Scary NSA techniques to win the cyberwar

New documents show Edward Snowden offensive strategy of the secret agency whose ultimate goal is clear: to get the cyberspace supremacy. And it's scary.

See This : Adobe Lightroom mobile: it is available on Android

The e next big conflict will begin in the Internet " . This phrase does not come from a futurist geopolitics, but appears in the introduction of advanced computer courses NSA to members of the US military (US Navy). And it is surprising that half because the American secret agency did not like the overall mission alone digital espionage, it is also spearheading and shield of the United States for possible future cyber wars.



This is indeed what emerges from nearly forty of Edward Snowden documents, published yesterday, Sunday, January 18, by the magazine Der Spiegel . This mass of data was shelled by 9 journalists and hackers, including Laura Poitras, Jacob Appelbaum (developer Tor) and Andy Müller-Maguhn (spokesperson of the Chaos Computer Club).
Control and destroy

The analysis shows that digital information is really only "Phase 0" e-strategy of the military of the United States. It provides information not only on countries and their inhabitants, but also on their critical IT systems. The next step is to infiltrate and to create permanent access in order to be able to dominate, that is to say  "control / destroy" as is nicely explained in one of the documents . Critical systems are those that are vital to the functioning of a country: power grids, power plants, transportation systems, communication networks, etc.

To achieve this goal, the US government does not skimp on money. In 2013, the NSA was given a budget of one billion dollars for its "computer network operations" (Computer Network Operations). At the center of this activity is the "ROC" (Remote Operations Center) from which act the elite hackers "TAO" (Tailored Access Operations). They work in difficult missions, for example when it comes to infiltrate particularly well protected targets. It is also they who infiltrate and take control of critical systems throughout the world, with the goal of a "global supremacy of networks" (Global Network Dominance).

The slogan of this company:  "Your data is our data, your equipment is our equipment at any time, at any place and by any legal means. " Sympa.  
When the spies spying on spies

To achieve this, the NSA is firing on all cylinders. The agency has an arsenal of more or less automated attacking tools, including interception / infection programs "Quantumtheory" malware "Warriorpride" cookies or property of catalog "ANT" . What we did not know was that the NSA also uses the intelligence capabilities of other countries without their knowledge to infiltrate networks. This principle is called "Fourth Party Collection". In sum, the US agents hijack other hacking programs to achieve their targets.

In one of the published documents dating from 2011, the NSA said to have infiltrated the Chinese intelligence system. Another document from 2007, an agent explains that the NSA has infiltrated the South Korean hacking program to be able to gain a foothold in the North Korean system. Which, according to The New York Times , explain why the FBI has been accused as soon the People's Republic of Kim Jung-A sequel to the famous hack of Sony Pictures. But that's another story ...
The botnet as a smokescreen

In his quest to digital supremacy, NSA does not hesitate to rely on the infrastructure of cybercriminals. Programs such as "Quantumbot" and "Defiantwarrior" allow to take control of botnets and use them in the context of network attacks. Why use such poor quality platforms? Because they allow secret agents to cover their tracks and stay in the shade. Obviously, the NSA is not alone in the race for digital dominance, but it is far ahead of the other.
Previous Post Next Post