Today because of a secret program launched and managed by the infamous and controversial National Security Agency (NSA) of the United States, GHCQ from the United Kingdom and the collaboration of western European countries along with Israel, Australia and New Zealand, the military and political establishments have a way to conceal an effective cyber army of spies, an exclusive group of guerrillas that are part of the operation named Tailored Access Operations or CAT.
The troop members of these guerrillas are solely dedicated to conducting missions in cyber space to manipulate and destroy enemy computers and their hard drives and to discover ultimately how we all think and how we make use of technology on the world wide web. Cyber security is not what the establishment would have us believe it is. It is a war between them and us.
The program leaked by Edward Snowden was launched eight years ago and it made it possible for governments to manage and devise strategies for fighting on the Internet, to spy on everyone who uses cyber space and to cripple communications from and to civilians as well as competing cyber forces from foreign nations.
The existence of this program was discovered by former NSA consultant, Edward Snowden, who made public thousands of documents summarizing the work of the NSA. Many of those documents have been dumped by major media outlets, as well as independent reporters including Der Spiegel, The Guardian and journalists like Glenn Greenwald.
“The secret services are no longer only occupied with espionage. Edward Snowden documents show that they dominate Internet and are preparing for a major digital war. The weekly magazine reveals that digital spies are working in secret services that form the “Alliance of Five Eyes“, composed by the United Kingdom, Canada, New Zealand, the United States and Australia.
The documents held by Snowden reveal the NSA is aware that the next great global conflict will begin on the Internet, a certainty that convinced the agency to request a substantial increase in its budget to reinforce itseld and to carry out offensive operations on covers designed to invade enemy computer networks.
The documents state that one of the most successful attacks by the NSA was using the Stuxnet virus to cripple Iran‘s atomic program. Another tool developed by cyber warriors at the NSA was the Regin virus, with which it tried to infiltrate the computer network of the German Foreign Ministry. The virus was also used to spy on the European Commission.
The NSA and its allies have also used cyber attacks that they have allegedly suffered to demand more power and more resources to benefit their spying programs worldwide which continue to Steal it All, as its motto says.
The team of experts from the NSA failed to detect the IP address in Asia, a trail that eventually led them to find the start of the attack on China. The counterattack was swift and successful. The spies managed to discover the outcome of the Chinese attack, but also discovered that China was responsible for an attack suffered by the United Nations.
The core of the NSA spies work under a Senate Law 321 that deals with the Remote Operation Center located at Fort Meade in Maryland, which occupies the third floor of one of the main buildings of the complex. This spying body sweeps the internet and gathers all information possible 24 hours a day.
“The priority of the NSA are attacks and no defense” admitted Snowden in a recent interview, referring to the new strategy of the watchdog and when it can, ‘it attacks along with its allies from the group of the Five Eyes, all other countries that do not belong to that exclusive group of espionage, including Germany and Spain.