Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies


Crypto

Recommended Posts

 
Core-Secrets-NSA.jpg
Sometimes we wonder that how the National Security Agency (NSAreached such a wide range of itsSurveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.
 
This hell parameter of the NSA’s operation was not reached by its agents sitting in the NSA headquarter in United States, but by its undercover agents working in foreign companies based in China, Germany, and South Korea to infiltrate and compromise foreign networks and devices, according to documents obtained byThe Intercept.
 
NSA INTERCEPTING FOREIGN NETWORKS AND DATA CENTRES
The latest document from the Snowden’s desk talks about a program called “physical subversion,†under which the NSA’s undercover operatives were infiltrating foreign networks to acquire sensitive data and access to systems in the global communications industry and possibly even some American firms.
 
 

The document describes the details regarding various field activities involving computer network attacks – information which is held among the NSA’s so-called “core secrets†in a system code-named Sentry Eagle. The document is dated 2004, although there's no reason to believe that the NSA has changed its behavior since then.
 
Previous documents largely focused on U.S. companies providing the agency with vast amounts of customer data, including phone records and email traffic and also revealed the NSA’s operations to hack into other systems or to work with private corporations in an effort to weaken their own encryption systems, but the latest report suggests the agency could be embedding operatives into foreign, as well as domestic, “commercial entities.†But, it’s unclear whether these “commercial entities†are American or foreign or both.
 
REVELATION OF VARIOUS PROGRAMS
According to the latest document, NSA describes six different programs under its “core secrets,†all of which are categorized under the “Sentry Eagle†and some of which were ongoing as of year 2012. The programs are composed of the following:
 
  • Sentry Hawk - involves cooperation between the NSA as well as foreign and domestic companies in order to exploit computer networks.
  • Sentry Falcon - includes the defense of computer networks.
  • Sentry Osprey - involves the NSA cooperating with the CIA, FBI and Pentagon to hire human agents that can help give the agency access to networks.
  • Sentry Raven - describes the NSA’s negotiations with American companies to weaken their encryption in order to give the agency easier access.
  • Sentry Condor - includes offensive network attacks that can destroy or weaken computer systems.
  • Sentry Owl - involves the NSA working with foreign companies to make their products susceptible to NSA data gathering.
The document clearly states that any disclosure of the “secrets†can cause “exceptionally grave damage to US national security†and should not be done without an authorization from a senior intelligence official.
 
One of the important programs in Sentry Eagle under the codename Sentry Osprey is “HUMINT,†a human intelligence asset that has the ability to conduct Signals intelligence operations (SIGINT), which involve the interception of communications and electronic signals. Both foreign as well as domestic companies could be targeted.
 
This program is labeled as TAREX which, according to a 2012 classification guide, “conducts worldwide clandestine Signals Intelligence (SIGINT) close-access operations and overt and clandestine Human Intelligence (HUMINT) operations.†The program reportedly has a presence in South Korea, Germany, and China, with a domestic presence in Georgia, Hawaii, and Texas.
 
NSA REFUSED TO COMMENT
For its part, the NSA declined to clarify details to The Intercept. It released a statement saying, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.†At the same time, the agency said it “takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.â€
 
When approached the NSA, it refused to clarify details about the disclosed documents to The Intercept, releasing a statement stating, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.†At the same time, the agency said it “takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.â€
 
                          Add Rep and Leave a feedback
                      Reputation is the green button in the down right corner on my post

 

  • Upvote 1

do you understand            if you having fun?                  it's a rising sun                           it's a man killing                              what's that feelin'

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...