Leak suggests NSA used secret agents to infiltrate networks

By

Sentry Eagle program conducted in cooperation with industry.

Classified documents leaked by former United States National Security Agency (NSA) contractor Edward Snowden purport to show that the United States and its 'Five Eyes' allies embed field agents in the technology sector to compromise communications networks across the globe.

Leak suggests NSA used secret agents to infiltrate networks
Edward Snowden.

Leaked documents published by The Intercept this weekend detail several activities under the top-secret Sentry Eagle umbrella program for access to physical communications infrastructure.

The new leaks suggest that the NSA has gone beyond passive surveillance through wiretaps and backdoors in hardware, and is now using secret agents working as full-time employees within communications companies.

A target exploitation (TAREX) guide included in the leak lists South Korea, Germany and China as countries where the NSA had deployed personnel. Whether or not the agents are active today is not clear from the documents made available.

Among the NSA programs are "Off-Net Operations" which is defined as referring to "covert or clandestine field activities of personnel carried out in support of CNE [Computer Network Exploitation] activities.

The documents also provide greater detail about supply-chain interdiction activities, in which the NSA plants backdoors into network equipment from large vendors such as Cisco and Juniper.

The NSA also appears to have had the cooperation of unspecified industry players.

The Sentry Eagle document was deemed as highly sensitive by the NSA. Some documents are marked "TOP SECRET//SI/REL TO USA, FVEY" with the latter abbreviation meaning they would be shared with countries in the so-called 'Five Eyes' partnership that includes Australia, New Zealand, the UK and Canada.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

Log In

  |  Forgot your password?