Archive | CYBER ATTACKS RSS feed for this section

The Digital Arms Race: NSA Preps America for Future Battle

18 Jan

Future wars will be fought in cyberspace;  Soldiers may look like gamers!

By Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, , Leif Ryge, and

Photo Gallery: 'Controlled Escalation' 

The NSA’s mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars — a struggle for control of the Internet that is already well underway.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, “looking for interns who want to break things.”

 Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.

Potential interns are also told that research into third party computers might include plans to “remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware.” Using a program called Passionatepolka, for example, they may be asked to “remotely brick network cards.” With programs like Berserkr they would implant “persistent backdoors” and “parasitic drivers”. Using another piece of software called Barnfire, they would “erase the BIOS on a brand of servers that act as a backbone to many rival governments.”

An intern’s tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was “developing an attacker’s mindset.”

The internship listing is eight years old, but the attacker’s mindset has since become a kind of doctrine for the NSA’s data spies. And the intelligence service isn’t just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance — comprised of the United States, Britain, Canada, Australia and New Zealand — want more.

The Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons — atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, “World War III is a guerrilla information war with no division between military and civilian participation.” That’s precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It’s no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country’s leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only ‘Phase 0’

From a military perspective, surveillance of the Internet is merely “Phase 0” in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once “stealthy implants” have been placed to infiltrate enemy systems, thus allowing “permanent accesses,” then Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.

One NSA presentation proclaims that “the next major conflict will start in cyberspace.” To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for “unconventional solutions” alone.

Mark Caserta: US is ill prepared for a cyber attack

4 Dec

CAN AMERICA BE BROUGHT TO HER KNEES?

Dec. 04, 2014 @ 12:01 AM
 cyber 3

As the most powerful and the most “wired” nation in the world, we’re well beyond speculation of a cyber attack on the United States. In fact, according to the National Security Agency, such an attack is imminent.

The agency’s new director, Admiral Michael Rogers, says he expects a major cyber attack against the U.S. in the next decade. And that it’s only a matter of “when,” not “if,” we’re going to see something traumatic occur in our nation’s cyber space.

During recent testimony before a House Intelligence Committee hearing, Rogers revealed the NSA was watching multiple nations invest in this dangerous capability to hack into U.S. infrastructure systems. His testimony is the most specific warning from the government to date about the likelihood of such an attack and included a candid acknowledgment that the United States simply isn’t prepared to manage the threat.

cyber 2

Rogers, who also heads the military’s U.S. Cyber Command, highlighted several emerging threats that will become significant problems in the coming year. One such threat involves nations such as China and “one or two others” that U.S. officials maintain are currently infiltrating the networks of industrial control systems behind infrastructure like our power grid, nuclear power plants, air traffic control and subway systems.

“There shouldn’t be any doubt in our minds that there are nation-states and groups out there that have the capability to do that,” Rogers said. “We’re watching multiple nations invest in that capability.” He added the U.S. needs to work more aggressively on deterring such attacks.

cyber 1

NATO took the threat so seriously it recently organized mock cyber-war game trials in Estonia that indicated the western nations are aware of the need to fight on a new battlefield where the size or military prowess of a nation is insignificant.

In recent years, our enemies have witnessed how portions of our nation react during crises, which have included power outages and/or food and water shortages. We’ve had cities bordering the edge of anarchy. And these same enemies have made exceedingly greater progress in their sophisticated cyber-warfare techniques than we have achieved in defending ourselves.

Just as the United States is evolving its military strategies to include less physical presence in the theater of war, our enemies are as well. Consider the potential of a coordinated attack on the U.S. in which our infrastructure was paralyzed by a cyber attack while we simultaneously sustained numerous internal terrorist attacks of a physical or chemical nature.

Frankly, I’m uneasy putting this in writing, but the solution must begin with discussion. This isn’t an attack we’ll see coming on a radar screen. There will be no reaction time. Understand, the depth of a cyber attack isn’t contingent upon military strength and in fact “levels” the playing field of battle. Only a proactive approach to strengthening our cyber defense systems will protect our nation.

We recognize our vulnerability and so does the enemy. Let’s expeditiously contract our nation’s brightest minds to prepare for this impending onslaught against America before it’s too late.

100.jpg

Mark Caserta is a conservative blogger, a Cabell County resident and a regular contributor to The Herald-Dispatch editorial page.