News:

Forum is currently set to Admin Approval for New Members
Pegasus Gofundme website



Main Menu

The Digital Arms Race: NSA Preps America for Future Battle

Started by RUSSO, January 20, 2015, 01:41:27 PM

Previous topic - Next topic

RUSSO

In the 20th century, scientists developed the ABC weapons. (atomic, biological and chemical) Now we live in the time where we can seeing the birth of "D weapons", The Digital weapons. The Spiegel article is a must read.

Reading the Der Spiegel post you will learn how the new document from the Snowden archive reveals that NSA operatives saw internet surveillance to be only the first step in their desire to "control it all"; a phrase used to describe near total digital awareness of global communication networks.

Also we can see the "legal" professional hackers...Because when the PTB back you up, there is no violations so, respect their authoritah. ::)



QuoteThe NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Is Edward Snowden the guy who cried wolf, only that in this story the wolves were there all time and people just were not seeing it? Should we be concerned?

QuoteThe Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It's no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country's leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only 'Phase 0'

From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation".

QuotePotential interns are also told that research into third party computers might include plans to "remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware." Using a program called Passionatepolka, for example, they may be asked to "remotely brick network cards." With programs like Berserkr they would implant "persistent backdoors" and "parasitic drivers". Using another piece of software called Barnfire, they would "erase the BIOS on a brand of servers that act as a backbone to many rival governments.
http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html
http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409-2.html

Also, if you have the time check those pdf links the site provides. Spooky! :o

Ps.Jacob Appelbaum is linked to Wikileaks.
http://en.wikipedia.org/wiki/Jacob_Appelbaum
"Battle not with monsters, lest ye become a monster, and if you gaze into the abyss, the abyss gazes also into you."