Sentry Eagle

Sentry Eagle, the National Initiative Protection Program, is a compartmented program of the National Security Agency's Central Security Service (CSS) and the US Strategic Command Joint Functional Component Command - Network Warfare (JFCC-NW).[1] Its existence was revealed during the 2013 global surveillance disclosure by Edward Snowden.

The program's efforts to protect America's cyberspace includes efforts to plan, synchronize, and attack an adversary's cyberspace through Computer Network Attack (CNA). The combination of those efforts are referred to as NSA/CSS's and JFCC-NW's core Computer Network Operations (CNO).

The CNO capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA).

Sentry Eagle includes six sub-programs:

Sentry Hawk

The Sentry Hawk program is a computer network exploitation program involving the CIA and FBI. The program attempts to exploit computers, computer peripherals, computer-controlled devices, computer networks or facilities housing them, and publicly accessible computing and networking infrastructure. Targets include specific firewalls, operating systems, and software applications. The program operates with the benefit of partnerships with US commercial sector companies.

Sentry Falcon

The Sentry Falcon program is a computer network defense program focused on attack attribution.

Sentry Osprey

The Sentry Osprey program is a collaborative program with the CIA and the National Clandestine Service (NCS), FBI, and the Defense Clandestine Service of the Defense Intelligence Agency to perform Target Exploitation (TAREX) of foreign communication infrastructure.

Sentry Raven

The Sentry Raven program involves secret efforts to weaken commercial encryption systems and software in order to make them exploitable for SIGINT. The cryptosystems targeted include systems used by the US private sector and developed by US companies.

Sentry Raven involves the use of super computers and special purpose cryptanalytic hardware and software to break foreign ciphers. It also involves the spending of hundreds of millions of dollars on special purpose computer systems to attack US commercial encryption systems, including the exploitation of weaknesses places in them by cooperating companies or undercover agents within US companies.

Sentry Condor

The Sentry Condor program involves the provision of cyber target identification and recognition material and tools and techniques that allow computer network attack on those targets.

Sentry Owl

The Sentry Owl program involves the use of US industry personnel, or undercover NSA personnel at US and foreign employers, to enable SIGINT operations on US and foreign commercial communications products. The program includes contracts with US and foreign commercial entities to subvert the privacy features of their products for both foreign and domestic consumers (for both content and metadata).

See also

References

  1. Maass, Poitras. "Core Secrets: NSA Saboteurs in China and Germany". The Intercept. Retrieved 11 October 2014.
This article is issued from Wikipedia - version of the Monday, February 22, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.