NSA â€¦ Hacking Adversaries Since 1997 | NoVA Infosec
Jared Sperli stashed this in cyber
For those history buffs out there the National Security Agency (NSA) has recently released a trove of declassified documents, many pertaining to their development of cyber offensive capabilities as early as 1997. Obviously, donâ€™t expect to learn anything super-secret here but the 98 documents do provide some context of where they came from and what to expect going forward. From a GWU.edu article the highlights include the following.
- The NSAâ€™s earlier concerns about the vulnerability of sensitive computer systems to either viruses or compromise through foreign intelligence service recruitment of computer personnel (Document 1, Document 2, Document 3, Document 4, Document 9)
- The Secretary of Defenseâ€™s March 1997 authorization of the National Security Agency to conduct computer network attack operations (Document 11)
- Detailed discussions of Chinese computer network exploitation activities (Document 66, Document 79, Document 83)
- Analyses of the Stuxnet worm (Document 40, Document 42, Document 44, Document 88)
- Extensive treatments of intelligence collection concerning U.S. technologies through computer network exploitation (Document 18, Document 55, Document 63)
Head on over to the GWU article below for much more detail and links to PDFs.
Since at least 1997, the National Security Agency (NSA) has been responsible for developing ways to attack hostile computer networks as part of the growing field of Information Warfare (IW), according to a recently declassified internal NSA publication posted today by the non-governmental National Security Archive (â€śthe Archiveâ€ť) at The George Washington University. Declaring that â€śthe future of warfare is warfare in cyberspace,â€ť a former NSA official describes the new activity as â€śsure to be a catalyst for major changeâ€ť at the super-secret agency.
The document is one of 98 items the Archive is posting today that provide wide-ranging background on the nature and scope of U.S. cyber activities.
Activities in cyberspace â€” both defensive and offensive â€” have become a subject of increasing media and government attention over the last decade, although usually the focus has been on foreign attacks against the United States, most notably the Chinese governmentâ€™s reported exploitation of U.S. government, commercial and media computer networks. At the same time, the apparent U.S.-Israeli created Stuxnet worm, designed to damage Iranian centrifuges, has put the spotlight on the United Statesâ€™ own clandestine cyber efforts.
Filing this under "It's worse than you think."
Is it standard practice to declassify after 15 years? These things still seem better kept under wraps...
You would release them either to exaggerate a capability, fire a warning shot, or a show of defensive strength.Â Â I recall Dr. Strangelove, what good is a doomsday device if nobody knows about it?
Ah. It's like in Kill Bill: "I want him to know I want him to know."
I like how NSA monitors the 75% of the occidental web since these 75% are from the USA. I've seen a really interesting documentary about how they spied all the internet flux going to California, just by plugging a little system on the main network cable, and how they added a fake wall to hide the system in the network node room. Sadly, I've forgotten the name of the doc and its author.Â
is IS worse than you think.....Â
And yet, even watching everything, the Boston marathon bombing still happened.