{"id":150025,"date":"2014-10-11T01:06:00","date_gmt":"2014-10-11T05:06:00","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-may-have-undercover-operatives-in-foreign-companies.php"},"modified":"2014-10-11T01:06:00","modified_gmt":"2014-10-11T05:06:00","slug":"nsa-may-have-undercover-operatives-in-foreign-companies","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-may-have-undercover-operatives-in-foreign-companies.php","title":{"rendered":"NSA May Have Undercover Operatives in Foreign Companies"},"content":{"rendered":"<p><p>    As a much-anticipated documentary    about NSA whistleblower Edward Snowden premiers in New York    this evening, new revelations are being published    simultaneously that expose more information about the NSAs    work to compromise computer networks and devices.  <\/p>\n<p>    Newly-brought-to-light documents    leaked by Snowden discuss operations by the NSA working inside    China, Germany and South Korea to help physically subvert and    compromise foreign networks and equipment, according to        a report published by The Intercept. They also suggest the    NSA may have undercover agents planted inside companies to    provide assistance in gaining access to systems in the global    communications industry. And they bolster previous reports that    the NSA works with U.S. and foreign companies to weaken their    encryption systems.  <\/p>\n<p>    The new report is written by Peter    Maass and Laura Poitras. Poitras is the celebrated documentary    filmmaker who Snowden contacted in 2013 to provide her with a    trove of NSA documents and who has interviewed him in Hong Kong    and Moscow for her film CitizenFour.  <\/p>\n<p>    Among the new documents, which are    seen in the film, is a 13-page brief dating from 2004 about    Sentry Eagle, a term the NSA used to describe a collection of    closely held programs whose details were so tightly controlled    that, according to the document, they could be disclosed only    to a limited number of people approved by senior intelligence    officials.  <\/p>\n<p>    Unauthorized disclosure . . .will    cause exceptionally grave damage to U.S. national security,    the document states. The loss of this information could    critically compromise highly sensitive cryptologic U.S. and    foreign relationships, multi-year past and future NSA    investments, and the ability to exploit foreign adversary    cyberspace while protecting U.S. cyberspace.  <\/p>\n<p>    The brief reveals new details    about six categories of NSA operations that fall under the    Sentry Eagle rubric. These are also known as the NSAs core    secrets and are identified as:  <\/p>\n<p>    Sentry Hawkwhich    involves computer network exploitation (aka CNE), the    governments term for digital espionage. (For example, programs    like Flame would fall    into this category.)  <\/p>\n<p>    Sentry    Falconwhich involves computer network defense.  <\/p>\n<p>    Sentry    Ospreywhich appears to involve overseeing NSA    clandestine operations conducted in conjunction with the CIA,    FBI, the Defense Intelligence Agency and Army intelligence.    These operations involve human intelligence assets, or HUMINT    assets (Target ExploitationTAREX) to support signals    intelligence (SIGINT) operations.  <\/p>\n<p>    This is one of the biggest reveals    of the report. Apparently, under Sentry Osprey, people    responsible for target exploitation operations are embedded in    operations conducted by the CIA, Defense Intelligence Agency,    and FBI to provide technical expertise these agencies lack.    This would include covert or clandestine field activities as    well as interception, or interdiction of devices in the    supply chain to modify equipment or implant bugs or beacons in    hardware. The TAREX group specializes in physical    subversionthat is, subversion through physical access to a    device or facility, rather than by implanting spyware remotely    over the internet. The report doesnt indicate if the kinds of    modifications made to equipment involve sabotage, but its    possible the alterations made could include planting logic    bombs in software to destroy data or equipment, as     the Stuxnet worm did in Iran.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/3f57a244\/sc\/21\/l\/0M0Swired0N0C20A140C10A0Cnsa0Emay0Eundercover0Eoperatives0Eforeign0Ecompanies0Enew0Edocuments0Eshow0C\/story01.htm\/RK=0\/RS=RqtqyvYW.PGgKh_77fMBLrC5hQs-\" title=\"NSA May Have Undercover Operatives in Foreign Companies\">NSA May Have Undercover Operatives in Foreign Companies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> As a much-anticipated documentary about NSA whistleblower Edward Snowden premiers in New York this evening, new revelations are being published simultaneously that expose more information about the NSAs work to compromise computer networks and devices.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-may-have-undercover-operatives-in-foreign-companies.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-150025","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/150025"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=150025"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/150025\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=150025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=150025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=150025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}