05:53 GMT +3 hours25 August 2016
Live
Military & Intelligence

Leaked Documents Reveal NSA’s Computer Network Attack System: Reports

Military & Intelligence
Get short URL
09510

The National Security Agency (NSA) has been infiltrating foreign networks to acquire sensitive data using a system code-named SENTRY EAGLE, The Intercept reported Saturday.

MOSCOW, October 11 (RIA Novosti) - The National Security Agency (NSA) has been infiltrating foreign networks to acquire sensitive data using a system code-named SENTRY EAGLE, The Intercept reported Saturday.

“The facts contained in this program [SENTRY EAGLE] constitute a combination of the greatest number of highly sensitive facts related to the NSA/CSS’s [Central Security Service] overall cryptologic mission,” one of the leaked documents obtained by The Intercept stated.

“Individuals briefed into the SENTRY EAGLE may not share information regarding this program with those not read into this program, or foreign nationals, including those with whom NSA/CSS has a Second and Third Party relationships,” the document also stated warning that revealing any of the “core secrets” would jeopardize the national security of the US.

According to Intercept, the NSA has also had agents in China, Germany, South Korea and in American firms, possibly impersonating employees or businessmen.

One of the programs in SENTRY EAGLE called the HUMINI, a human intelligence asset, has the ability to intercept communications and electronic signals. The programs can also weaken encryption systems.

The documents were leaked by the NSA whistleblower Edward Snowden and do not contain identity numbers or name of government officials who would know about the classified programs.

The Snowden archives indicate that the NSA’s activities have been ongoing as recently as 2012 despite the document being dated 2004. The sensitive information acquired follows an NSA/CSS framework from information released to the public colored green to information only released to selected government individuals marked in black.

Tags:
cyber attack, cyber espionage, National Security Agency (NSA), South Korea
Community standardsDiscussion
Comment via FacebookComment via Sputnik
  • Сomment