The Digital Arms Race: NSA Preps America for Future Battle

By Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, , Leif Ryge, and 

Photo Gallery: 'Controlled Escalation'Photos

The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it's operated by the NSA's digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.

Potential interns are also told that research into third party computers might include plans to "remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware." Using a program called Passionatepolka, for example, they may be asked to "remotely brick network cards." With programs like Berserkr they would implant "persistent backdoors" and "parasitic drivers". Using another piece of software called Barnfire, they would "erase the BIOS on a brand of servers that act as a backbone to many rival governments."

An intern's tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was "developing an attacker's mindset."

The internship listing is eight years old, but the attacker's mindset has since become a kind of doctrine for the NSA's data spies. And the intelligence service isn't just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance -- comprised of the United States, Britain, Canada, Australia and New Zealand -- want more.

The Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It's no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country's leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only 'Phase 0'

From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation".

One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone

NSA Docs on Malware and Implants

MORE OF THE STORY

Views: 70

Replies to This Discussion

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

What Emotion Do all Election and Other Causes Depend Upon? Hatred

 All propagandists, election campaign strategists, PR specialists, social engineers, and even…See More
1 hour ago
Doc Vega's 4 blog posts were featured
4 hours ago
cheeki kea's 2 blog posts were featured
4 hours ago
tjdavis's blog post was featured
4 hours ago
Larry Harmen's blog post was featured

WW3 is days away!!! Project Blue beam is about to happen = NASA project = 3 rockets April 8th into the Eclipse.

U.S. Prepares for a Massive attack on Iran and many Nations today in the News.…See More
4 hours ago
Boris's blog post was featured

! FBI's McCabe intentionally held off investigation of newly discovered Clinton emails found on Wiener's computer until after the election

Modal Trigger Justice Department investigating McCabe’s handling of Clinton email probe Chris Wray…See More
4 hours ago
J. Patriot's blog post was featured

Letter from a small Company that was declined disaster relief due to the COVID-19 from the Small Business Administration

To Whom it may concern,I have been running a business in the red with Insurance cost, driving…See More
4 hours ago
Burbia's blog post was featured

Major Players Behind the SS LIBERTY

What now? These things are not even being hidden anymore.MOSSAD Eyes and Ears, Mathilde Krim, LBJ…See More
4 hours ago
alux junes posted a status
10 hours ago
alux junes posted a status
10 hours ago
alux junes posted a status
10 hours ago
alux junes posted a status
11 hours ago
alux junes posted a status
"mewe.com is easier than this"
11 hours ago
alux junes posted a status
11 hours ago
alux junes posted a status
"how many people still come here?"
11 hours ago
tjdavis posted a video

Prince - Cinnamon Girl (Official Music Video)

"Cinnamon Girl" from 'Musicology' (2004)☔️ Listen to more Prince here https://lnk.to/PrinceStream📺 Watch all the official Prince videos here http://bit.ly/P...
19 hours ago
MAC posted photos
19 hours ago
FREEDOMROX posted a blog post
21 hours ago
MAC posted a discussion
23 hours ago
Doc Vega posted blog posts
yesterday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted