SENTRY EAGLE: NSA’s “Core Secrets” Re: Covert Activities Inside Companies; Access Sensitive Data, Compromise Networks, Subvert Encryption

Meet Sentry Eagle, the NSA program to spy inside your encryption.

LeakSource

nsa-sentry-eagle-1

10/10/2014

Peter Maass/Laura Poitras/TheIntercept:

The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept.

The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.

Previous disclosures about the NSA’s corporate partnerships have focused largely on U.S. companies providing the agency with vast amounts of customer data, including phone…

View original post 1,795 more words

Advertisements


Categories: Hackers

1 reply

  1. Fantastic article,always like your posts

    Like

Well, tell us what you think!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: