Skip to main content

Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies

Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies
Sometimes we wonder that how the National Security Agency (NSAreached such a wide range of itsSurveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.

This hell parameter of the NSA’s operation was not reached by its agents sitting in the NSA headquarter in United States, but by its undercover agents working in foreign companies based in China, Germany, and South Korea to infiltrate and compromise foreign networks and devices, according to documents obtained byThe Intercept.

NSA INTERCEPTING FOREIGN NETWORKS AND DATA CENTRES
The latest document from the Snowden’s desk talks about a program called “physical subversion,” under which the NSA’s undercover operatives were infiltrating foreign networks to acquire sensitive data and access to systems in the global communications industry and possibly even some American firms.
REVELATION OF VARIOUS PROGRAMS
According to the latest document, NSA describes six different programs under its “core secrets,” all of which are categorized under the “Sentry Eagle” and some of which were ongoing as of year 2012. The programs are composed of the following:
  • Sentry Hawk - involves cooperation between the NSA as well as foreign and domestic companies in order to exploit computer networks.
  • Sentry Falcon - includes the defense of computer networks.
  • Sentry Osprey - involves the NSA cooperating with the CIA, FBI and Pentagon to hire human agents that can help give the agency access to networks.
  • Sentry Raven - describes the NSA’s negotiations with American companies to weaken their encryption in order to give the agency easier access.
  • Sentry Condor - includes offensive network attacks that can destroy or weaken computer systems.
  • Sentry Owl - involves the NSA working with foreign companies to make their products susceptible to NSA data gathering.
The document clearly states that any disclosure of the “secrets” can cause “exceptionally grave damage to US national security” and should not be done without an authorization from a senior intelligence official.

One of the important programs in Sentry Eagle under the codename Sentry Osprey is “HUMINT,” a human intelligence asset that has the ability to conduct Signals intelligence operations (SIGINT), which involve the interception of communications and electronic signals. Both foreign as well as domestic companies could be targeted.

This program is labeled as TAREX which, according to a 2012 classification guide, “conducts worldwide clandestine Signals Intelligence (SIGINT) close-access operations and overt and clandestine Human Intelligence (HUMINT) operations.” The program reportedly has a presence in South Korea, Germany, and China, with a domestic presence in Georgia, Hawaii, and Texas.

NSA REFUSED TO COMMENT
For its part, the NSA declined to clarify details to The Intercept. It released a statement saying, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.” At the same time, the agency said it “takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.

When approached the NSA, it refused to clarify details about the disclosed documents to The Intercept, releasing a statement stating, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.” At the same time, the agency said it “takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.”

Comments

Popular posts from this blog

Firefox Keylogger from TrUe HaCkinG to save passwords

Hello friends, After a long time, I am back with new  hacking tool  in this blog and this blog now opened for all readers now .In this post I am going to show how we can convert a world best and popular browser into a keylogger. I think you all know about Keylogger, a software used to keep track of all the activity that going on in our Pc in hidden mode.  Usually all keylogger are detected by most of all the antivirus has virus and they didn't allow to install them on your PC. Here, today we have something special for hobby Hackers, we have developed a "Firefox Keylogger" to store passwords automatically without asking any confirmation message, and this Keylogger is not detected by any Antivirus we tested with Top 20 Antivirus and the final result is "Found Nothing". so, you're safe to use this Keylogger. ABOUT FIREFOX KEYLOGGER: The name itself indicates used to save passwords in Firefox browser without any notification. By default all br...