, most recently on September 25, reports the WSJ, which reviewed project documents and reports and talked t o contractors involved. The report blames the NSA "fast tracking" the Utah project and thus bypassing "regular quality controls in design and construc tion." Whoops. Whoops indeed. Apparently the NSA was in such a rush to store all our data that it almost burned down its own data center. Good thing they're getting a tax break on all that electricity they're using. Also, it appears that there's a fair bit of sniping going on, as some peopl e claim they knew this was going to happen all along, while others say they have no idea why it's happening: Worse, it sounds from the WSJ's reporting as if the contractors ? arc hitectural firm KlingStubbins which designed the electrical system, along w ith construction companies Balfour Beatty Construction, DPR Construction an d Big-D Construction Corp ? are still scrambling to figure out what's cau sing the problems. The Army Corps of Engineers sent its "Tiger Team" to sor t things out this summer but they were unable to pinpoint exactly what's wr ong. "The problem, and we all know it, is that they put the appliances too c lose together," a person familiar with the database construction told FORBE S, describing the arcs as creating "kill zones." "They used wiring that's n ot adequate to the task. We all talked about the fact that it wasn't going to work." So, while the NSA has all sorts of code-breaking specialists, it appears th at they're a bit understaffed on electrical engineers... Meanwhile, how lon g until peeved Iranian government officials pretend that they did this in r esponse to the NSA creating Stuxnet to mess with their nuclear processing p owers... Posted under the FAIR USE exceptions to US copyright law. Non-profit and for purpose of discussion.

Reply to
Greegor
Loading thread data ...

--
"Easily done" isn't synonymous with "successfully done".
Reply to
John Fields

It can't be done *at all*, assuming "brute force" has the usual meaning of "just try all the combinations". Excluding "rubber hose decryption" and other human factors outside the scope of the algorithm, it is literally unbreakable.

--

John Devereux
Reply to
John Devereux

--
Indeed. :-) 

My point was that while josephkk touted decryption as being easily 
accomplished by a brute force attack, in this case there's a nearly 
infinite number of slips 'twixt the cup and the lip.
Reply to
John Fields

Don't know about FL, but WA, certainly.

"Mount St. Helens, biggest ash-hole in the west."

--
"Design is the reverse of analysis" 
                   (R.D. Middlebrook)
Reply to
Fred Abse

that

Alas, that implementation is done by humans and thus its security is all undone. People make mistakes and fail to follow protocols.

If only i could believe that.

secure RNG.

Reply to
josephkk

Say you have a 1000 character one-time-pad encrypted message. A "brute force attack" would simply - eventually - generate every possible permutation of 1000 characters. Including the first 1k characters of Romeo and Juliet, etc. There would be no way at all to know what the correct message is. So even infinite computing resources for infinite time does not help here. The algorithm itself is literally unbreakable. Human factors may allow this fact to be sidestepped, as always.

--

John Devereux
Reply to
John Devereux

On Fri, 27 Dec 2013 07:52:31 -0600, John Fields Gave us:

Since I shoot pool. I want a little "Railism". Maybe I should do a "Railality TV Show". Or do I mean That we should ride all these oath ignoring dirty bastards out of town on a rail?

Get a chance to watch an episode or two of that first season "Lexx" show yet?

Now there's some "Cycles of Time" "Reality" for ya. :-)

Reply to
DecadentLinuxUserNumeroUno

They say it's for our own good! LOL

Reply to
Greegor

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.