The National Security Agency (NSA) reached such a wide range of its Surveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.
This hell parameter of the NSA’s operation was not reached by its agents sitting in the NSA headquarter in United States, but by its undercover agents working in foreign companies based in China, Germany, and South Korea to infiltrate and compromise foreign networks and devices, according to documents obtained by The Intercept.
For the sake of information infiltration and gaining access to systems of critical significance, the NSA has been utilizing the “physical subversion” tactic- i.e , planting secret agents in German, Chinese, South Korean and even American companies.The document describes the details regarding various field activities involving computer network attacks – information which is held among the NSA’s so-called “core secrets” in a system code-named Sentry Eagle. The document is dated 2004, although there’s no reason to believe that the NSA has changed its behavior since then.
REVELATION OF VARIOUS PROGRAMS
According to the latest document, NSA describes six different programs under its “core secrets,” all of which are categorized under the “Sentry Eagle” and some of which were ongoing as of year 2012. The programs are composed of the following:
- Sentry Hawk – involves cooperation between the NSA as well as foreign and domestic companies in order to exploit computer networks.
- Sentry Falcon – includes the defense of computer networks.
- Sentry Osprey – involves the NSA cooperating with the CIA, FBI and Pentagon to hire human agents that can help give the agency access to networks.
- Sentry Raven – describes the NSA’s negotiations with American companies to weaken their encryption in order to give the agency easier access.
- Sentry Condor – includes offensive network attacks that can destroy or weaken computer systems.
- Sentry Owl – involves the NSA working with foreign companies to make their products susceptible to NSA data gathering.
The document clearly states that any disclosure of the “secrets” can cause “exceptionally grave damage to US national security” and should not be done without an authorization from a senior intelligence official.
When approached the NSA, it refused to clarify details about the disclosed documents to The Intercept, releasing a statement stating, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.” At the same time, the agency said it “takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.
Latest posts by Unallocated Author (see all)
- Tips How To Recover Deleted Files on Windows PC Free and Easily - October 8, 2018
- iKeyMonitor Android Tracking App Review - September 4, 2018
- “Open Sesame” Vulnerability That Let Users Hack Windows 10 Was Demonstrated at Black Hat Conference - August 12, 2018