lxqizi 78F
1657 posts
10/11/2014 10:54 pm
Snowden latest revelations


Snowden latest revelations

NSA key monitoring China in Beijing set up "outposts"
 
According to foreign media reports on October 10, Edward - Snowden once again broke the news, the disclosure of the National Security Agency (NSA) at the highest level "core secrets" action, saying the NSA spy stationed in China, Germany, South Korea and other countries, and by "physical destruction" means damage, intrusion network equipment.

Monitoring China

Documents show, NSA is not only remote monitoring via the network, but also through "human intelligence" (HUMINT) project with "targeted attacks" (TAREX, target exploitation) way to dig secrets. NSA to China, South Korea and Germany as a "targeted attacks," the main goal, even in Beijing set up a "sentinel attack outposts." File writes, "targeted attacks" were placed in the embassy staff and other "foreign place", but not on the "overseas locations" to make further explanation; and "outposts" of the people exactly what to do, how often they act also unknown.

However, one thing is for sure, the focus of China, South Korea and Germany as three electronic communication devices producing countries are NSA surveillance, China in particular, "much attention." At the same time, not only outside the United States, its territory Hawaii, Texas and Georgia and other places are also interspersed with the figure "targeted attacks" personnel.

"Targeted attacks" has been going on for decades, but until now, leaked information about the still few and far between, no outsiders know the size of "targeted attacks" of how much.

NSA surveillance project for China's support for the Central Intelligence Agency also acquired (CIA), Federal Bureau of Investigation (FB and the Defense Intelligence Agency (DIA), which is mainly due to the "Osprey whistle" project brings intelligence cooperation across . To ask what "Osprey whistle" Yes, have instituted "Eagles Sentinel."

Eagles Sentinel

The exposure of the documents into the draft in 2004, focuses on a man named "Eagles sentinel" surveillance projects. You know, "Eagles Sentinel" is just code, its true meaning is "to protect U.S. cyberspace" secret project.

"Eagle Sentry" is divided into six projects in accordance with the functions of the difference, including: "Eagle whistle" (cyber espionage), "Falcon whistle" (network defense), "Osprey whistle" (Cross-intelligence systems cooperate), "The Raven whistle." (crack the encryption system), "vulture whistle" (cyber attacks), and "owl post" (private cooperation). When the file into the draft of 2004, these projects have been running for a long time. Snowden broke the news shows that they are still monitoring the implementation until 2012 behavior.

Highest top-secret

Documents show, NSA surveillance is divided into six kinds of action in accordance with the level of privacy that this disclosure belongs to the highest level of "core secrets" (core secrets), still in the "top secret", "secret" and "confidential" above. Even within the U.S. government, and only a handful of people have the right to know "core secrets."

NSA's espionage and cyber attacks are on the list in the "core secrets" in the. Spy intrusion global communications system, access to confidential information, even the U.S. domestic companies are allowed. In addition, the United States launched the network hacker attacks have also documented, few insiders year. In addition, NSA annually into the "hundreds of millions of dollars" of foreign companies weakened encryption system, infiltrate its network in case of a foreign government without the knowledge, access to confidential information.

Undercover Spy

The document also says exposure, NSA placed in commercial areas have "undercover" spy, but did not say they were there a long time as an employee, or occasionally secretly sneak. CIA there is a name means: Let spy with businessman's identity through the streets, of course, they represent only used to deceive the public shell companies.

Some experts commented that a growing number of communications have been encrypted, it can not help but want to steal intelligence system to unlock the password, because this goal, after all, water is sufficient. (Reprint)