By Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt and Michael Sontheimer
Source: Der Spiegel 
The NSA's mass surveillance is just the beginning. Documents 
from Edward Snowden show that the intelligence agency is arming America 
for future digital wars -- a struggle for control of the Internet that 
is already well underway.
Normally, internship applicants need to have polished resumes, with 
volunteer work on social projects considered a plus. But at Politerain, 
the job posting calls for candidates with significantly different skill 
sets. We are, the ad says, "looking for interns who want to break 
things." 
Politerain is not a project associated with a conventional company. It 
is run by a US government intelligence organization, the National 
Security Agency (NSA). More precisely, it's operated by the NSA's 
digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.
Potential interns are also told that research into third party 
computers might include plans to "remotely degrade or destroy opponent 
computers, routers, servers and network enabled devices by attacking the
 hardware." Using a program called Passionatepolka, for example, they 
may be asked to "remotely brick network cards." With programs like 
Berserkr they would implant "persistent backdoors" and "parasitic 
drivers". Using another piece of software called Barnfire, they would 
"erase the BIOS on a brand of servers that act as a backbone to many 
rival governments."
An intern's tasks might also include remotely destroying the 
functionality of hard drives. Ultimately, the goal of the internship 
program was "developing an attacker's mindset."
The internship listing is eight years old, but the attacker's mindset
 has since become a kind of doctrine for the NSA's data spies. And the 
intelligence service isn't just trying to achieve mass surveillance of 
Internet communication, either. The digital spies of the Five Eyes 
alliance -- comprised of the United States, Britain, Canada, Australia 
and New Zealand -- want more.
The Birth of D Weapons
 
According to top secret documents from the archive of NSA 
whistleblower Edward Snowden seen exclusively by SPIEGEL, they are 
planning for wars of the future in which the Internet will play a 
critical role, with the aim of being able to use the net to paralyze 
computer networks and, by doing so, potentially all the infrastructure 
they control, including power and water supplies, factories, airports or
 the flow of money.
During the 20th century, scientists developed so-called ABC weapons 
-- atomic, biological and chemical. It took decades before their 
deployment could be regulated and, at least partly, outlawed. New 
digital weapons have now been developed for the war on the Internet. But
 there are almost no international conventions or supervisory 
authorities for these D weapons, and the only law that applies is the 
survival of the fittest.
Canadian media theorist Marshall McLuhan foresaw these developments 
decades ago. In 1970, he wrote, "World War III is a guerrilla 
information war with no division between military and civilian 
participation." That's precisely the reality that spies are preparing 
for today.
The US Army, Navy, Marines and Air Force have already established 
their own cyber forces, but it is the NSA, also officially a military 
agency, that is taking the lead. It's no coincidence that the director 
of the NSA also serves as the head of the US Cyber Command. The 
country's leading data spy, Admiral Michael Rogers, is also its chief 
cyber warrior and his close to 40,000 employees are responsible for both
 digital spying and destructive network attacks.
Surveillance only 'Phase 0'
 
From a military perspective, surveillance of the Internet is merely 
"Phase 0" in the US digital war strategy. Internal NSA documents 
indicate that it is the prerequisite for everything that follows. They 
show that the aim of the surveillance is to detect vulnerabilities in 
enemy systems. Once "stealthy implants" have been placed to infiltrate 
enemy systems, thus allowing "permanent accesses," then Phase Three has 
been achieved -- a phase headed by the word "dominate" in the documents.
 This enables them to "control/destroy critical systems & networks 
at will through pre-positioned accesses (laid in Phase 0)." Critical 
infrastructure is considered by the agency to be anything that is 
important in keeping a society running: energy, communications and 
transportation. The internal documents state that the ultimate goal is 
"real time controlled escalation".
One NSA presentation proclaims that "the next major conflict will 
start in cyberspace." To that end, the US government is currently 
undertaking a massive effort to digitally arm itself for network 
warfare. For the 2013 secret intelligence budget, the NSA projected it 
would need around $1 billion in order to increase the strength of its 
computer network attack operations. The budget included an increase of 
some $32 million for "unconventional solutions" alone.
 
 
No comments:
Post a Comment