Share

Top 5 Stories

News

Army-funded Utah data center to be used by NSA for cybersecurity operations

30 September 2010

The US Army has awarded a $1.2 billion contract to a construction joint venture to build a data center at Camp Williams, Utah, reportedly to gather cybersecurity intelligence by the National Security Agency.

The Army said the data center, which will be built by Balfour Beatty/DPR/Big-D joint venture, will have 1.5 million square feet of building space, including 100 000 square feet of raised floor data center space and more than 900 000 square feet of technical support and administrative space.

InformationWeek reported that the data center will be used by the NSA to gather intelligence about cybersecurity threats to Department of Defense networks. Construction of a data center for NSA at Camp Williams is included in the NSA's FY 2010 budget estimate.

The data center is part of the the NSA Comprehensive National Security Initiative (CNSI), which is intended to bolster cybersecurity efforts to protect federal computer networks from intrusion by hackers and foreign governments, InformationWeek said.

The CNSI, launched by President Bush in 2008 and continued under the Obama administration, has the following goals:

  • To establish a front line of defense against immediate cybersecurity threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the federal government and acting to reduce current vulnerabilities and prevent intrusions.
  • To defend against the full spectrum of cybersecurity threats by enhancing counterintelligence capabilities and increasing the security of the supply chain for key information technologies.
  • To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the federal government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
This article is featured in:
Internet and Network Security  •  Public Sector

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×