The massive digital espionage campaign being conducted by the NSA (National Security Agency) has just been up-scaled by the recalibration of Project Politerain. Project Politerain is operated by TAO (Tailored Access Operations), a department within NSA specially tasked with breaching computer and network systems. The department operates as a Remote Operations Center (ROC), whose unique codename is S321.
NSA is recruiting hackers who could perform special tasks which involve use of remote means to damage computers systems of opponents, manipulate network access cards, destroy hard drive functionalities, implant parasitic drivers and persistent backdoors into targeted computer systems; and when necessary, erase the BIOS of specific servers which form the backbone of communication channels of an adversarial government .
The dual aims of NSA data espionage campaign are to achieve firm internet mass surveillance and absolute superiority within the domain of cyber warfare. To achieve both, NSA has rallied the other four members (Canada, United Kingdom, New Zealand and Australia) of the Five Eyes alliance in a non-conventional coalition to build high-grade digital weapons.
With the internet being firmly integrated into existing and emerging critical infrastructure (financial systems, power systems, water systems, airports and strategic industries), it is possible to compromise entire infrastructure systems by paralyzing specific internet and computer networks.
Guerrilla information warfare.
The advent of Fourth generation warfare and the rapid evolution of the internet have led to the emergence of sophisticated guerrilla information warfare. Guerrilla information warfare incorporates elements of cyber warfare and controlled release of information. This form of warfare is used to potentiate insurgencies, terrorism and rebellion. NSA and other intelligence agencies counter this form of warfare by use of denial of service attacks.
Phases of progression.
The digital war strategy of the US considers internet surveillance as Phase 0 of a multipronged systematic strategy. As such, internet surveillance is a prerequisite for the subsequent phases. Internet surveillance can detect vulnerabilities in the computer networks and communication channels of enemy systems. Exploitation of these vulnerabilities form Phase 1 of the strategy.
Phase 2 involves embedding stealthy implants in enemy systems in order to infiltrate them and also achieve permanent access to those systems. Phases 3 involves freely dominating and controlling the targeted critical networked systems through pre-positioned accesses, and if necessary destroy such systems either partly or completely.
This aforementioned strategy would enable the US Cyber Command achieve real-time controlled escalation, a vital strategic advantage in dynamic cyberspace operations and network warfare.
Malwares.
It is an established fact that sophisticated malwares have been used to compromise networked systems of various nations. The most prominent of such malwares are Stuxnet, Duqu, Flame, Regin and Straitbizarre. These malwares have been used to conduct internet surveillance, infiltrate network systems and provide complete remote access to such systems. Some malware have hardcoded functionalities to either act as logic bombs or destroy systems on command.
Intelligence reports reveal that malware success rates are variable. The malware Quantuminsert had such a low success rate that it was replaced by Quantumdirk, a payload which infects online chat services such as those provided by Yahoo and Facebook. A highly successful malware reveals a steady advancement from the original rudimentary malware; and such upgrading requires skills, time, and unconventional resources. Of special interest among these malwares is Straitbizarre, a malware which incorporates the infected computer into the Quantum network (operated by the NSA) as a disposable non-attributable shooter node . The Quantum network is an active multitier network exploitation and attack grid which uses shooter nodes to relay command and control instructions to target systems. Mobile phones were also breached through Safari browser vulnerabilities.
Offline effects.
Digital weapons have an absolute potential to destroy systems not connected to the internet and also deprive a target population of critical services such as electricity, air transport and health services. For this reason, most intelligence agencies adopt plausible deniability to shield themselves from repercussions. To do so, they erase the digital trail of the malware author or the node of the initial attack.
Global network dominance requires effective cyber protection and counter intelligence. In NSA, Department S31177 (whose codename is Transgression) is tasked with tracing, observing and analyzing foreign cyber-attacks and also siphoning information from other intelligence agencies.




























