Friday, May 24, 2013

Bumblehive Utah Data Center




Utah Data Center

Background

The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation. NSA is the executive agent for the Office of the Director of National Intelligence (ODNI) and will be the lead agency at the center.

The steady rise in available computer power and the development of novel computer platforms will enable us to easily turn the huge volume of incoming data into an asset to be exploited, for the good of the nation.

aerial view of NSA Utah Data Center in Bluffdale

The Utah Data Center is currently under construction and is expected to open in October 2013. Our 1.5 billion-dollar one million square-foot Bluffdale / Camp Williams facility will house a 100,000 sq-ft mission critical data center. The remaining 900,000 SF will be used for technical support and administrative space. Other supporting facilities include water treatment facilities, chiller plant, power substations, vehicle inspection facility, visitor control center, and sixty diesel-fueled emergency standby generators and fuel facility for a 3-day 100% power backup capability.


Utah Data Center Site Plan

The site plan below shows the location of the administration building, chiller plant, data halls, generators, fuel storage tanks, storage warehouse, power substations, visitor control center, and vehicle inspection facility. View the full-size Utah Data Center Site Plan

Utah Data Center Construction Photos

Here are some photos of the Utah Data Center under construction:

NSA Utah Data Center construction photos March 2012

utah data center storage tanks and buildings July 2012

NSA Utah Data Center under construction 2013 July 2012

Construction of the NSA IC CNCI data center in Bluffdale Utah October 2012

Utah Data Center Technical Specifications


Data Storage Capacity
The storage capacity of the Utah Data Center will be measured in "zettabytes". What exactly is a zettabyte? There are a thousand gigabytes in a terabyte; a thousand terabytes in a petabyte; a thousand petabytes in an exabyte; and a thousand exabytes in a zettabyte. Some of our employees like to refer to them as "alottabytes".

Learn more about the domestic surveillance data we plan to process and store in the Utah Data Center.




Code-Breaking Supercomputer Platform
In October 2012, the U.S. Department of Energy's (DOE) Oak Ridge National Laboratory launched the Titan Supercomputer, which is capable of churning through more than 20,000 trillion calculations each second or 20 petaflops. (1 petaflop = 1 quadrillion instructions per second).

Titan supercomputer


Our Target: 256-bit AES
The Advanced Encryption Standard (AES) algorithm is used worldwide to encrypt electronic data on hard drives, email systems, and web browsers. The AES 256-bit encryption key is the standard for top-secret US government communications. Computer experts have estimated it would take longer than the age of the universe to break the code using a trial-and-error brute force attack with today's computing technology.

In 2004, the NSA launched a plan to use the Multiprogram Research Facility in Oak Ridge, Tennessee to build a classified supercomputer designed specifically for cryptanalysis targeting the AES algorithm. Recently, our classified NSA Oak Ridge facility made a stunning breakthrough that is leading us on a path towards building the first exaflop machine (1 quintillion instructions per second) by 2018. This will give us the capability to break the AES encryption key within an actionable time period and allow us to read and process stored encrypted domestic data as well as foreign diplomatic and military communications.


NSA Utah Data Center visitor control center Visitor Control Center


Construction Status

We're using a Critical Path Method (CPM) schedule to track the cost and resource data for over 26,000 activities. The project initially required over a million cubic yards of earthwork and nearly seven miles of new roadways. The massive twenty-building complex is being completed in three phases. The first phase was completed last Fall and includes the first of four data halls (Data Center Module DCM 1); the Administration Building; Data Center Loading and Storage; Chiller Plant #1 and storage tanks; Generator Plant #1 with fuel system storage; Visitor Control Center; Vehicle Cargo Inspection Facility; kennel; perimeter warehouse; and fire pump building.

The second phase, completed early in 2013 includes the second data hall (DCM 2) along with Generator Plant #2 with fuel system storage.

recent photo of NSA Utah data center 2013

The final phase is scheduled to be completed by October 2013 and includes the remaining two data halls (DCM 3 and 4); Generator Plants 3 and 4 with fuel system storage; and Chiller Plant #2 and storage tanks. Because of the national security implications of an on-time opening of this critical facility, the NSA has already begun the installation of classified equipment in the first two data halls (DCM 1 and 2).

Aerial view of NSA Utah data center in April 2013 April 2013

NSA Utah Data Center ribbon cutting ceremony

Ribbon Cutting Ceremony on May 30th, 2013

A special ribbon cutting ceremony will be held at the Utah Data Center on May 30th in celebration of an important milestone. We're inviting our most loyal partners at the local, state, and federal level who have had the vision and fortitude to enable us to build this powerful Intelligence Community data center "for the good of the Nation".

No comments:

Post a Comment

Underground Secure Data Center Operations

Technology based companies are building new data centers in old mines, caves, and bunkers to host computer equipment below the Earth's surface.

Underground Secure Data Center Operations have a upward trend.

Operations launched in inactive gypsum mines, caves, old abandoned coal mines, abandoned solid limestone mines, positioned deep below the bedrock mines, abandoned hydrogen bomb nuclear bunkers, bunkers deep underground and secure from disasters, both natural and man-made.

The facility have advantages over traditional data centers, such as increased security, lower cost, scalability and ideal environmental conditions. There economic model works, despite the proliferation of data center providers, thanks largely to the natural qualities inherent in the Underground Data Centers.

With 10,000, to to over a 1,000,000 square feet available, there is lots of space to be subdivided to accommodate the growth needs of clients. In addition, the Underground Data Centers has an unlimited supply of naturally cool, 50-degree air, providing the ideal temperature and humidity for computer equipment with minimal HVAC cost.

They are the most secure data centers in the world and unparalleled in terms of square footage, scalability and environmental control.

Yet, while the physical and cost benefits of being underground make them attractive, they have to also invested heavily in high-speed connectivity and redundant power and fiber systems to ensure there operations are not just secure, but also state-of-the-art.

There initially focused on providing disaster recovery solutions, and backup co-location services.

Clients lease space for their own servers, while other provides secure facilities, power and bandwidth. They offers redundant power sources and multiple high-speed Internet connections through OC connected to SONET ring linked to outside connectivity providers through redundant fiber cables.

Underground Data Centers company augments there core services to include disaster recovery solutions, call centers, NOC, wireless connectivity and more.

Strategic partnering with international, and national information technology company, enable them to offer technology solutions ranging from system design and implementation to the sale of software and equipment.

The natural qualities of the Underground Data Centers allow them to offer the best of both worlds premier services and security at highly competitive rates.

Underground Data Centers were established starting in 1990's but really came into there own after September 11 attacks in 2001 when there founders realized the former mines, and bunker offered optimal conditions for a data center. The mines, and bunkers offered superior environmental conditions for electronic equipment, almost invulnerable security and they located near power grids.

Adam Couture, a Mass.-based analyst for Gartner Inc. said Underground Data Centers could find a niche serving businesses that want to reduce vulnerability to any future attacks. Some Underground Data Centers fact sheet said that the Underground Data Center would protect the data center from a cruise missile explosion or plane crash.

Every company after September 11 attacks in 2001 are all going back and re-evaluating their business-continuity plans, This doesn't say everybody's changing them, but everybody's going back and revisiting them in the wake of what happened and the Underground Data Center may be just that.

Comparison chart: Underground data centers

Five facilities compared
Name InfoBunker, LLC The Bunker Montgomery Westland Cavern Technologies Iron Mountain The Underground
Location Des Moines, Iowa* Dover, UK Montgomery, Tex. Lenexa, Kan. Butler County, Penn.*
In business since 2006 1999 2007 2007 Opened by National Storage in 1954. Acquired by Iron Mountain 1998.
Security /access control Biometric; keypad; pan, tilt and zoom cameras; door event and camera logging CCTV, dogs, guards, fence Gated, with access control card, biometrics and a 24x7 security guard Security guard, biometric scan, smart card access and motion detection alarms 24-hour armed guards, visitor escorts, magnetometer, x-ray scanner, closed-circuit television, badge access and other physical and electronic measures for securing the mine's perimeter and vaults
Distance underground (feet) 50 100 60 125 220
Ceiling height in data center space (feet) 16 12 to 50 10 16 to 18 15 (10 feet from raised floor to dropped ceiling)
Original use Military communications bunker Royal Air Force military bunker Private bunker designed to survive a nuclear attack. Complex built in 1982 by Louis Kung (Nephew of Madam Chang Kai Shek) as a residence and headquarters for his oil company, including a secret, 40,000 square foot nuclear fallout shelter. The office building uses bulletproof glass on the first floor and reception area and 3-inch concrete walls with fold-down steel gun ports to protect the bunker 60 feet below. Limestone mine originally developed by an asphalt company that used the materials in road pavement Limestone mine
Total data center space (square feet) 34,000 50,000 28,000 plus 90,000 of office space in a hardened, above-ground building. 40,000 60,000
Total space in facility 65,000 60,000 28,000 3 million 145 acres developed; 1,000 acres total
Data center clients include Insurance company, telephone company, teaching hospital, financial services, e-commerce, security
monitoring/surveillance, veterinary, county government
Banking, mission critical Web applications, online trading NASA/T-Systems, Aker Solutions, Continental Airlines, Houston Chronicle, Express Jet Healthcare, insurance, universities, technology, manufacturing, professional services Marriott International Inc., Iron Mountain, three U.S. government agencies
Number of hosted primary or backup data centers 2 50+ 13 26 5
Services offered Leased data center space, disaster recovery space, wholesale bandwidth Fully managed platforms, partly managed platforms, co-location Disaster recovery/business continuity, co-location and managed services Data center space leasing, design, construction and management Data center leasing, design, construction and maintenance services
Distance from nearest large city Des Moines, about 45 miles* Canterbury, 10 miles; London, 60 miles Houston, 40 miles Kansas City, 15 miles Pittsburgh, 55 miles
Location of cooling system, includng cooling towers Underground Underground Above and below ground. All cooling towers above ground in secure facility. Air cooled systems located underground. Cooling towers located outside
Chillers located above ground to take advantage of "free cooling." Pumps located underground.
Location of generators and fuel tanks Underground Above ground and below ground Two below ground, four above ground. All fuel tanks buried topside. Underground Underground
*Declined to cite exact location/disatance for security reasons.