• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 

News Flodrix botnet targets vulnerable Langflow servers

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber warfare
  • Intelligence
  • New Snowden documents reveal the NSA Digital Arms Race

New Snowden documents reveal the NSA Digital Arms Race

Pierluigi Paganini January 18, 2015

A new collection of document examined by Der Spiegel magazine reveals that the NSA is now preparing for future dominance in cyberspace.

Snowden‘s revelations on mass surveillance by the NSA have shocked the IT industry, but experts say the worst is yet to come. The NSA is working to significantly evolve its methods in relation to the public revelations of Snowden that triggered the countermeasures. The 2013 US secret intelligence budget for the improvement of cyber capabilities and to strengthen offensive operations required around $1 billion, in 2014 the budget was fivefold.

A new collection of document leaked by Snowden demonstrates that the US Intelligence is preparing for the future aiming to control the global network and infiltrate foreign infrastructure.

Der Spiegel magazine has viewed the secret documents and revealed that the NSA is preparing the USA for “Future Battle”, the Agency engaged a Digital Arms Race to build a new cyber arsenal to paralyze the enemy’s computer infrastructures.

The NSA analysis seems to have no doubts as explained in the documents analyzed by the Der Spiegel:

“the next major conflict will start in cyberspace.”

The US Government is heavily investing into the development of advanced cyber capabilities for the Information Warfare. The new generation of cyber weapon must be able to compromise any computer network in critical infrastructure of foreign countries, including facilities, telecommunications, banking systems, factories and transportation.

The leaked documents reveal that mass surveillance operated by the NSA was in the “Phase 0″ in America’s digital war strategy, the effort of the experts are oriented in to detection of critical vulnerabilities in enemy systems that could be exploited to inject “stealthy implants” that allow the Agency a “permanent accesses” on the target.

“According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.” states the magazine.

The name of the “Phase Three” is disturbing, it is labeled as “Dominate,” and enables the NSA to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” The US Intelligence is working to reach a “real time controlled escalation.”

“Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.”

NSA leaked slide Snowden Intelligence

The Snowden documents have revealed an intense surveillance activity of the Agency and its allies, the Five Eyes. Malware development, sophisticated hardware implants, wiretapping of undersea cables are just a few sample of these activities.

The most concerning aspect the ongoing Information Warfare is that the digital conflict will make little differentiation between cyber units and Internet users, this means that we are all potentially at risk.

The post published by the Der Spiegel also reveals the existence of an hacking elite team, described as “just a bunch of hackers,” working for the Remote Operations Center (ROC), which uses the codename S321, at the agency’s headquarters in Fort Meade, Maryland.

“the unit responsible for covert operations. S321 employees are located on the third floor of one of the main buildings on the NSA’s campus. In one report from the Snowden archive, an NSA man reminisces about how, when they got started, the ROC people were “just a bunch of hackers.” Initially, people worked “in a more ad hoc manner,” the report states. Nowadays, however, procedures are “more systematic”. Even before NSA management massively expanded the ROC group during the summer of 2005, the department’s motto was, “Your data is our data, your equipment is our equipment.””

The documents also reveal another team working on the project of “global network dominance”, codenamed Transgression, and working for the department S31177. This department operates to track and prevent foreign cyber attacks.

“This form of “Cyber Counter Intelligence” counts among the most delicate forms of modern spying.”

We need a shared law framework that regulate operations in the cyberspace.

Stay Tuned …

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  NSA, Information Warfare)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

critical infrastructure cyber espionage Der Spiegel digital war Hacking Information Warfare Intelligence NSA PRISM Snowden surveillance TAO

you might also like

Pierluigi Paganini June 24, 2025
U.S. warns of incoming cyber threats following Iran airstrikes
Read more
Pierluigi Paganini June 23, 2025
Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    U.S. warns of incoming cyber threats following Iran airstrikes

    Cyber warfare / June 24, 2025

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

    Cyber warfare / June 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT