Intelligence

New Snowden documents reveal the NSA Digital Arms Race

A new collection of document examined by Der Spiegel magazine reveals that the NSA is now preparing for future dominance in cyberspace.

Snowden‘s revelations on mass surveillance by the NSA have shocked the IT industry, but experts say the worst is yet to come. The NSA is working to significantly evolve its methods in relation to the public revelations of Snowden that triggered the countermeasures. The 2013 US secret intelligence budget for the improvement of cyber capabilities and to strengthen offensive operations required around $1 billion, in 2014 the budget was fivefold.

A new collection of document leaked by Snowden demonstrates that the US Intelligence is preparing for the future aiming to control the global network and infiltrate foreign infrastructure.

Der Spiegel magazine has viewed the secret documents and revealed that the NSA is preparing the USA for “Future Battle”, the Agency engaged a Digital Arms Race to build a new cyber arsenal to paralyze the enemy’s computer infrastructures.

The NSA analysis seems to have no doubts as explained in the documents analyzed by the Der Spiegel:

“the next major conflict will start in cyberspace.”

The US Government is heavily investing into the development of advanced cyber capabilities for the Information Warfare. The new generation of cyber weapon must be able to compromise any computer network in critical infrastructure of foreign countries, including facilities, telecommunications, banking systems, factories and transportation.

The leaked documents reveal that mass surveillance operated by the NSA was in the “Phase 0″ in America’s digital war strategy, the effort of the experts are oriented in to detection of critical vulnerabilities in enemy systems that could be exploited to inject “stealthy implants” that allow the Agency a “permanent accesses” on the target.

“According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.” states the magazine.

The name of the “Phase Three” is disturbing, it is labeled as “Dominate,” and enables the NSA to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” The US Intelligence is working to reach a “real time controlled escalation.”

“Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.”

The Snowden documents have revealed an intense surveillance activity of the Agency and its allies, the Five Eyes. Malware development, sophisticated hardware implants, wiretapping of undersea cables are just a few sample of these activities.

The most concerning aspect the ongoing Information Warfare is that the digital conflict will make little differentiation between cyber units and Internet users, this means that we are all potentially at risk.

The post published by the Der Spiegel also reveals the existence of an hacking elite team, described as “just a bunch of hackers,” working for the Remote Operations Center (ROC), which uses the codename S321, at the agency’s headquarters in Fort Meade, Maryland.

“the unit responsible for covert operations. S321 employees are located on the third floor of one of the main buildings on the NSA’s campus. In one report from the Snowden archive, an NSA man reminisces about how, when they got started, the ROC people were “just a bunch of hackers.” Initially, people worked “in a more ad hoc manner,” the report states. Nowadays, however, procedures are “more systematic”. Even before NSA management massively expanded the ROC group during the summer of 2005, the department’s motto was, “Your data is our data, your equipment is our equipment.””

The documents also reveal another team working on the project of “global network dominance”, codenamed Transgression, and working for the department S31177. This department operates to track and prevent foreign cyber attacks.

“This form of “Cyber Counter Intelligence” counts among the most delicate forms of modern spying.”

We need a shared law framework that regulate operations in the cyberspace.

Stay Tuned …

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  NSA, Information Warfare)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

6 mins ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

2 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

14 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

19 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

24 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

This website uses cookies.