Sentry Eagle
Sentry Eagle, the National Initiative Protection Program, is a compartmented program of the National Security Agency's Central Security Service and the US Strategic Command Joint Functional Component Command - Network Warfare. Its existence was revealed during the 2013 global surveillance disclosure by Edward Snowden.
The program's efforts to protect America's cyberspace includes efforts to plan, synchronize, and attack an adversary's cyberspace through Computer Network Attack. The combination of those efforts are referred to as NSA/CSS's and JFCC-NW's core Computer Network Operations.
The CNO capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack.
Sentry Eagle includes six sub-programs:
- Sentry Hawk
- Sentry Falcon
- Sentry Osprey
- Sentry Raven
- Sentry Condor
- Sentry Owl
Sentry Hawk
The Sentry Hawk program is a computer network exploitation program involving the CIA and FBI. The program attempts to exploit computers, computer peripherals, computer-controlled devices, computer networks or facilities housing them, and publicly accessible computing and networking infrastructure. Targets include specific firewalls, operating systems, and software applications. The program operates with the benefit of partnerships with US commercial sector companies.Sentry Falcon
The Sentry Falcon program is a computer network defense program focused on attack attribution.Sentry Osprey
The Sentry Osprey program is a collaborative program with the CIA and the National Clandestine Service, FBI, and the Defense Clandestine Service of the Defense Intelligence Agency to perform Target Exploitation of foreign communication infrastructure.Sentry Raven
The Sentry Raven program involves secret efforts to weaken commercial encryption systems and software in order to make them exploitable for SIGINT. The cryptosystems targeted include systems used by the US private sector and developed by US companies.Sentry Raven involves the use of super computers and special purpose cryptanalytic hardware and software to break foreign ciphers. It also involves the spending of hundreds of millions of dollars on special purpose computer systems to attack US commercial encryption systems, including the exploitation of weaknesses places in them by cooperating companies or undercover agents within US companies.