{"id":150826,"date":"2014-10-14T23:13:29","date_gmt":"2014-10-15T03:13:29","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-sentry-eagle-placed-spies-in-private-companies.php"},"modified":"2014-10-14T23:13:29","modified_gmt":"2014-10-15T03:13:29","slug":"nsa-sentry-eagle-placed-spies-in-private-companies","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-sentry-eagle-placed-spies-in-private-companies.php","title":{"rendered":"NSA Sentry Eagle placed spies in private companies"},"content":{"rendered":"<p><p>        Top 5 reasons to deploy VMware with Tegile  <\/p>\n<p>    The National Security Agency (NSA) has since 2004 sent spies    into private companies in a bid to compromise networks from    within, according to documents leaked by Edward Snowden.  <\/p>\n<p>    Agents sent in by the NSA targeted global communications firms    under a highly classified 'core secrets' program dubbed Sentry    Eagle previously known only to a handful of officials.  <\/p>\n<p>    The     documents published by Snowden mouthpiece The    Intercept indicate operatives in the core secrets program    worked in concert with companies to weaken encryption and spent    hundreds of millions of dollars to break security mechanisms.  <\/p>\n<p>    Draft documents published online detailing Sentry Eagle explain    that the program used the \"full capabilities\" of signals    intelligence (SIGINT), computer exploitation, defence and    network warfare to ensure the protection of US cyberspace.  <\/p>\n<p>    The document listed facts ranging from unclassified to top    secret necessitating \"extraordinary protection\", and    demonstrated the chasm between unclassified information the NSA    saw fit for public consumption and that appearing at times too    sensitive for the eyes of allies.  <\/p>\n<p>    Programs in the latter camp include an effort dubbed Raven    which, according to unclassified information, reveal that the    NSA \"exploits foreign ciphers\", and also worked with US    commercial companies to weaken encryption systems.  <\/p>\n<p>    Publication of the \"facts relating to NSA personnel (under    cover), operational meetings, specific operations, specific    technologies, specific locations and covert communications    related to SIGINT\" were all banned under these efforts.  <\/p>\n<p>    A sentry program called Owl proved the NSA worked with US and    foreign commercial companies and \"partners\" to make their    products exploitable for SIGINT; Hawk detailed network    exploitation; Raven on cracking encryption; Condor on network    attacks; Falcon on defense, and Osprey on intelligence agency    cooperation.  <\/p>\n<p>    The documents revealed field agents working under the Osprey    program for target exploitation (TAREX) alongside the CIA, FBI    and the Pentagon. These personnel dabbled in clandestine 'off    net' operations, intercepting and compromising a targets'    assets through the supply chain.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/10\/14\/nsa_sentry_eagle_placed_spies_in_private_companies\" title=\"NSA Sentry Eagle placed spies in private companies\">NSA Sentry Eagle placed spies in private companies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Top 5 reasons to deploy VMware with Tegile The National Security Agency (NSA) has since 2004 sent spies into private companies in a bid to compromise networks from within, according to documents leaked by Edward Snowden. Agents sent in by the NSA targeted global communications firms under a highly classified 'core secrets' program dubbed Sentry Eagle previously known only to a handful of officials.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-sentry-eagle-placed-spies-in-private-companies.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-150826","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/150826"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=150826"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/150826\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=150826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=150826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=150826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}