Home Hacking NSA Used ‘Undercover Agents’ In Foreign Companies – Core Secrets

NSA Used ‘Undercover Agents’ In Foreign Companies – Core Secrets

4 min read
0
0

NSA Used ‘Undercover Agents’ In Foreign Companies – Core Secrets

The National Security Agency (NSA) reached such a wide range of its Surveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.

This hell parameter of the NSA’s operation was not reached by its agents sitting in the NSA headquarter in United States, but by its undercover agents working in foreign companies based in China, Germany, and South Korea to infiltrate and compromise foreign networks and devices, according to documents obtained by The Intercept.

For the sake of information infiltration and gaining access to systems of critical significance, the NSA has been utilizing the “physical subversion” tactic- i.e , planting secret agents in German, Chinese, South Korean and even American companies.The document describes the details regarding various field activities involving computer network attacks – information which is held among the NSA’s so-called “core secrets” in a system code-named Sentry Eagle. The document is dated 2004, although there’s no reason to believe that the NSA has changed its behavior since then.

core-secrets-nsa-agency-planted-secret-agents-foreign-companies

REVELATION OF VARIOUS PROGRAMS

According to the latest document, NSA describes six different programs under its “core secrets,” all of which are categorized under the “Sentry Eagle” and some of which were ongoing as of year 2012. The programs are composed of the following:

  • Sentry Hawk – involves cooperation between the NSA as well as foreign and domestic companies in order to exploit computer networks.
  • Sentry Falcon – includes the defense of computer networks.
  • Sentry Osprey – involves the NSA cooperating with the CIA, FBI and Pentagon to hire human agents that can help give the agency access to networks.
  • Sentry Raven – describes the NSA’s negotiations with American companies to weaken their encryption in order to give the agency easier access.
  • Sentry Condor – includes offensive network attacks that can destroy or weaken computer systems.
  • Sentry Owl – involves the NSA working with foreign companies to make their products susceptible to NSA data gathering.

The document clearly states that any disclosure of the “secrets” can cause “exceptionally grave damage to US national security” and should not be done without an authorization from a senior intelligence official.

Load More Related Articles
Load More In Hacking

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

New Cold Boot Attacks Can Evade Current Mitigations

New Cold Boot Attacks Can Evade Current Mitigations Many people tend to put laptops to ‘Sl…