|
Sentry Eagle, the National Initiative Protection Program, is a compartmented program of the National Security Agency's Central Security Service (CSS) and the US Strategic Command Joint Functional Component Command - Network Warfare (JFCC-NW). Its existence was revealed during the 2013 global surveillance disclosure by Edward Snowden. The program's efforts to protect America's cyberspace includes efforts to plan, synchronize, and attack an adversary's cyberspace through Computer Network Attack (CNA). The combination of those efforts are referred to as NSA/CSS's and JFCC-NW's core Computer Network Operations (CNO). The CNO capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). Sentry Eagle includes six sub-programs: * Sentry Hawk (for activities involving computer network exploitation, or spying) * Sentry Falcon (computer network defense) * Sentry Osprey (cooperation with the CIA and other intelligence agencies) * Sentry Raven (breaking encryption systems) * Sentry Condor (computer network operations and attacks) * Sentry Owl (collaborations with private companies) == Sentry Hawk == The Sentry Hawk program is a computer network exploitation program involving the CIA and FBI. The program attempts to exploit computers, computer peripherals, computer-controlled devices, computer networks or facilities housing them, and publicly accessible computing and networking infrastructure. Targets include specific firewalls, operating systems, and software applications. The program operates with the benefit of partnerships with US commercial sector companies. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Sentry Eagle」の詳細全文を読む スポンサード リンク
|