Knowledge

ANT catalog

Source đź“ť

42: 774: 744: 754: 764: 734: 3831: 177: 163: 2370:)) to the NSA Playset. Anyone is invited to join and contribute their own device. The requisites for an addition to the NSA Playset is a similar or already existing NSA ANT project, ease of use and a silly name (based on the original tool's name if possible). The silly name requisite is a rule that Michael Ossman himself came up with and an example is given on the project's website: "For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH." The ease of use part stems also from the NSA Playset's motto: "If a 10 year old can't do it, it doesn't count!" 828: 724: 804: 816: 1418:"A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted." 840: 1303: 1855: 1285: 2366:. Thus far, the NSA Playset consists of fourteen items, for which the code and instructions can be found online on the project's homepage. After the initial leak, Michael Ossman, the founder of Great Scott Gadgets, gave a shout out to other security researchers to start working on the tools mentioned in the catalog and to recreate them. The name NSA Playset came originally from Dean Pierce, who is also a contributor (TWILIGHTVEGETABLE( 2077: 2037: 2019: 1993: 1608: 1259: 871: 1670: 859: 2308: 2232: 2055: 1626: 1410: 1381: 1360: 2290: 2211: 2189: 2137: 2095: 1963: 1945: 1909: 1891: 1822: 1752: 1483: 784: 2272: 1692: 1644: 1590: 1446: 1321: 1234: 1804: 1726: 1553: 1501: 2250: 1927: 1778: 1527: 1339: 1873: 1572: 2155: 1428: 1128:
questioned how the program developed in later years, since the document was composed in the early period of the iPhone and smartphones in general. Dell denied collaborating with any government in general, including the US government. John Stewart, senior vice president and
1561:
Software implant for a JTAG bus device named FLUXBABBITT which is added to Dell PowerEdge servers during interdiction. GODSURGE installs an implant upon system boot-up using the FLUXBABBITT JTAG interface to the Xeon series
2357:
The NSA Playset is an open-source project inspired by the NSA ANT catalog to create more accessible and easy to use tools for security researchers. Most of the surveillance tools can be recreated with off-the-shelf or
974:. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as 2986: 2923: 1193:
that Appelbaum has not identified the source who leaked the ANT catalog to him, which led people to mistakenly assume it was Edward Snowden. Bamford got unrestricted access to the documents cache from
1917:
Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it.
2818: 1058:
and Judith Horchert, which was publicized on 29 December 2013. The related English publication on the same day about the TAO by Der Spiegel was also authored by the same people, and including
3082: 2780: 3992: 481: 3493: 3303: 3050: 4027: 3589: 1975:
signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most
1067: 1682:
transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely.
4161: 3155: 3368: 1078: 661: 3819: 527: 2852: 1145:
stated they would take appropriate audits to determine if any compromise had taken place and would communicate if so. NSA declined to comment on the publication by
863: 3432: 2577:
intended for experimentation. Intended use would be the implantation into a cable and data exfiltration based on radio reflectivity of the device.(FLAMENCOFLOCK (
1197:
and could not find any references to the ANT catalog using automated search tools, thereby concluding that the documents were not leaked by him. Security expert
2976: 446: 3018: 2884: 1513:
socket that allows data to be injected, or monitored and transmitted via radio technology. using the HOWLERMONKEY RF transceiver. It can for instance create a
651: 1048: 123: 2905: 3401: 3336: 998:
by hacking into computers and telecommunication networks. It has been speculated for years before that capabilities like those in the ANT catalog existed.
3207: 2802: 1275:, providing covert remote access to the target machine. COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. 4119: 3634: 3553: 1030: 628: 134: 3072: 2954: 773: 2762: 3229: 4305: 1293:
Can be deployed in a USB socket (rather than plug), and, but requires further integration in the target machine to turn into a deployed system.
1155:
wrote about the tools on his blog in a series titled "NSA Exploit of the Week". He stated that because of this, his website got blocked by the
3485: 3293: 3040: 2653:
The article from Der Spiegel notes that it is a "50-page document" and that "nearly 50 pages" are published. The gallery contains 49 pages.
1979:
ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the
4330: 4154: 3586: 995: 808: 925: 580: 3459: 1935:
Software that can collect mobile phone location data, call metadata, access the phone's microphone to eavesdrop on nearby conversations.
1983:
of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.
903: 623: 3261: 753: 844: 1137:
stated that they were "deeply concerned and will continue to pursue all avenues to determine if we need to address any new issues."
4358: 3839: 1491:
Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.
676: 509: 499: 3602: 743: 3627: 3358: 1833:
approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz
820: 671: 763: 733: 3169: 971: 461: 456: 4476: 1186: 4034: 2842: 1899:
Portable system that installs Microsoft Windows exploits from a distance of up to eight miles over a wireless connection.
1598:
GSM software that uses a phone's SIM card's API (SIM Toolkit or STK) to control the phone through remotely sent commands.
1209:
The published catalog pages were written between 2008 and 2009. The price of the items ranged from free up to $ 250,000.
1156: 747: 656: 320: 3424: 2317: 4471: 3749: 3620: 2605: 3008: 2874: 1072: 41: 4432: 3672: 3658: 542: 349: 1201:
has stated on his blog that he also believes the ANT catalog did not come from Snowden, but from a second leaker.
723: 4228: 3393: 3114: 777: 757: 423: 239: 17: 3326: 1178:
used by Snowden touched the ANT catalog and started looking for other people who could have leaked the catalog.
4390: 4221: 3756: 3197: 896: 832: 325: 217: 4249: 3742: 1765: 504: 359: 3549: 2539:
interface for software application persistence; named after GODSURGE. FLUXBABBIT is replaced by SOLDERPEEK.
2949: 2298:
A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phone.
1097: 1083: 787: 354: 2341:
could be seen as genuine because it matched with names from the ANT catalog. John Bumgarner has stated to
4404: 4397: 3735: 2944: 767: 737: 476: 315: 3577: 3515: 4466: 4263: 4020: 4006: 3721: 3679: 2721: 2172: 991: 951: 278: 70: 3239: 1738:. IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software 4073: 4013: 3728: 3700: 2615: 2547:
Portable system that enables wireless installation of Microsoft Windows exploits; covers NIGHTSTAND.
1510: 889: 3999: 3985: 3946: 3805: 3665: 3643: 2219: 1268: 933: 727: 167: 81: 53: 2145:
Keystroke monitor technology that can be used on remote computers that are not internet connected.
1580:
Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.
4411: 875: 562: 2262:
processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny.
2085:
BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.
1053: 783: 128: 4235: 3932: 3161: 1536: 1130: 666: 66: 4481: 3918: 3777: 3686: 3455: 2644:
Whether ANT stands for Advanced Network Technology or Access Network Technology is not known.
471: 176: 162: 4461: 4175: 3271: 3234: 3128: 2586: 2556: 2524: 2492: 2363: 2359: 1470: 1390: 979: 975: 694: 585: 3104: 2455:
wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over
8: 4291: 4277: 4207: 3862: 3798: 1350:
radar device that can "illuminate" a target system for recovery of "off net" information.
1117: 451: 411: 300: 234: 229: 181: 1841:
with 500,000 gates. It replaces the previous generation modules which were based on the
3953: 3890: 3791: 3331: 1709: 1190: 1112: 1104:, Germany. At the end of his talk, he encouraged NSA employees to leak more documents. 942:
in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of
532: 3327:"Hackers Have Allegedly Stolen NSA-Linked 'Cyber Weapons' and Are Auctioning Them Off" 2240:
Software that can be implanted on a Windows mobile phone allowing full remote control.
2045:
Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.
2027:
Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.
936:(NSA) of which the version written in 2008–2009 was published by German news magazine 4418: 3960: 3911: 3599: 3175: 3165: 2915: 2810: 2772: 2560: 2448: 2176: 1830: 1454: 4284: 4126: 4066: 3812: 3770: 3714: 3397: 3118: 2879: 2468: 1369: 1138: 1063: 557: 547: 310: 305: 212: 4439: 3939: 3904: 3876: 3855: 3606: 3593: 3581: 3151: 2758: 2571: 2512: 1739: 1713: 1540: 1347: 1272: 1022: 1018: 1014: 552: 207: 119: 3131: 3108: 4425: 4383: 4133: 3693: 3298: 3077: 2875:"We Now Know A Lot More About Edward Snowden's Epic Heist — And It's Troubling" 2847: 2610: 2590: 2574: 2338: 2198: 1653: 1198: 1194: 1152: 1091: 1002: 967: 815: 605: 3179: 1141:
stated that they were working actively to address any possible exploit paths.
4455: 4147: 4101: 3967: 3925: 3363: 3193: 2981: 2945:"Vortrag: To Protect And Infect, Part 2 - The militarization of the Internet" 2919: 2814: 2776: 2625: 2424: 2342: 1980: 1734:
Technology that can "infect" networks by installing itself in a computer I/O
1616:
User-configurable persistence implant for certain Juniper Networks firewalls.
1182: 1059: 1026: 254: 2977:"17 exploits the NSA uses to hack PCs, routers and servers for surveillance" 1436:
Tri-band active GSM base station with internal 802.11/GPS/handset capability
4270: 3869: 3848: 3612: 3489: 2666:
If the price is listed in bulk, a calculation is made to get the unit price
2120: 1700:
Technology that can infiltrate the firmware of hard drives manufactured by
1267:
Family of modified USB and Ethernet connectors that can be used to install
1010: 537: 391: 184:
as of 2007, with countries subject to the most data collection shown in red
2349:
is based on its own ability to add backdoors as shown in the ANT catalog.
1329:
GSM communications module capable of collecting and compressing voice data
4189: 4182: 3883: 3266: 2910: 2839: 2767: 2334: 1971:
A concealed device that taps the video signal from a target's computer's
1863:
Software that transmits a mobile phone's location by hidden text message.
1175: 1043: 1021:. In June 2013, Snowden took internal NSA documents which he shared with 1006: 938: 839: 595: 466: 108: 3359:"U.S. Suspicions of China's Huawei Based Partly on NSA's Own Spy Tricks" 2163:
Technology that can reflash the BIOS of multiprocessor systems that run
1107:
Apple denied the allegations that it collaborated on the development of
3707: 3013: 2388: 2064: 955: 929: 590: 249: 3073:"Dell, Cisco 'Deeply Concerned' Over NSA Backdoor Exploit Allegations" 2222:
implant for extracting call logs, contact lists and other information.
1953:
A joint NSA/GCHQ project to develop a radar system to replace CTX4000.
1302: 4337: 4298: 4168: 4059: 3897: 3784: 3123: 3045: 2578: 1854: 1791: 1787: 1397: 1284: 1124: 943: 827: 794: 646: 600: 401: 381: 295: 266: 244: 2076: 2036: 2018: 1992: 1607: 1258: 4323: 4242: 4214: 3763: 2515:
communication capability to software running on the host computer.
2408: 2280:
Network-in-a-box for a GSM network with signaling and call control.
2116: 2112: 2067:
system allowing it to be remotely controlled from NSA headquarters.
1786:
Firmware that can be implanted to create a permanent backdoor in a
1669: 1466: 1242: 954:
unit and are mostly targeted at products from US companies such as
699: 396: 344: 2307: 2231: 2054: 1625: 1409: 1380: 1359: 4365: 4344: 4140: 4094: 3202: 3041:"Apple denies any knowledge of NSA's iPhone surveillance implant" 2620: 2289: 2210: 2188: 2164: 2136: 2094: 2006: 1962: 1944: 1908: 1890: 1821: 1751: 1705: 1482: 1101: 947: 870: 428: 406: 386: 371: 290: 202: 3394:"Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools" 2271: 1691: 1652:
Persistent backdoor technology that can install spyware using a
1643: 1589: 1445: 1320: 1233: 4351: 4087: 2346: 1803: 1725: 1701: 1657: 1552: 1500: 1142: 994:
unit has existed since the late 90s. Its mission is to collect
858: 803: 376: 2496: 2249: 2127:
2.4 and the BLINDDATE software suite. Unit price (2008): $ 6K.
1926: 1777: 1526: 1338: 4256: 4080: 3574: 3523: 3428: 2436: 2168: 2124: 2002: 1872: 1134: 959: 339: 3157:
The perfect weapon: war, sabotage, and fear in the cyber age
1571: 3198:"Commentary: Evidence points to another Snowden at the NSA" 2536: 2420: 2259: 2154: 2104: 1842: 1838: 1834: 1761: 1735: 1462: 1427: 1394: 963: 3425:"NSA Playset invites hackers to 'play along with the NSA'" 3292:
Stöcker, Christian; Rosenbach, Marcel (25 November 2014).
2559:(Bluetooth Low Energy) and allows keystroke surveillance ( 2657:
also noted that the document is likely far from complete.
2582: 2508: 2480: 2456: 2452: 2404: 2392: 2367: 2115:
405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4
2108: 1976: 1972: 1514: 1458: 1246: 49: 2757: 1400:
servers via the motherboard BIOS and RAID controller(s).
1679: 1041:
Jacob Appelbaum co-authored the English publication in
3550:"Leaked documents that were not attributed to Snowden" 2693:
When ordering 25 units, the price per item is US$ 1000
966:. The source is believed to be someone different than 3486:"The NSA Playset: Espionage tools for the rest of us" 3110:
Reflections on Ten Years Past The Snowden Revelations
2761:; Horchert, Judith; Stöcker, Christian (2013-12-29). 2593:
with specific interfaces to test data exfiltration.)
2316:
Plugin for collecting information from targets using
996:
intelligence on foreign targets of the United States
2843:"Inside the NSA's Ultra-Secret China Hacking Group" 3294:"Trojaner Regin ist ein Werkzeug von NSA und GCHQ" 3009:"Apple Denies Working with NSA on iPhone Backdoor" 2471:hardware implant, which can access memory and IO. 1656:capable of infecting spyware at a packet level on 1111:in a statement to journalist Arik Hesseldahl from 1088:. On December 30, Appelbaum gave a lecture about " 4453: 3291: 2419:a hard drive with all the needed tools to crack 1812:Audio-based RF retro-reflector listening device. 972:global surveillance disclosures during the 2010s 3453: 2499:bus accessing the computer's operating system. 2337:noted that the software exploits leaked by the 2001:Software that makes DNT implants persistent on 1634:Back door exploit for Huawei Eudemon firewalls. 950:were published. The items are available to the 4120:Global surveillance disclosures (2013–present) 3483: 3387: 3385: 3230:"The NSA may have another leaker on its hands" 1174:Officials at the NSA did not believe that the 629:Global surveillance disclosures (2013–present) 27:Classified catalog of hacking tools by the NSA 3628: 2720:Data Network Technologies, a division of the 1837:processor, 4 MB of flash, 8 MB of RAM, and a 897: 3642: 3391: 3262:"Interactive Graphic: The NSA's Spy Catalog" 2753: 2751: 2749: 3422: 3382: 3635: 3621: 3479: 3477: 3070: 1509:Device that looks identical to a standard 904: 890: 3122: 3105:"Bruce Schneier: Snowden Ten Years Later" 3071:Bent, Kristin; Spring, Tom (2013-12-30). 3038: 2800: 2746: 2523:a hardware implant that is embedded in a 2328: 2103:A small computer intended to be used for 1167:The source who leaked the ANT catalog to 4155:NSA warrantless surveillance (2001–2007) 3587:The NSA Playset a Year of toys and tools 2803:"Unit Offers Spy Gadgets for Every Need" 3496:from the original on September 22, 2017 3474: 3447: 3192: 3102: 2906:"Documents Reveal Top NSA Hacking Unit" 2258:Multi-chip module using a 180 MHz 2123:slot, and 802.11 B/G hardware. Running 1881:Multi-protocol network-in-a-box system. 677:Mass surveillance in the United Kingdom 14: 4454: 3462:from the original on December 28, 2017 3404:from the original on February 25, 2017 3227: 3150: 3006: 2527:cable which allows data exfiltration. 672:Mass surveillance in the United States 3616: 3416: 3306:from the original on 28 November 2014 2974: 2009:-variant) J-series routers/firewalls. 970:, who is largely responsible for the 624:2005 warrantless surveillance scandal 2631: 2063:Software that can be implanted on a 3356: 3324: 1187:United States intelligence agencies 24: 3993:Information Warfare Support Center 3541: 3484:Sean Gallagher (August 11, 2015). 3435:from the original on June 19, 2017 3392:Lucy Teitler (November 17, 2014). 3064: 2872: 2535:a hardware implant exploiting the 2507:a hardware implant concealed in a 2407:frequency analyzer disguised as a 2318:Windows Management Instrumentation 1299: 25: 4493: 3750:Misawa Security Operations Center 3568: 3454:Michael Ossmann (July 31, 2014). 2975:Storm, Darlene (3 January 2014). 2606:Cyberwarfare in the United States 2511:cable which provides short range 1851: 1281: 182:Map of global NSA data collection 149:Year of intended declassification 4433:Vulnerabilities Equities Process 3829: 3673:Consolidated Intelligence Center 3659:Alaska Mission Operations Center 3547: 2763:"Catalog Advertises NSA Toolbox" 2711:Varies from platform to platform 2345:that US government suspicion of 2306: 2288: 2270: 2248: 2230: 2209: 2201:to provide location information. 2187: 2153: 2135: 2093: 2075: 2073: 2053: 2035: 2033: 2017: 2015: 1991: 1989: 1961: 1943: 1925: 1907: 1889: 1871: 1853: 1820: 1802: 1776: 1750: 1724: 1690: 1668: 1642: 1624: 1606: 1604: 1588: 1570: 1551: 1525: 1499: 1481: 1444: 1426: 1408: 1379: 1358: 1337: 1319: 1301: 1283: 1257: 1255: 1232: 1213:Capabilities in the ANT catalog 869: 857: 838: 826: 814: 802: 782: 772: 762: 752: 742: 732: 722: 321:President's Surveillance Program 175: 161: 40: 4074:Secure Terminal Equipment (STE) 3556:from the original on 2022-02-24 3508: 3371:from the original on 2021-12-21 3350: 3339:from the original on 2021-12-18 3318: 3285: 3254: 3221: 3210:from the original on 2022-02-24 3186: 3144: 3115:Internet Engineering Task Force 3096: 3085:from the original on 2022-04-07 3053:from the original on 2021-12-18 3032: 3021:from the original on 2022-02-24 3000: 2989:from the original on 2021-12-18 2957:from the original on 2021-11-02 2926:from the original on 2019-02-06 2887:from the original on 2022-04-06 2855:from the original on 2022-02-12 2838: 2821:from the original on 2022-04-11 2801:Appelbaum, Jacob (2013-12-30). 2783:from the original on 2014-01-04 2726: 2714: 2705: 2696: 2687: 2678: 2669: 2660: 1666: 1031:global surveillance disclosures 4391:Institute for Defense Analyses 3757:Multiprogram Research Facility 3103:Farrell, Stephen (July 2023). 2968: 2937: 2898: 2866: 2832: 2794: 2647: 2638: 2352: 2228: 2051: 1622: 1406: 1377: 1356: 1036: 326:Terrorist Surveillance Program 13: 1: 3423:Violet Blue (June 11, 2014). 3039:Robertson, Adi (2013-12-31). 2739: 2286: 2207: 2185: 2133: 2091: 1959: 1941: 1905: 1887: 1818: 1748: 1479: 1368:GSM Base Station Router as a 1311:Stacked Ethernet and USB plug 985: 505:Senate Intelligence Committee 3270:. 2013-12-30. Archived from 3228:Pasick, Adam (4 July 2014). 2684:Including installation costs 2411:phone; named after GENESIS. 2268: 1688: 1640: 1586: 1442: 1317: 1230: 1185:, who is specialized in the 1098:Chaos Communication Congress 69:ANT product catalog for the 7: 4477:Spyware used by governments 4405:National Cryptologic School 4398:National Cryptologic Museum 3736:Interagency Training Center 3694:European Cryptologic Center 3666:Colorado Cryptologic Center 2599: 2491:uses a pin on a computer's 2107:collection, including from 1800: 1722: 1549: 1497: 1389:Technology that installs a 482:FISA Amendments Act of 2008 477:Protect America Act of 2007 316:Total Information Awareness 56:, used on all catalog pages 10: 4498: 4264:Real Time Regional Gateway 4007:Special Collection Service 3722:Georgia Cryptologic Center 3357:Hsu, Jeremy (2014-03-26). 3160:(1st ed.). New York: 2722:Tailored Access Operations 2395:communication monitoring. 2246: 1923: 1774: 1523: 1335: 1204: 992:Tailored Access Operations 952:Tailored Access Operations 279:Tailored Access Operations 71:Tailored Access Operations 4375: 4315: 4199: 4111: 4044: 3977: 3838: 3827: 3729:Hawaii Cryptologic Center 3701:European Technical Center 3650: 2616:MiniPanzer and MegaPanzer 1869: 1226: 1223: 1220: 1217: 1162: 652:Surveillance of reporters 510:National Security Council 148: 140: 115: 103: 95: 87: 77: 62: 39: 34: 4472:National Security Agency 3820:Pacific Technical Center 3806:Texas Cryptologic Center 3644:National Security Agency 1568: 1013:, a former colleague of 934:National Security Agency 168:National Security Agency 82:National Security Agency 54:Central Security Service 4412:National Vigilance Park 2495:port to attack via the 2151: 1539:features to record the 1535:GSM handset with added 1517:to the target computer. 1424: 1245:device that emulates a 1171:is unknown as of 2024. 4236:Insider Threat Program 3933:John Michael McConnell 3516:"NSA Playset homepage" 3162:Crown Publishing Group 2555:software that targets 2439:reconnaissance drone. 2329:Follow-up developments 1537:software-defined radio 1131:chief security officer 667:Insider Threat Program 116:Authors of publication 96:Date of catalog sheets 3919:William Eldridge Odom 3552:. Electrospaces.net. 2732:100 units for 625,000 2483:exploitation device. 1271:software and work as 1157:Department of Defense 472:Homeland Security Act 366:Databases, tools etc. 4176:Thomas Andrews Drake 2360:open-source hardware 1760:Implant based on an 1393:software implant on 1122:s Digital Network). 976:open-source hardware 662:UN diplomatic spying 4208:Boundless Informant 3863:Laurence Hugh Frost 2873:Kelley, Michael B. 2432:PORCUPINEMASQUERADE 1227:Unit price in US$ 1214: 1118:Wall Street Journal 1029:, resulting in the 533:Hepting v. AT&T 452:Privacy Act of 1974 230:Upstream collection 141:Date of publication 3954:Keith B. Alexander 3891:Samuel C. Phillips 3605:2021-12-18 at the 3592:2022-01-20 at the 3580:2023-01-30 at the 3520:www.nsaplayset.org 3458:. Mossman's blog. 3242:on 23 October 2014 3007:Hesseldahl, Arik. 1212: 1191:commentary article 1189:, noted in a 2016 1113:All Things Digital 543:Clapper v. Amnesty 418:GCHQ collaboration 412:BOUNDLESSINFORMANT 4467:Espionage devices 4449: 4448: 4419:NSA Hall of Honor 3961:Michael S. Rogers 3912:Lincoln D. Faurer 3596:at Black Hat 2015 3456:"The NSA Playset" 3325:Hackett, Robert. 3171:978-0-451-49789-5 2632:Explanatory notes 2597: 2596: 2563:) and injection. 2384:TWILIGHTVEGETABLE 2326: 2325: 1831:Multi-chip module 1455:Direction finding 1049:Christian Stöcker 914: 913: 156: 155: 124:Christian Stöcker 58: 16:(Redirected from 4489: 4442: 4435: 4428: 4421: 4414: 4407: 4400: 4393: 4386: 4368: 4361: 4354: 4347: 4340: 4333: 4326: 4308: 4301: 4294: 4287: 4280: 4273: 4266: 4259: 4252: 4245: 4238: 4231: 4224: 4217: 4210: 4192: 4185: 4178: 4171: 4164: 4157: 4150: 4143: 4136: 4129: 4127:Church Committee 4122: 4104: 4097: 4090: 4083: 4076: 4069: 4062: 4055: 4037: 4030: 4023: 4016: 4009: 4002: 3995: 3988: 3970: 3963: 3956: 3949: 3942: 3935: 3928: 3921: 3914: 3907: 3900: 3893: 3886: 3879: 3872: 3865: 3858: 3851: 3833: 3832: 3822: 3815: 3813:Utah Data Center 3808: 3801: 3794: 3787: 3780: 3773: 3771:RAF Menwith Hill 3766: 3759: 3752: 3745: 3738: 3731: 3724: 3717: 3715:Friendship Annex 3710: 3703: 3696: 3689: 3682: 3675: 3668: 3661: 3637: 3630: 3623: 3614: 3613: 3609:at Toorcamp 2014 3575:NSA Playset wiki 3564: 3562: 3561: 3535: 3534: 3532: 3531: 3522:. Archived from 3512: 3506: 3505: 3503: 3501: 3481: 3472: 3471: 3469: 3467: 3451: 3445: 3444: 3442: 3440: 3420: 3414: 3413: 3411: 3409: 3398:Vice Motherboard 3389: 3380: 3379: 3377: 3376: 3354: 3348: 3347: 3345: 3344: 3322: 3316: 3315: 3313: 3311: 3289: 3283: 3282: 3280: 3279: 3258: 3252: 3251: 3249: 3247: 3238:. Archived from 3225: 3219: 3218: 3216: 3215: 3190: 3184: 3183: 3152:Sanger, David E. 3148: 3142: 3141: 3139: 3138: 3126: 3124:10.17487/RFC9446 3100: 3094: 3093: 3091: 3090: 3068: 3062: 3061: 3059: 3058: 3036: 3030: 3029: 3027: 3026: 3004: 2998: 2997: 2995: 2994: 2972: 2966: 2965: 2963: 2962: 2941: 2935: 2934: 2932: 2931: 2902: 2896: 2895: 2893: 2892: 2880:Business Insider 2870: 2864: 2863: 2861: 2860: 2836: 2830: 2829: 2827: 2826: 2798: 2792: 2791: 2789: 2788: 2759:Appelbaum, Jacob 2755: 2733: 2730: 2724: 2718: 2712: 2709: 2703: 2700: 2694: 2691: 2685: 2682: 2676: 2673: 2667: 2664: 2658: 2651: 2645: 2642: 2373: 2372: 2333:Security expert 2310: 2292: 2274: 2252: 2234: 2213: 2197:Radio frequency 2191: 2157: 2139: 2111:. Hardware: IBM 2097: 2079: 2057: 2039: 2021: 1995: 1965: 1947: 1929: 1911: 1893: 1875: 1857: 1845:microcontroller. 1824: 1806: 1780: 1754: 1728: 1694: 1672: 1646: 1628: 1610: 1592: 1574: 1555: 1529: 1503: 1485: 1457:application for 1448: 1430: 1412: 1383: 1370:Network-In-a-Box 1362: 1341: 1323: 1305: 1287: 1273:wireless bridges 1261: 1249:cellphone tower. 1236: 1215: 1211: 1087: 1076: 1064:Marcel Rosenbach 1057: 906: 899: 892: 874: 873: 862: 861: 843: 842: 831: 830: 819: 818: 807: 806: 786: 776: 766: 756: 746: 736: 726: 558:Wikimedia v. NSA 548:Klayman v. Obama 447:Safe Streets Act 179: 165: 158: 157: 144:30 December 2013 132: 46: 44: 32: 31: 21: 4497: 4496: 4492: 4491: 4490: 4488: 4487: 4486: 4452: 4451: 4450: 4445: 4440:Zendian Problem 4438: 4431: 4424: 4417: 4410: 4403: 4396: 4389: 4382: 4371: 4364: 4357: 4350: 4343: 4336: 4329: 4322: 4311: 4304: 4297: 4290: 4283: 4276: 4269: 4262: 4255: 4248: 4241: 4234: 4227: 4220: 4213: 4206: 4195: 4188: 4181: 4174: 4167: 4160: 4153: 4146: 4139: 4132: 4125: 4118: 4107: 4100: 4093: 4086: 4079: 4072: 4065: 4058: 4051: 4040: 4033: 4026: 4019: 4012: 4005: 3998: 3991: 3984: 3973: 3966: 3959: 3952: 3945: 3940:Kenneth Minihan 3938: 3931: 3924: 3917: 3910: 3905:Bobby Ray Inman 3903: 3896: 3889: 3882: 3877:Marshall Carter 3875: 3868: 3861: 3856:John A. Samford 3854: 3847: 3834: 3830: 3825: 3818: 3811: 3804: 3797: 3790: 3783: 3776: 3769: 3762: 3755: 3748: 3741: 3734: 3727: 3720: 3713: 3706: 3699: 3692: 3685: 3678: 3671: 3664: 3657: 3646: 3641: 3607:Wayback Machine 3594:Wayback Machine 3582:Wayback Machine 3571: 3559: 3557: 3544: 3542:Further reading 3539: 3538: 3529: 3527: 3514: 3513: 3509: 3499: 3497: 3482: 3475: 3465: 3463: 3452: 3448: 3438: 3436: 3421: 3417: 3407: 3405: 3390: 3383: 3374: 3372: 3355: 3351: 3342: 3340: 3323: 3319: 3309: 3307: 3290: 3286: 3277: 3275: 3260: 3259: 3255: 3245: 3243: 3226: 3222: 3213: 3211: 3191: 3187: 3172: 3149: 3145: 3136: 3134: 3117:. sec. 2. 3101: 3097: 3088: 3086: 3069: 3065: 3056: 3054: 3037: 3033: 3024: 3022: 3005: 3001: 2992: 2990: 2973: 2969: 2960: 2958: 2943: 2942: 2938: 2929: 2927: 2904: 2903: 2899: 2890: 2888: 2871: 2867: 2858: 2856: 2840:Aid, Matthew M. 2837: 2833: 2824: 2822: 2799: 2795: 2786: 2784: 2756: 2747: 2742: 2737: 2736: 2731: 2727: 2719: 2715: 2710: 2706: 2701: 2697: 2692: 2688: 2683: 2679: 2674: 2670: 2665: 2661: 2652: 2648: 2643: 2639: 2634: 2602: 2591:retroreflectors 2585:), SALSAFLOCK ( 2581:), TANGOFLOCK ( 2572:Radio frequency 2513:radio frequency 2355: 2331: 1714:Western Digital 1541:radio frequency 1348:Continuous wave 1308:COTTONMOUTH-III 1207: 1165: 1094:of the Internet 1081: 1070: 1051: 1039: 1023:Glenn Greenwald 1019:The Tor Project 1015:Jacob Appelbaum 988: 948:spying software 910: 881: 880: 868: 856: 837: 825: 813: 801: 713: 705: 704: 690: 682: 681: 642: 634: 633: 619: 611: 610: 576: 568: 567: 553:ACLU v. Clapper 523: 515: 514: 495: 487: 486: 442: 434: 433: 193: 185: 166: 135:Judith Horchert 126: 120:Jacob Appelbaum 88:Number of pages 78:Original author 45: 28: 23: 22: 18:NSA ANT catalog 15: 12: 11: 5: 4495: 4485: 4484: 4479: 4474: 4469: 4464: 4447: 4446: 4444: 4443: 4436: 4429: 4422: 4415: 4408: 4401: 4394: 4387: 4384:Dundee Society 4379: 4377: 4373: 4372: 4370: 4369: 4362: 4355: 4348: 4341: 4334: 4327: 4319: 4317: 4313: 4312: 4310: 4309: 4302: 4295: 4288: 4281: 4274: 4267: 4260: 4253: 4246: 4239: 4232: 4225: 4218: 4211: 4203: 4201: 4197: 4196: 4194: 4193: 4186: 4179: 4172: 4165: 4162:Pike Committee 4158: 4151: 4144: 4137: 4134:Edward Snowden 4130: 4123: 4115: 4113: 4109: 4108: 4106: 4105: 4098: 4091: 4084: 4077: 4070: 4063: 4056: 4048: 4046: 4042: 4041: 4039: 4038: 4031: 4024: 4017: 4010: 4003: 3996: 3989: 3981: 3979: 3975: 3974: 3972: 3971: 3964: 3957: 3950: 3947:Michael Hayden 3943: 3936: 3929: 3922: 3915: 3908: 3901: 3894: 3887: 3880: 3873: 3866: 3859: 3852: 3844: 3842: 3836: 3835: 3828: 3826: 3824: 3823: 3816: 3809: 3802: 3795: 3788: 3781: 3774: 3767: 3760: 3753: 3746: 3739: 3732: 3725: 3718: 3711: 3704: 3697: 3690: 3683: 3676: 3669: 3662: 3654: 3652: 3648: 3647: 3640: 3639: 3632: 3625: 3617: 3611: 3610: 3597: 3584: 3570: 3569:External links 3567: 3566: 3565: 3543: 3540: 3537: 3536: 3507: 3473: 3446: 3415: 3381: 3349: 3317: 3299:Spiegel Online 3284: 3253: 3220: 3196:(2016-08-22). 3194:Bamford, James 3185: 3170: 3164:. p. 74. 3143: 3095: 3063: 3031: 2999: 2967: 2936: 2914:. 2013-12-29. 2897: 2865: 2848:Foreign Policy 2831: 2793: 2744: 2743: 2741: 2738: 2735: 2734: 2725: 2713: 2704: 2695: 2686: 2677: 2675:For two months 2668: 2659: 2646: 2636: 2635: 2633: 2630: 2629: 2628: 2623: 2618: 2613: 2611:Equation Group 2608: 2601: 2598: 2595: 2594: 2575:retroreflector 2569: 2565: 2564: 2553: 2549: 2548: 2545: 2541: 2540: 2533: 2529: 2528: 2521: 2517: 2516: 2505: 2501: 2500: 2489: 2485: 2484: 2477: 2473: 2472: 2465: 2461: 2460: 2445: 2441: 2440: 2433: 2429: 2428: 2425:rainbow tables 2423:including the 2417: 2413: 2412: 2401: 2397: 2396: 2385: 2381: 2380: 2377: 2354: 2351: 2339:Shadow Brokers 2330: 2327: 2324: 2323: 2320: 2314: 2311: 2303: 2302: 2299: 2296: 2293: 2285: 2284: 2281: 2278: 2275: 2267: 2266: 2263: 2256: 2253: 2245: 2244: 2241: 2238: 2235: 2227: 2226: 2223: 2217: 2214: 2206: 2205: 2202: 2199:retroreflector 2195: 2192: 2184: 2183: 2180: 2161: 2158: 2150: 2149: 2146: 2143: 2140: 2132: 2131: 2128: 2101: 2098: 2090: 2089: 2086: 2083: 2080: 2072: 2071: 2068: 2061: 2058: 2050: 2049: 2046: 2043: 2040: 2032: 2031: 2028: 2025: 2022: 2014: 2013: 2010: 1999: 1996: 1988: 1987: 1984: 1969: 1966: 1958: 1957: 1954: 1951: 1948: 1940: 1939: 1936: 1933: 1930: 1922: 1921: 1918: 1915: 1912: 1904: 1903: 1900: 1897: 1894: 1886: 1885: 1882: 1879: 1876: 1868: 1867: 1864: 1861: 1860:MONKEYCALENDAR 1858: 1850: 1849: 1846: 1828: 1825: 1817: 1816: 1813: 1810: 1807: 1799: 1798: 1795: 1784: 1781: 1773: 1772: 1769: 1758: 1755: 1747: 1746: 1743: 1732: 1729: 1721: 1720: 1717: 1698: 1695: 1687: 1686: 1683: 1676: 1673: 1665: 1664: 1661: 1654:quantum insert 1650: 1647: 1639: 1638: 1635: 1632: 1629: 1621: 1620: 1617: 1614: 1611: 1603: 1602: 1599: 1596: 1593: 1585: 1584: 1581: 1578: 1575: 1567: 1566: 1563: 1559: 1556: 1548: 1547: 1544: 1533: 1530: 1522: 1521: 1518: 1507: 1504: 1496: 1495: 1492: 1489: 1486: 1478: 1477: 1474: 1452: 1449: 1441: 1440: 1437: 1434: 1431: 1423: 1422: 1419: 1416: 1413: 1405: 1404: 1401: 1387: 1384: 1376: 1375: 1372: 1366: 1363: 1355: 1354: 1351: 1345: 1342: 1334: 1333: 1330: 1327: 1324: 1316: 1315: 1312: 1309: 1306: 1298: 1297: 1294: 1291: 1290:COTTONMOUTH-II 1288: 1280: 1279: 1276: 1265: 1262: 1254: 1253: 1250: 1240: 1237: 1229: 1228: 1225: 1222: 1219: 1206: 1203: 1199:Bruce Schneier 1195:Edward Snowden 1164: 1161: 1153:Bruce Schneier 1096:" at the 30th 1092:militarization 1068:Jörg Schindler 1038: 1035: 1009:together with 1003:Edward Snowden 987: 984: 968:Edward Snowden 912: 911: 909: 908: 901: 894: 886: 883: 882: 879: 878: 866: 853: 852: 848: 847: 835: 823: 811: 798: 797: 791: 790: 780: 770: 760: 750: 740: 730: 719: 718: 714: 711: 710: 707: 706: 703: 702: 697: 691: 688: 687: 684: 683: 680: 679: 674: 669: 664: 659: 654: 649: 643: 640: 639: 636: 635: 632: 631: 626: 620: 617: 616: 613: 612: 609: 608: 606:Edward Snowden 603: 598: 593: 588: 583: 581:William Binney 577: 575:Whistleblowers 574: 573: 570: 569: 566: 565: 560: 555: 550: 545: 540: 535: 530: 524: 521: 520: 517: 516: 513: 512: 507: 502: 496: 493: 492: 489: 488: 485: 484: 479: 474: 469: 464: 459: 454: 449: 443: 440: 439: 436: 435: 432: 431: 426: 420: 419: 415: 414: 409: 404: 399: 394: 389: 384: 379: 374: 368: 367: 363: 362: 357: 352: 347: 342: 336: 335: 331: 330: 329: 328: 318: 313: 308: 303: 298: 293: 287: 286: 282: 281: 275: 274: 270: 269: 263: 262: 258: 257: 252: 247: 242: 237: 232: 226: 225: 221: 220: 215: 210: 205: 199: 198: 194: 191: 190: 187: 186: 180: 172: 171: 154: 153: 150: 146: 145: 142: 138: 137: 117: 113: 112: 105: 101: 100: 97: 93: 92: 89: 85: 84: 79: 75: 74: 64: 60: 59: 37: 36: 26: 9: 6: 4: 3: 2: 4494: 4483: 4480: 4478: 4475: 4473: 4470: 4468: 4465: 4463: 4460: 4459: 4457: 4441: 4437: 4434: 4430: 4427: 4423: 4420: 4416: 4413: 4409: 4406: 4402: 4399: 4395: 4392: 4388: 4385: 4381: 4380: 4378: 4374: 4367: 4363: 4360: 4356: 4353: 4349: 4346: 4342: 4339: 4335: 4332: 4328: 4325: 4321: 4320: 4318: 4314: 4307: 4303: 4300: 4296: 4293: 4289: 4286: 4282: 4279: 4275: 4272: 4268: 4265: 4261: 4258: 4254: 4251: 4247: 4244: 4240: 4237: 4233: 4230: 4226: 4223: 4219: 4216: 4212: 4209: 4205: 4204: 4202: 4198: 4191: 4187: 4184: 4180: 4177: 4173: 4170: 4166: 4163: 4159: 4156: 4152: 4149: 4148:James Bamford 4145: 4142: 4138: 4135: 4131: 4128: 4124: 4121: 4117: 4116: 4114: 4110: 4103: 4102:WARRIOR PRIDE 4099: 4096: 4092: 4089: 4085: 4082: 4078: 4075: 4071: 4068: 4064: 4061: 4057: 4054: 4050: 4049: 4047: 4043: 4036: 4032: 4029: 4025: 4022: 4018: 4015: 4011: 4008: 4004: 4001: 3997: 3994: 3990: 3987: 3983: 3982: 3980: 3976: 3969: 3968:Paul Nakasone 3965: 3962: 3958: 3955: 3951: 3948: 3944: 3941: 3937: 3934: 3930: 3927: 3926:Bill Studeman 3923: 3920: 3916: 3913: 3909: 3906: 3902: 3899: 3895: 3892: 3888: 3885: 3881: 3878: 3874: 3871: 3867: 3864: 3860: 3857: 3853: 3850: 3846: 3845: 3843: 3841: 3837: 3821: 3817: 3814: 3810: 3807: 3803: 3800: 3796: 3793: 3789: 3786: 3782: 3779: 3778:Roaring Creek 3775: 3772: 3768: 3765: 3761: 3758: 3754: 3751: 3747: 3744: 3740: 3737: 3733: 3730: 3726: 3723: 3719: 3716: 3712: 3709: 3705: 3702: 3698: 3695: 3691: 3688: 3684: 3681: 3677: 3674: 3670: 3667: 3663: 3660: 3656: 3655: 3653: 3649: 3645: 3638: 3633: 3631: 3626: 3624: 3619: 3618: 3615: 3608: 3604: 3601: 3598: 3595: 3591: 3588: 3585: 3583: 3579: 3576: 3573: 3572: 3555: 3551: 3548:Koop, Peter. 3546: 3545: 3526:on 2023-01-30 3525: 3521: 3517: 3511: 3495: 3491: 3487: 3480: 3478: 3461: 3457: 3450: 3434: 3430: 3426: 3419: 3403: 3399: 3395: 3388: 3386: 3370: 3366: 3365: 3364:IEEE Spectrum 3360: 3353: 3338: 3334: 3333: 3328: 3321: 3305: 3302:(in German). 3301: 3300: 3295: 3288: 3274:on 2014-01-02 3273: 3269: 3268: 3263: 3257: 3241: 3237: 3236: 3231: 3224: 3209: 3205: 3204: 3199: 3195: 3189: 3181: 3177: 3173: 3167: 3163: 3159: 3158: 3153: 3147: 3133: 3130: 3125: 3120: 3116: 3112: 3111: 3106: 3099: 3084: 3080: 3079: 3074: 3067: 3052: 3048: 3047: 3042: 3035: 3020: 3016: 3015: 3010: 3003: 2988: 2984: 2983: 2982:Computerworld 2978: 2971: 2956: 2952: 2951: 2946: 2940: 2925: 2921: 2917: 2913: 2912: 2907: 2901: 2886: 2882: 2881: 2876: 2869: 2854: 2850: 2849: 2844: 2841: 2835: 2820: 2816: 2812: 2808: 2804: 2797: 2782: 2778: 2774: 2770: 2769: 2764: 2760: 2754: 2752: 2750: 2745: 2729: 2723: 2717: 2708: 2699: 2690: 2681: 2672: 2663: 2656: 2650: 2641: 2637: 2627: 2626:WARRIOR PRIDE 2624: 2622: 2619: 2617: 2614: 2612: 2609: 2607: 2604: 2603: 2592: 2588: 2584: 2580: 2576: 2573: 2570: 2567: 2566: 2562: 2558: 2554: 2551: 2550: 2546: 2543: 2542: 2538: 2534: 2531: 2530: 2526: 2522: 2519: 2518: 2514: 2510: 2506: 2503: 2502: 2498: 2494: 2490: 2487: 2486: 2482: 2478: 2476:ADAPTERNOODLE 2475: 2474: 2470: 2466: 2463: 2462: 2458: 2454: 2451:in form of a 2450: 2446: 2443: 2442: 2438: 2434: 2431: 2430: 2426: 2422: 2418: 2415: 2414: 2410: 2406: 2402: 2399: 2398: 2394: 2390: 2386: 2383: 2382: 2378: 2375: 2374: 2371: 2369: 2365: 2361: 2350: 2348: 2344: 2343:IEEE Spectrum 2340: 2336: 2321: 2319: 2315: 2312: 2309: 2305: 2304: 2300: 2297: 2294: 2291: 2287: 2282: 2279: 2276: 2273: 2269: 2264: 2261: 2257: 2254: 2251: 2247: 2242: 2239: 2236: 2233: 2229: 2224: 2221: 2218: 2215: 2212: 2208: 2203: 2200: 2196: 2193: 2190: 2186: 2181: 2178: 2174: 2170: 2166: 2162: 2159: 2156: 2152: 2147: 2144: 2141: 2138: 2134: 2129: 2126: 2122: 2118: 2114: 2110: 2106: 2102: 2099: 2096: 2092: 2087: 2084: 2082:SOUFFLETROUGH 2081: 2078: 2074: 2069: 2066: 2062: 2059: 2056: 2052: 2047: 2044: 2042:STUCCOMONTANA 2041: 2038: 2034: 2029: 2026: 2024:SIERRAMONTANA 2023: 2020: 2016: 2011: 2008: 2004: 2000: 1998:SCHOOLMONTANA 1997: 1994: 1990: 1985: 1982: 1981:ferrite choke 1978: 1974: 1970: 1967: 1964: 1960: 1955: 1952: 1949: 1946: 1942: 1937: 1934: 1931: 1928: 1924: 1919: 1916: 1913: 1910: 1906: 1901: 1898: 1895: 1892: 1888: 1883: 1880: 1877: 1874: 1870: 1865: 1862: 1859: 1856: 1852: 1847: 1844: 1840: 1836: 1832: 1829: 1826: 1823: 1819: 1814: 1811: 1808: 1805: 1801: 1796: 1793: 1789: 1785: 1782: 1779: 1775: 1770: 1767: 1763: 1759: 1756: 1753: 1749: 1744: 1741: 1737: 1733: 1730: 1727: 1723: 1718: 1715: 1711: 1707: 1703: 1699: 1696: 1693: 1689: 1684: 1681: 1677: 1674: 1671: 1667: 1662: 1659: 1655: 1651: 1648: 1645: 1641: 1636: 1633: 1630: 1627: 1623: 1618: 1615: 1613:GOURMETTROUGH 1612: 1609: 1605: 1600: 1597: 1594: 1591: 1587: 1582: 1579: 1576: 1573: 1569: 1564: 1560: 1557: 1554: 1550: 1545: 1542: 1538: 1534: 1531: 1528: 1524: 1519: 1516: 1512: 1508: 1505: 1502: 1498: 1493: 1490: 1487: 1484: 1480: 1475: 1472: 1468: 1464: 1460: 1456: 1453: 1450: 1447: 1443: 1438: 1435: 1432: 1429: 1425: 1420: 1417: 1414: 1411: 1407: 1402: 1399: 1396: 1392: 1388: 1385: 1382: 1378: 1373: 1371: 1367: 1364: 1361: 1357: 1352: 1349: 1346: 1343: 1340: 1336: 1331: 1328: 1325: 1322: 1318: 1313: 1310: 1307: 1304: 1300: 1295: 1292: 1289: 1286: 1282: 1277: 1274: 1270: 1266: 1264:COTTONMOUTH-I 1263: 1260: 1256: 1251: 1248: 1244: 1241: 1238: 1235: 1231: 1216: 1210: 1202: 1200: 1196: 1192: 1188: 1184: 1183:James Bamford 1179: 1177: 1172: 1170: 1160: 1158: 1154: 1150: 1148: 1144: 1140: 1136: 1132: 1127: 1126: 1121: 1119: 1115:(part of the 1114: 1110: 1105: 1103: 1099: 1095: 1093: 1085: 1080: 1074: 1069: 1065: 1061: 1060:Laura Poitras 1055: 1050: 1046: 1045: 1034: 1032: 1028: 1027:Laura Poitras 1024: 1020: 1016: 1012: 1008: 1004: 999: 997: 993: 983: 981: 977: 973: 969: 965: 961: 957: 953: 949: 945: 941: 940: 935: 931: 927: 923: 919: 907: 902: 900: 895: 893: 888: 887: 885: 884: 877: 872: 867: 865: 860: 855: 854: 850: 849: 846: 841: 836: 834: 829: 824: 822: 817: 812: 810: 805: 800: 799: 796: 793: 792: 789: 785: 781: 779: 775: 771: 769: 765: 761: 759: 755: 751: 749: 745: 741: 739: 735: 731: 729: 725: 721: 720: 717:United States 716: 715: 712:Collaboration 709: 708: 701: 698: 696: 693: 692: 686: 685: 678: 675: 673: 670: 668: 665: 663: 660: 658: 657:Mail tracking 655: 653: 650: 648: 645: 644: 638: 637: 630: 627: 625: 622: 621: 615: 614: 607: 604: 602: 599: 597: 594: 592: 589: 587: 584: 582: 579: 578: 572: 571: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 525: 519: 518: 511: 508: 506: 503: 501: 498: 497: 491: 490: 483: 480: 478: 475: 473: 470: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 444: 438: 437: 430: 427: 425: 422: 421: 417: 416: 413: 410: 408: 405: 403: 400: 398: 395: 393: 390: 388: 385: 383: 380: 378: 375: 373: 370: 369: 365: 364: 361: 358: 356: 353: 351: 348: 346: 343: 341: 338: 337: 333: 332: 327: 324: 323: 322: 319: 317: 314: 312: 309: 307: 304: 302: 299: 297: 294: 292: 289: 288: 284: 283: 280: 277: 276: 272: 271: 268: 265: 264: 260: 259: 256: 253: 251: 248: 246: 243: 241: 238: 236: 233: 231: 228: 227: 223: 222: 219: 216: 214: 211: 209: 206: 204: 201: 200: 196: 195: 189: 188: 183: 178: 174: 173: 169: 164: 160: 159: 151: 147: 143: 139: 136: 130: 125: 121: 118: 114: 111: 110: 106: 102: 98: 94: 90: 86: 83: 80: 76: 72: 68: 65: 61: 57: 55: 51: 48:Seals of the 43: 38: 33: 30: 19: 4482:Surveillance 4306:Epic Shelter 4271:Stellar Wind 4052: 3870:Gordon Blake 3849:Ralph Canine 3558:. Retrieved 3528:. Retrieved 3524:the original 3519: 3510: 3498:. Retrieved 3490:Ars Technica 3464:. Retrieved 3449: 3437:. Retrieved 3418: 3406:. Retrieved 3373:. Retrieved 3362: 3352: 3341:. Retrieved 3330: 3320: 3308:. Retrieved 3297: 3287: 3276:. Retrieved 3272:the original 3265: 3256: 3244:. Retrieved 3240:the original 3233: 3223: 3212:. Retrieved 3201: 3188: 3156: 3146: 3135:. Retrieved 3109: 3098: 3087:. Retrieved 3076: 3066: 3055:. Retrieved 3044: 3034: 3023:. Retrieved 3012: 3002: 2991:. Retrieved 2980: 2970: 2959:. Retrieved 2948: 2939: 2928:. Retrieved 2909: 2900: 2889:. Retrieved 2878: 2868: 2857:. Retrieved 2846: 2834: 2823:. Retrieved 2806: 2796: 2785:. Retrieved 2766: 2728: 2716: 2707: 2698: 2689: 2680: 2671: 2662: 2654: 2649: 2640: 2520:BLINKERCOUGH 2504:TURNIPSCHOOL 2464:SLOTSCREAMER 2416:DRIZZLECHAIR 2403:a hand held 2379:Description 2356: 2332: 2121:CompactFlash 1764:core and an 1675:HOWLERMONKEY 1269:Trojan horse 1224:Description 1208: 1180: 1173: 1168: 1166: 1151: 1146: 1123: 1116: 1108: 1106: 1089: 1079:Holger Stark 1042: 1040: 1011:Runa Sandvik 1005:organized a 1000: 989: 946:devices and 937: 932:by the U.S. 921: 917: 915: 586:Thomas Drake 563:US v. Moalin 538:Jewel v. NSA 494:Institutions 392:TRAFFICTHIEF 170:surveillance 107: 47: 29: 4462:Der Spiegel 4278:TRAILBLAZER 4190:Matthew Aid 4183:Thomas Tamm 4112:Controversy 4053:ANT catalog 3884:Noel Gayler 3799:Sugar Grove 3743:Kent Island 3687:Dorsey Road 3600:NSA Playset 3267:Der Spiegel 2911:Der Spiegel 2807:Der Spiegel 2768:Der Spiegel 2702:Up to 4,000 2655:Der Spiegel 2532:SAVIORBURST 2353:NSA Playset 2335:Matt Suiche 2313:WISTFULTOLL 2237:TOTEGHOSTLY 2060:SOMBERKNAVE 1790:series and 1631:HALLUXWATER 1415:DROPOUTJEEP 1386:DEITYBOUNCE 1365:CYCLONE-HX9 1176:web crawler 1169:Der Spiegel 1147:Der Spiegel 1109:DROPOUTJEEP 1082: [ 1071: [ 1052: [ 1044:Der Spiegel 1037:Publication 1007:CryptoParty 939:Der Spiegel 922:TAO catalog 918:ANT catalog 618:Publication 596:Thomas Tamm 528:ACLU v. NSA 467:Patriot Act 441:Legislation 301:Trailblazer 127: [ 109:Der Spiegel 63:Description 35:ANT catalog 4456:Categories 4331:Interquake 4285:Turbulence 4045:Technology 3792:Salt Creek 3708:Fort Meade 3560:2022-04-12 3530:2021-12-18 3375:2021-12-21 3343:2021-12-18 3310:2 February 3278:2022-04-07 3246:7 February 3214:2022-02-09 3180:1039082430 3137:2023-10-28 3089:2022-04-08 3057:2021-12-18 3025:2021-12-18 3014:AllThingsD 2993:2021-12-18 2961:2021-12-18 2930:2022-02-09 2891:2022-04-06 2859:2022-02-12 2825:2022-04-11 2787:2021-12-21 2740:References 2568:CONGAFLOCK 2544:CACTUSTUTU 2444:KEYSWEEPER 2435:a passive 2389:boot image 2295:WATERWITCH 2220:Windows CE 2216:TOTECHASER 2194:TAWDRYYARD 2142:SURLYSPAWN 2100:SPARROW II 2065:Windows XP 1968:RAGEMASTER 1950:PHOTOANGLO 1914:NIGHTWATCH 1896:NIGHTSTAND 1827:MAESTRO-II 1794:firewalls. 1757:JUNIORMINT 1488:FEEDTROUGH 1221:Code name 986:Background 926:classified 591:Mark Klein 334:Since 2007 306:Turbulence 285:Since 2001 273:Since 1998 261:Since 1990 250:ThinThread 224:Since 1978 67:Classified 4338:Main Core 4316:Databases 4299:XKeyscore 4169:Russ Tice 4060:FROSTBURG 3978:Divisions 3898:Lew Allen 3785:Room 641A 3651:Locations 3046:The Verge 2920:2195-1349 2815:2195-1349 2777:2195-1349 2561:keylogger 2552:TINYALAMO 2488:CHUKWAGON 2449:keylogger 2400:LEVITICUS 2277:TYPHON HX 1788:Cisco PIX 1697:IRATEMONK 1649:HEADWATER 1595:GOPHERSET 1451:ENTOURAGE 1398:PowerEdge 1326:CROSSBEAM 1239:CANDYGRAM 1125:The Verge 1001:In 2012, 944:espionage 795:Five Eyes 647:Cablegate 601:Russ Tice 402:XKeyscore 382:Main Core 350:Stateroom 296:STORMBREW 267:RAMPART-A 245:Main Core 104:Publisher 99:2008–2009 4324:DISHFIRE 4292:Upstream 4243:MUSCULAR 4229:Fairview 4215:Dropmire 4200:Programs 3764:Pine Gap 3603:Archived 3590:Archived 3578:Archived 3554:Archived 3500:June 14, 3494:Archived 3466:June 14, 3460:Archived 3439:June 15, 3433:Archived 3408:June 14, 3402:Archived 3369:Archived 3337:Archived 3304:Archived 3208:Archived 3154:(2018). 3083:Archived 3051:Archived 3019:Archived 2987:Archived 2955:Archived 2924:Archived 2885:Archived 2853:Archived 2819:Archived 2781:Archived 2600:See also 2409:Motorola 2364:software 2117:mini PCI 2113:Power PC 2005:-based ( 1884:250,000 1809:LOUDAUTO 1731:IRONCHEF 1660:routers. 1558:GODSURGE 1543:spectrum 1506:FIREWALK 1467:CDMA2000 1391:backdoor 1243:Tripwire 980:software 928:product 738:CYBERCOM 700:Metadata 689:Concepts 522:Lawsuits 424:MUSCULAR 397:DISHFIRE 345:Dropmire 311:Genoa II 240:FAIRVIEW 213:SHAMROCK 197:Pre-1978 192:Programs 4366:PINWALE 4345:MAINWAY 4222:ECHELON 4141:LOVEINT 4095:STU-III 4067:HARVEST 3840:Leaders 3332:Fortune 3203:Reuters 2621:Stuxnet 2255:TRINITY 2177:Windows 2173:Solaris 2165:FreeBSD 2119:slots, 2070:50,000 2007:FreeBSD 1956:40,000 1932:PICASSO 1783:JETPLOW 1710:Seagate 1706:Samsung 1546:15,000 1532:GENESIS 1520:10,740 1476:70,000 1473:signals 1439:40,000 1374:70,000 1344:CTX4000 1314:24,960 1278:20,300 1252:40,000 1205:Content 1181:Author 1139:Juniper 1102:Hamburg 930:catalog 924:) is a 641:Related 429:Tempora 407:ICREACH 387:MAINWAY 372:PINWALE 355:Bullrun 291:OAKSTAR 235:BLARNEY 208:MINARET 203:ECHELON 4426:VENONA 4359:Nymrod 4352:MARINA 4250:MYSTIC 4088:STU-II 3235:Quartz 3178:  3168:  2950:ccc.de 2918:  2813:  2775:  2589:) are 2347:Huawei 2265:6,250 2130:6,000 1938:2,000 1878:NEBULA 1848:3,000 1712:, and 1702:Maxtor 1658:Huawei 1332:4,000 1296:4,000 1163:Source 1143:Huawei 695:SIGINT 377:MARINA 360:MYSTIC 218:PROMIS 4376:Other 4257:PRISM 4081:STU-I 3429:ZDNet 2437:Wi-Fi 2376:Name 2175:, or 2169:Linux 2125:Linux 2003:JUNOS 1740:REGIN 1577:GINSU 1218:Page 1135:Cisco 1086:] 1075:] 1056:] 1047:with 960:Cisco 956:Apple 851:Other 340:PRISM 255:Genoa 131:] 4035:NSOC 4028:NTOC 3680:CSSG 3502:2017 3468:2017 3441:2017 3410:2017 3312:2015 3248:2022 3176:OCLC 3166:ISBN 3132:9446 2916:ISSN 2811:ISSN 2773:ISSN 2579:PS/2 2537:JTAG 2421:A5/1 2391:for 2362:and 2301:N/A 2283:N/A 2260:ARM9 2225:N/A 2160:SWAP 2109:UAVs 2105:WLAN 2048:N/A 2030:N/A 2012:N/A 1920:N/A 1902:N/A 1843:HC12 1839:FPGA 1835:ARM7 1771:N/A 1766:FPGA 1762:ARM9 1736:BIOS 1685:750 1663:N/A 1637:N/A 1565:500 1562:CPU. 1511:RJ45 1494:N/A 1469:and 1463:UMTS 1433:EBSR 1395:Dell 1353:N/A 1090:the 1077:and 1025:and 990:The 978:and 964:Dell 962:and 920:(or 916:The 864:DGSE 845:GCSB 821:GCHQ 809:CSEC 500:FISC 462:ECPA 457:FISA 152:2032 133:and 73:unit 52:and 4021:TAO 4014:SSO 4000:ROC 3986:CSS 3129:RFC 3119:doi 3078:CRN 2587:VGA 2583:USB 2557:BLE 2525:VGA 2509:USB 2497:I²C 2493:VGA 2481:USB 2469:PCI 2459:). 2457:GSM 2453:USB 2405:GSM 2393:GSM 2368:GSM 2204:30 2148:30 1986:30 1977:DVI 1973:VGA 1815:30 1792:ASA 1515:VPN 1471:FRS 1459:GSM 1247:GSM 1133:of 1100:in 1033:. 1017:at 876:BND 833:ASD 788:IAO 778:DHS 768:CIA 758:FBI 748:DOJ 728:CSS 50:NSA 4458:: 3518:. 3492:. 3488:. 3476:^ 3431:. 3427:. 3400:. 3396:. 3384:^ 3367:. 3361:. 3335:. 3329:. 3296:. 3264:. 3232:. 3206:. 3200:. 3174:. 3127:. 3113:. 3107:. 3081:. 3075:. 3049:. 3043:. 3017:. 3011:. 2985:. 2979:. 2953:. 2947:. 2922:. 2908:. 2883:. 2877:. 2851:. 2845:. 2817:. 2809:. 2805:. 2779:. 2771:. 2765:. 2748:^ 2479:a 2467:a 2447:a 2427:. 2387:a 2322:0 2243:0 2182:0 2171:, 2167:, 2088:0 1866:0 1797:0 1745:0 1719:0 1708:, 1704:, 1680:RF 1678:A 1619:0 1601:0 1583:0 1465:, 1461:, 1421:0 1403:0 1159:. 1149:. 1084:de 1073:de 1066:, 1062:, 1054:de 982:. 958:, 129:de 122:, 91:49 3636:e 3629:t 3622:v 3563:. 3533:. 3504:. 3470:. 3443:. 3412:. 3378:. 3346:. 3314:. 3281:. 3250:. 3217:. 3182:. 3140:. 3121:: 3092:. 3060:. 3028:. 2996:. 2964:. 2933:. 2894:. 2862:. 2828:. 2790:. 2179:. 1768:. 1742:. 1716:. 1120:' 905:e 898:t 891:v 20:)

Index

NSA ANT catalog

NSA
Central Security Service
Classified
Tailored Access Operations
National Security Agency
Der Spiegel
Jacob Appelbaum
Christian Stöcker
de
Judith Horchert

National Security Agency

Map of global NSA data collection
ECHELON
MINARET
SHAMROCK
PROMIS
Upstream collection
BLARNEY
FAIRVIEW
Main Core
ThinThread
Genoa
RAMPART-A
Tailored Access Operations
OAKSTAR
STORMBREW

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑