42:
774:
744:
754:
764:
734:
3831:
177:
163:
2370:)) to the NSA Playset. Anyone is invited to join and contribute their own device. The requisites for an addition to the NSA Playset is a similar or already existing NSA ANT project, ease of use and a silly name (based on the original tool's name if possible). The silly name requisite is a rule that Michael Ossman himself came up with and an example is given on the project's website: "For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH." The ease of use part stems also from the NSA Playset's motto: "If a 10 year old can't do it, it doesn't count!"
828:
724:
804:
816:
1418:"A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."
840:
1303:
1855:
1285:
2366:. Thus far, the NSA Playset consists of fourteen items, for which the code and instructions can be found online on the project's homepage. After the initial leak, Michael Ossman, the founder of Great Scott Gadgets, gave a shout out to other security researchers to start working on the tools mentioned in the catalog and to recreate them. The name NSA Playset came originally from Dean Pierce, who is also a contributor (TWILIGHTVEGETABLE(
2077:
2037:
2019:
1993:
1608:
1259:
871:
1670:
859:
2308:
2232:
2055:
1626:
1410:
1381:
1360:
2290:
2211:
2189:
2137:
2095:
1963:
1945:
1909:
1891:
1822:
1752:
1483:
784:
2272:
1692:
1644:
1590:
1446:
1321:
1234:
1804:
1726:
1553:
1501:
2250:
1927:
1778:
1527:
1339:
1873:
1572:
2155:
1428:
1128:
questioned how the program developed in later years, since the document was composed in the early period of the iPhone and smartphones in general. Dell denied collaborating with any government in general, including the US government. John
Stewart, senior vice president and
1561:
Software implant for a JTAG bus device named FLUXBABBITT which is added to Dell PowerEdge servers during interdiction. GODSURGE installs an implant upon system boot-up using the FLUXBABBITT JTAG interface to the Xeon series
2357:
The NSA Playset is an open-source project inspired by the NSA ANT catalog to create more accessible and easy to use tools for security researchers. Most of the surveillance tools can be recreated with off-the-shelf or
974:. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as
2986:
2923:
1193:
that
Appelbaum has not identified the source who leaked the ANT catalog to him, which led people to mistakenly assume it was Edward Snowden. Bamford got unrestricted access to the documents cache from
1917:
Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it.
2818:
1058:
and Judith
Horchert, which was publicized on 29 December 2013. The related English publication on the same day about the TAO by Der Spiegel was also authored by the same people, and including
3082:
2780:
3992:
481:
3493:
3303:
3050:
4027:
3589:
1975:
signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most
1067:
1682:
transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely.
4161:
3155:
3368:
1078:
661:
3819:
527:
2852:
1145:
stated they would take appropriate audits to determine if any compromise had taken place and would communicate if so. NSA declined to comment on the publication by
863:
3432:
2577:
intended for experimentation. Intended use would be the implantation into a cable and data exfiltration based on radio reflectivity of the device.(FLAMENCOFLOCK (
1197:
and could not find any references to the ANT catalog using automated search tools, thereby concluding that the documents were not leaked by him. Security expert
2976:
446:
3018:
2884:
1513:
socket that allows data to be injected, or monitored and transmitted via radio technology. using the HOWLERMONKEY RF transceiver. It can for instance create a
651:
1048:
123:
2905:
3401:
3336:
998:
by hacking into computers and telecommunication networks. It has been speculated for years before that capabilities like those in the ANT catalog existed.
3207:
2802:
1275:, providing covert remote access to the target machine. COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver.
4119:
3634:
3553:
1030:
628:
134:
3072:
2954:
773:
2762:
3229:
4305:
1293:
Can be deployed in a USB socket (rather than plug), and, but requires further integration in the target machine to turn into a deployed system.
1155:
wrote about the tools on his blog in a series titled "NSA Exploit of the Week". He stated that because of this, his website got blocked by the
3485:
3293:
3040:
2653:
The article from Der
Spiegel notes that it is a "50-page document" and that "nearly 50 pages" are published. The gallery contains 49 pages.
1979:
ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the
4330:
4154:
3586:
995:
808:
925:
580:
3459:
1935:
Software that can collect mobile phone location data, call metadata, access the phone's microphone to eavesdrop on nearby conversations.
1983:
of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.
903:
623:
3261:
753:
844:
1137:
stated that they were "deeply concerned and will continue to pursue all avenues to determine if we need to address any new issues."
4358:
3839:
1491:
Software that can penetrate
Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.
676:
509:
499:
3602:
743:
3627:
3358:
1833:
approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz
820:
671:
763:
733:
3169:
971:
461:
456:
4476:
1186:
4034:
2842:
1899:
Portable system that installs
Microsoft Windows exploits from a distance of up to eight miles over a wireless connection.
1598:
GSM software that uses a phone's SIM card's API (SIM Toolkit or STK) to control the phone through remotely sent commands.
1209:
The published catalog pages were written between 2008 and 2009. The price of the items ranged from free up to $ 250,000.
1156:
747:
656:
320:
3424:
2317:
4471:
3749:
3620:
2605:
3008:
2874:
1072:
41:
4432:
3672:
3658:
542:
349:
1201:
has stated on his blog that he also believes the ANT catalog did not come from
Snowden, but from a second leaker.
723:
4228:
3393:
3114:
777:
757:
423:
239:
17:
3326:
1178:
used by
Snowden touched the ANT catalog and started looking for other people who could have leaked the catalog.
4390:
4221:
3756:
3197:
896:
832:
325:
217:
4249:
3742:
1765:
504:
359:
3549:
2539:
interface for software application persistence; named after GODSURGE. FLUXBABBIT is replaced by SOLDERPEEK.
2949:
2298:
A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phone.
1097:
1083:
787:
354:
2341:
could be seen as genuine because it matched with names from the ANT catalog. John
Bumgarner has stated to
4404:
4397:
3735:
2944:
767:
737:
476:
315:
3577:
3515:
4466:
4263:
4020:
4006:
3721:
3679:
2721:
2172:
991:
951:
278:
70:
3239:
1738:. IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software
4073:
4013:
3728:
3700:
2615:
2547:
Portable system that enables wireless installation of
Microsoft Windows exploits; covers NIGHTSTAND.
1510:
889:
3999:
3985:
3946:
3805:
3665:
3643:
2219:
1268:
933:
727:
167:
81:
53:
2145:
Keystroke monitor technology that can be used on remote computers that are not internet connected.
1580:
Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.
4411:
875:
562:
2262:
processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny.
2085:
BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.
1053:
783:
128:
4235:
3932:
3161:
1536:
1130:
666:
66:
4481:
3918:
3777:
3686:
3455:
2644:
Whether ANT stands for Advanced Network Technology or Access Network Technology is not known.
471:
176:
162:
4461:
4175:
3271:
3234:
3128:
2586:
2556:
2524:
2492:
2363:
2359:
1470:
1390:
979:
975:
694:
585:
3104:
2455:
wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over
8:
4291:
4277:
4207:
3862:
3798:
1350:
radar device that can "illuminate" a target system for recovery of "off net" information.
1117:
451:
411:
300:
234:
229:
181:
1841:
with 500,000 gates. It replaces the previous generation modules which were based on the
3953:
3890:
3791:
3331:
1709:
1190:
1112:
1104:, Germany. At the end of his talk, he encouraged NSA employees to leak more documents.
942:
in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of
532:
3327:"Hackers Have Allegedly Stolen NSA-Linked 'Cyber Weapons' and Are Auctioning Them Off"
2240:
Software that can be implanted on a Windows mobile phone allowing full remote control.
2045:
Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.
2027:
Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.
936:(NSA) of which the version written in 2008–2009 was published by German news magazine
4418:
3960:
3911:
3599:
3175:
3165:
2915:
2810:
2772:
2560:
2448:
2176:
1830:
1454:
4284:
4126:
4066:
3812:
3770:
3714:
3397:
3118:
2879:
2468:
1369:
1138:
1063:
557:
547:
310:
305:
212:
4439:
3939:
3904:
3876:
3855:
3606:
3593:
3581:
3151:
2758:
2571:
2512:
1739:
1713:
1540:
1347:
1272:
1022:
1018:
1014:
552:
207:
119:
3131:
3108:
4425:
4383:
4133:
3693:
3298:
3077:
2875:"We Now Know A Lot More About Edward Snowden's Epic Heist — And It's Troubling"
2847:
2610:
2590:
2574:
2338:
2198:
1653:
1198:
1194:
1152:
1091:
1002:
967:
815:
605:
3179:
1141:
stated that they were working actively to address any possible exploit paths.
4455:
4147:
4101:
3967:
3925:
3363:
3193:
2981:
2945:"Vortrag: To Protect And Infect, Part 2 - The militarization of the Internet"
2919:
2814:
2776:
2625:
2424:
2342:
1980:
1734:
Technology that can "infect" networks by installing itself in a computer I/O
1616:
User-configurable persistence implant for certain Juniper Networks firewalls.
1182:
1059:
1026:
254:
2977:"17 exploits the NSA uses to hack PCs, routers and servers for surveillance"
1436:
Tri-band active GSM base station with internal 802.11/GPS/handset capability
4270:
3869:
3848:
3612:
3489:
2666:
If the price is listed in bulk, a calculation is made to get the unit price
2120:
1700:
Technology that can infiltrate the firmware of hard drives manufactured by
1267:
Family of modified USB and Ethernet connectors that can be used to install
1010:
537:
391:
184:
as of 2007, with countries subject to the most data collection shown in red
2349:
is based on its own ability to add backdoors as shown in the ANT catalog.
1329:
GSM communications module capable of collecting and compressing voice data
4189:
4182:
3883:
3266:
2910:
2839:
2767:
2334:
1971:
A concealed device that taps the video signal from a target's computer's
1863:
Software that transmits a mobile phone's location by hidden text message.
1175:
1043:
1021:. In June 2013, Snowden took internal NSA documents which he shared with
1006:
938:
839:
595:
466:
108:
3359:"U.S. Suspicions of China's Huawei Based Partly on NSA's Own Spy Tricks"
2163:
Technology that can reflash the BIOS of multiprocessor systems that run
1107:
Apple denied the allegations that it collaborated on the development of
3707:
3013:
2388:
2064:
955:
929:
590:
249:
3073:"Dell, Cisco 'Deeply Concerned' Over NSA Backdoor Exploit Allegations"
2222:
implant for extracting call logs, contact lists and other information.
1953:
A joint NSA/GCHQ project to develop a radar system to replace CTX4000.
1302:
4337:
4298:
4168:
4059:
3897:
3784:
3123:
3045:
2578:
1854:
1791:
1787:
1397:
1284:
1124:
943:
827:
794:
646:
600:
401:
381:
295:
266:
244:
2076:
2036:
2018:
1992:
1607:
1258:
4323:
4242:
4214:
3763:
2515:
communication capability to software running on the host computer.
2408:
2280:
Network-in-a-box for a GSM network with signaling and call control.
2116:
2112:
2067:
system allowing it to be remotely controlled from NSA headquarters.
1786:
Firmware that can be implanted to create a permanent backdoor in a
1669:
1466:
1242:
954:
unit and are mostly targeted at products from US companies such as
699:
396:
344:
2307:
2231:
2054:
1625:
1409:
1380:
1359:
4365:
4344:
4140:
4094:
3202:
3041:"Apple denies any knowledge of NSA's iPhone surveillance implant"
2620:
2289:
2210:
2188:
2164:
2136:
2094:
2006:
1962:
1944:
1908:
1890:
1821:
1751:
1705:
1482:
1101:
947:
870:
428:
406:
386:
371:
290:
202:
3394:"Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools"
2271:
1691:
1652:
Persistent backdoor technology that can install spyware using a
1643:
1589:
1445:
1320:
1233:
4351:
4087:
2346:
1803:
1725:
1701:
1657:
1552:
1500:
1142:
994:
unit has existed since the late 90s. Its mission is to collect
858:
803:
376:
2496:
2249:
2127:
2.4 and the BLINDDATE software suite. Unit price (2008): $ 6K.
1926:
1777:
1526:
1338:
4256:
4080:
3574:
3523:
3428:
2436:
2168:
2124:
2002:
1872:
1134:
959:
339:
3157:
The perfect weapon: war, sabotage, and fear in the cyber age
1571:
3198:"Commentary: Evidence points to another Snowden at the NSA"
2536:
2420:
2259:
2154:
2104:
1842:
1838:
1834:
1761:
1735:
1462:
1427:
1394:
963:
3425:"NSA Playset invites hackers to 'play along with the NSA'"
3292:
Stöcker, Christian; Rosenbach, Marcel (25 November 2014).
2559:(Bluetooth Low Energy) and allows keystroke surveillance (
2657:
also noted that the document is likely far from complete.
2582:
2508:
2480:
2456:
2452:
2404:
2392:
2367:
2115:
405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4
2108:
1976:
1972:
1514:
1458:
1246:
49:
2757:
1400:
servers via the motherboard BIOS and RAID controller(s).
1679:
1041:
Jacob Appelbaum co-authored the English publication in
3550:"Leaked documents that were not attributed to Snowden"
2693:
When ordering 25 units, the price per item is US$ 1000
966:. The source is believed to be someone different than
3486:"The NSA Playset: Espionage tools for the rest of us"
3110:
Reflections on Ten Years Past The Snowden Revelations
2761:; Horchert, Judith; Stöcker, Christian (2013-12-29).
2593:
with specific interfaces to test data exfiltration.)
2316:
Plugin for collecting information from targets using
996:
intelligence on foreign targets of the United States
2843:"Inside the NSA's Ultra-Secret China Hacking Group"
3294:"Trojaner Regin ist ein Werkzeug von NSA und GCHQ"
3009:"Apple Denies Working with NSA on iPhone Backdoor"
2471:hardware implant, which can access memory and IO.
1656:capable of infecting spyware at a packet level on
1111:in a statement to journalist Arik Hesseldahl from
1088:. On December 30, Appelbaum gave a lecture about "
4453:
3291:
2419:a hard drive with all the needed tools to crack
1812:Audio-based RF retro-reflector listening device.
972:global surveillance disclosures during the 2010s
3453:
2499:bus accessing the computer's operating system.
2337:noted that the software exploits leaked by the
2001:Software that makes DNT implants persistent on
1634:Back door exploit for Huawei Eudemon firewalls.
950:were published. The items are available to the
4120:Global surveillance disclosures (2013–present)
3483:
3387:
3385:
3230:"The NSA may have another leaker on its hands"
1174:Officials at the NSA did not believe that the
629:Global surveillance disclosures (2013–present)
27:Classified catalog of hacking tools by the NSA
3628:
2720:Data Network Technologies, a division of the
1837:processor, 4 MB of flash, 8 MB of RAM, and a
897:
3642:
3391:
3262:"Interactive Graphic: The NSA's Spy Catalog"
2753:
2751:
2749:
3422:
3382:
3635:
3621:
3479:
3477:
3070:
1509:Device that looks identical to a standard
904:
890:
3122:
3105:"Bruce Schneier: Snowden Ten Years Later"
3071:Bent, Kristin; Spring, Tom (2013-12-30).
3038:
2800:
2746:
2523:a hardware implant that is embedded in a
2328:
2103:A small computer intended to be used for
1167:The source who leaked the ANT catalog to
4155:NSA warrantless surveillance (2001–2007)
3587:The NSA Playset a Year of toys and tools
2803:"Unit Offers Spy Gadgets for Every Need"
3496:from the original on September 22, 2017
3474:
3447:
3192:
3102:
2906:"Documents Reveal Top NSA Hacking Unit"
2258:Multi-chip module using a 180 MHz
2123:slot, and 802.11 B/G hardware. Running
1881:Multi-protocol network-in-a-box system.
677:Mass surveillance in the United Kingdom
14:
4454:
3462:from the original on December 28, 2017
3404:from the original on February 25, 2017
3227:
3150:
3006:
2527:cable which allows data exfiltration.
672:Mass surveillance in the United States
3616:
3416:
3306:from the original on 28 November 2014
2974:
2009:-variant) J-series routers/firewalls.
970:, who is largely responsible for the
624:2005 warrantless surveillance scandal
2631:
2063:Software that can be implanted on a
3356:
3324:
1187:United States intelligence agencies
24:
3993:Information Warfare Support Center
3541:
3484:Sean Gallagher (August 11, 2015).
3435:from the original on June 19, 2017
3392:Lucy Teitler (November 17, 2014).
3064:
2872:
2535:a hardware implant exploiting the
2507:a hardware implant concealed in a
2407:frequency analyzer disguised as a
2318:Windows Management Instrumentation
1299:
25:
4493:
3750:Misawa Security Operations Center
3568:
3454:Michael Ossmann (July 31, 2014).
2975:Storm, Darlene (3 January 2014).
2606:Cyberwarfare in the United States
2511:cable which provides short range
1851:
1281:
182:Map of global NSA data collection
149:Year of intended declassification
4433:Vulnerabilities Equities Process
3829:
3673:Consolidated Intelligence Center
3659:Alaska Mission Operations Center
3547:
2763:"Catalog Advertises NSA Toolbox"
2711:Varies from platform to platform
2345:that US government suspicion of
2306:
2288:
2270:
2248:
2230:
2209:
2201:to provide location information.
2187:
2153:
2135:
2093:
2075:
2073:
2053:
2035:
2033:
2017:
2015:
1991:
1989:
1961:
1943:
1925:
1907:
1889:
1871:
1853:
1820:
1802:
1776:
1750:
1724:
1690:
1668:
1642:
1624:
1606:
1604:
1588:
1570:
1551:
1525:
1499:
1481:
1444:
1426:
1408:
1379:
1358:
1337:
1319:
1301:
1283:
1257:
1255:
1232:
1213:Capabilities in the ANT catalog
869:
857:
838:
826:
814:
802:
782:
772:
762:
752:
742:
732:
722:
321:President's Surveillance Program
175:
161:
40:
4074:Secure Terminal Equipment (STE)
3556:from the original on 2022-02-24
3508:
3371:from the original on 2021-12-21
3350:
3339:from the original on 2021-12-18
3318:
3285:
3254:
3221:
3210:from the original on 2022-02-24
3186:
3144:
3115:Internet Engineering Task Force
3096:
3085:from the original on 2022-04-07
3053:from the original on 2021-12-18
3032:
3021:from the original on 2022-02-24
3000:
2989:from the original on 2021-12-18
2957:from the original on 2021-11-02
2926:from the original on 2019-02-06
2887:from the original on 2022-04-06
2855:from the original on 2022-02-12
2838:
2821:from the original on 2022-04-11
2801:Appelbaum, Jacob (2013-12-30).
2783:from the original on 2014-01-04
2726:
2714:
2705:
2696:
2687:
2678:
2669:
2660:
1666:
1031:global surveillance disclosures
4391:Institute for Defense Analyses
3757:Multiprogram Research Facility
3103:Farrell, Stephen (July 2023).
2968:
2937:
2898:
2866:
2832:
2794:
2647:
2638:
2352:
2228:
2051:
1622:
1406:
1377:
1356:
1036:
326:Terrorist Surveillance Program
13:
1:
3423:Violet Blue (June 11, 2014).
3039:Robertson, Adi (2013-12-31).
2739:
2286:
2207:
2185:
2133:
2091:
1959:
1941:
1905:
1887:
1818:
1748:
1479:
1368:GSM Base Station Router as a
1311:Stacked Ethernet and USB plug
985:
505:Senate Intelligence Committee
3270:. 2013-12-30. Archived from
3228:Pasick, Adam (4 July 2014).
2684:Including installation costs
2411:phone; named after GENESIS.
2268:
1688:
1640:
1586:
1442:
1317:
1230:
1185:, who is specialized in the
1098:Chaos Communication Congress
69:ANT product catalog for the
7:
4477:Spyware used by governments
4405:National Cryptologic School
4398:National Cryptologic Museum
3736:Interagency Training Center
3694:European Cryptologic Center
3666:Colorado Cryptologic Center
2599:
2491:uses a pin on a computer's
2107:collection, including from
1800:
1722:
1549:
1497:
1389:Technology that installs a
482:FISA Amendments Act of 2008
477:Protect America Act of 2007
316:Total Information Awareness
56:, used on all catalog pages
10:
4498:
4264:Real Time Regional Gateway
4007:Special Collection Service
3722:Georgia Cryptologic Center
3357:Hsu, Jeremy (2014-03-26).
3160:(1st ed.). New York:
2722:Tailored Access Operations
2395:communication monitoring.
2246:
1923:
1774:
1523:
1335:
1204:
992:Tailored Access Operations
952:Tailored Access Operations
279:Tailored Access Operations
71:Tailored Access Operations
4375:
4315:
4199:
4111:
4044:
3977:
3838:
3827:
3729:Hawaii Cryptologic Center
3701:European Technical Center
3650:
2616:MiniPanzer and MegaPanzer
1869:
1226:
1223:
1220:
1217:
1162:
652:Surveillance of reporters
510:National Security Council
148:
140:
115:
103:
95:
87:
77:
62:
39:
34:
4472:National Security Agency
3820:Pacific Technical Center
3806:Texas Cryptologic Center
3644:National Security Agency
1568:
1013:, a former colleague of
934:National Security Agency
168:National Security Agency
82:National Security Agency
54:Central Security Service
4412:National Vigilance Park
2495:port to attack via the
2151:
1539:features to record the
1535:GSM handset with added
1517:to the target computer.
1424:
1245:device that emulates a
1171:is unknown as of 2024.
4236:Insider Threat Program
3933:John Michael McConnell
3516:"NSA Playset homepage"
3162:Crown Publishing Group
2555:software that targets
2439:reconnaissance drone.
2329:Follow-up developments
1537:software-defined radio
1131:chief security officer
667:Insider Threat Program
116:Authors of publication
96:Date of catalog sheets
3919:William Eldridge Odom
3552:. Electrospaces.net.
2732:100 units for 625,000
2483:exploitation device.
1271:software and work as
1157:Department of Defense
472:Homeland Security Act
366:Databases, tools etc.
4176:Thomas Andrews Drake
2360:open-source hardware
1760:Implant based on an
1393:software implant on
1122:s Digital Network).
976:open-source hardware
662:UN diplomatic spying
4208:Boundless Informant
3863:Laurence Hugh Frost
2873:Kelley, Michael B.
2432:PORCUPINEMASQUERADE
1227:Unit price in US$
1214:
1118:Wall Street Journal
1029:, resulting in the
533:Hepting v. AT&T
452:Privacy Act of 1974
230:Upstream collection
141:Date of publication
3954:Keith B. Alexander
3891:Samuel C. Phillips
3605:2021-12-18 at the
3592:2022-01-20 at the
3580:2023-01-30 at the
3520:www.nsaplayset.org
3458:. Mossman's blog.
3242:on 23 October 2014
3007:Hesseldahl, Arik.
1212:
1191:commentary article
1189:, noted in a 2016
1113:All Things Digital
543:Clapper v. Amnesty
418:GCHQ collaboration
412:BOUNDLESSINFORMANT
4467:Espionage devices
4449:
4448:
4419:NSA Hall of Honor
3961:Michael S. Rogers
3912:Lincoln D. Faurer
3596:at Black Hat 2015
3456:"The NSA Playset"
3325:Hackett, Robert.
3171:978-0-451-49789-5
2632:Explanatory notes
2597:
2596:
2563:) and injection.
2384:TWILIGHTVEGETABLE
2326:
2325:
1831:Multi-chip module
1455:Direction finding
1049:Christian Stöcker
914:
913:
156:
155:
124:Christian Stöcker
58:
16:(Redirected from
4489:
4442:
4435:
4428:
4421:
4414:
4407:
4400:
4393:
4386:
4368:
4361:
4354:
4347:
4340:
4333:
4326:
4308:
4301:
4294:
4287:
4280:
4273:
4266:
4259:
4252:
4245:
4238:
4231:
4224:
4217:
4210:
4192:
4185:
4178:
4171:
4164:
4157:
4150:
4143:
4136:
4129:
4127:Church Committee
4122:
4104:
4097:
4090:
4083:
4076:
4069:
4062:
4055:
4037:
4030:
4023:
4016:
4009:
4002:
3995:
3988:
3970:
3963:
3956:
3949:
3942:
3935:
3928:
3921:
3914:
3907:
3900:
3893:
3886:
3879:
3872:
3865:
3858:
3851:
3833:
3832:
3822:
3815:
3813:Utah Data Center
3808:
3801:
3794:
3787:
3780:
3773:
3771:RAF Menwith Hill
3766:
3759:
3752:
3745:
3738:
3731:
3724:
3717:
3715:Friendship Annex
3710:
3703:
3696:
3689:
3682:
3675:
3668:
3661:
3637:
3630:
3623:
3614:
3613:
3609:at Toorcamp 2014
3575:NSA Playset wiki
3564:
3562:
3561:
3535:
3534:
3532:
3531:
3522:. Archived from
3512:
3506:
3505:
3503:
3501:
3481:
3472:
3471:
3469:
3467:
3451:
3445:
3444:
3442:
3440:
3420:
3414:
3413:
3411:
3409:
3398:Vice Motherboard
3389:
3380:
3379:
3377:
3376:
3354:
3348:
3347:
3345:
3344:
3322:
3316:
3315:
3313:
3311:
3289:
3283:
3282:
3280:
3279:
3258:
3252:
3251:
3249:
3247:
3238:. Archived from
3225:
3219:
3218:
3216:
3215:
3190:
3184:
3183:
3152:Sanger, David E.
3148:
3142:
3141:
3139:
3138:
3126:
3124:10.17487/RFC9446
3100:
3094:
3093:
3091:
3090:
3068:
3062:
3061:
3059:
3058:
3036:
3030:
3029:
3027:
3026:
3004:
2998:
2997:
2995:
2994:
2972:
2966:
2965:
2963:
2962:
2941:
2935:
2934:
2932:
2931:
2902:
2896:
2895:
2893:
2892:
2880:Business Insider
2870:
2864:
2863:
2861:
2860:
2836:
2830:
2829:
2827:
2826:
2798:
2792:
2791:
2789:
2788:
2759:Appelbaum, Jacob
2755:
2733:
2730:
2724:
2718:
2712:
2709:
2703:
2700:
2694:
2691:
2685:
2682:
2676:
2673:
2667:
2664:
2658:
2651:
2645:
2642:
2373:
2372:
2333:Security expert
2310:
2292:
2274:
2252:
2234:
2213:
2197:Radio frequency
2191:
2157:
2139:
2111:. Hardware: IBM
2097:
2079:
2057:
2039:
2021:
1995:
1965:
1947:
1929:
1911:
1893:
1875:
1857:
1845:microcontroller.
1824:
1806:
1780:
1754:
1728:
1694:
1672:
1646:
1628:
1610:
1592:
1574:
1555:
1529:
1503:
1485:
1457:application for
1448:
1430:
1412:
1383:
1370:Network-In-a-Box
1362:
1341:
1323:
1305:
1287:
1273:wireless bridges
1261:
1249:cellphone tower.
1236:
1215:
1211:
1087:
1076:
1064:Marcel Rosenbach
1057:
906:
899:
892:
874:
873:
862:
861:
843:
842:
831:
830:
819:
818:
807:
806:
786:
776:
766:
756:
746:
736:
726:
558:Wikimedia v. NSA
548:Klayman v. Obama
447:Safe Streets Act
179:
165:
158:
157:
144:30 December 2013
132:
46:
44:
32:
31:
21:
4497:
4496:
4492:
4491:
4490:
4488:
4487:
4486:
4452:
4451:
4450:
4445:
4440:Zendian Problem
4438:
4431:
4424:
4417:
4410:
4403:
4396:
4389:
4382:
4371:
4364:
4357:
4350:
4343:
4336:
4329:
4322:
4311:
4304:
4297:
4290:
4283:
4276:
4269:
4262:
4255:
4248:
4241:
4234:
4227:
4220:
4213:
4206:
4195:
4188:
4181:
4174:
4167:
4160:
4153:
4146:
4139:
4132:
4125:
4118:
4107:
4100:
4093:
4086:
4079:
4072:
4065:
4058:
4051:
4040:
4033:
4026:
4019:
4012:
4005:
3998:
3991:
3984:
3973:
3966:
3959:
3952:
3945:
3940:Kenneth Minihan
3938:
3931:
3924:
3917:
3910:
3905:Bobby Ray Inman
3903:
3896:
3889:
3882:
3877:Marshall Carter
3875:
3868:
3861:
3856:John A. Samford
3854:
3847:
3834:
3830:
3825:
3818:
3811:
3804:
3797:
3790:
3783:
3776:
3769:
3762:
3755:
3748:
3741:
3734:
3727:
3720:
3713:
3706:
3699:
3692:
3685:
3678:
3671:
3664:
3657:
3646:
3641:
3607:Wayback Machine
3594:Wayback Machine
3582:Wayback Machine
3571:
3559:
3557:
3544:
3542:Further reading
3539:
3538:
3529:
3527:
3514:
3513:
3509:
3499:
3497:
3482:
3475:
3465:
3463:
3452:
3448:
3438:
3436:
3421:
3417:
3407:
3405:
3390:
3383:
3374:
3372:
3355:
3351:
3342:
3340:
3323:
3319:
3309:
3307:
3290:
3286:
3277:
3275:
3260:
3259:
3255:
3245:
3243:
3226:
3222:
3213:
3211:
3191:
3187:
3172:
3149:
3145:
3136:
3134:
3117:. sec. 2.
3101:
3097:
3088:
3086:
3069:
3065:
3056:
3054:
3037:
3033:
3024:
3022:
3005:
3001:
2992:
2990:
2973:
2969:
2960:
2958:
2943:
2942:
2938:
2929:
2927:
2904:
2903:
2899:
2890:
2888:
2871:
2867:
2858:
2856:
2840:Aid, Matthew M.
2837:
2833:
2824:
2822:
2799:
2795:
2786:
2784:
2756:
2747:
2742:
2737:
2736:
2731:
2727:
2719:
2715:
2710:
2706:
2701:
2697:
2692:
2688:
2683:
2679:
2674:
2670:
2665:
2661:
2652:
2648:
2643:
2639:
2634:
2602:
2591:retroreflectors
2585:), SALSAFLOCK (
2581:), TANGOFLOCK (
2572:Radio frequency
2513:radio frequency
2355:
2331:
1714:Western Digital
1541:radio frequency
1348:Continuous wave
1308:COTTONMOUTH-III
1207:
1165:
1094:of the Internet
1081:
1070:
1051:
1039:
1023:Glenn Greenwald
1019:The Tor Project
1015:Jacob Appelbaum
988:
948:spying software
910:
881:
880:
868:
856:
837:
825:
813:
801:
713:
705:
704:
690:
682:
681:
642:
634:
633:
619:
611:
610:
576:
568:
567:
553:ACLU v. Clapper
523:
515:
514:
495:
487:
486:
442:
434:
433:
193:
185:
166:
135:Judith Horchert
126:
120:Jacob Appelbaum
88:Number of pages
78:Original author
45:
28:
23:
22:
18:NSA ANT catalog
15:
12:
11:
5:
4495:
4485:
4484:
4479:
4474:
4469:
4464:
4447:
4446:
4444:
4443:
4436:
4429:
4422:
4415:
4408:
4401:
4394:
4387:
4384:Dundee Society
4379:
4377:
4373:
4372:
4370:
4369:
4362:
4355:
4348:
4341:
4334:
4327:
4319:
4317:
4313:
4312:
4310:
4309:
4302:
4295:
4288:
4281:
4274:
4267:
4260:
4253:
4246:
4239:
4232:
4225:
4218:
4211:
4203:
4201:
4197:
4196:
4194:
4193:
4186:
4179:
4172:
4165:
4162:Pike Committee
4158:
4151:
4144:
4137:
4134:Edward Snowden
4130:
4123:
4115:
4113:
4109:
4108:
4106:
4105:
4098:
4091:
4084:
4077:
4070:
4063:
4056:
4048:
4046:
4042:
4041:
4039:
4038:
4031:
4024:
4017:
4010:
4003:
3996:
3989:
3981:
3979:
3975:
3974:
3972:
3971:
3964:
3957:
3950:
3947:Michael Hayden
3943:
3936:
3929:
3922:
3915:
3908:
3901:
3894:
3887:
3880:
3873:
3866:
3859:
3852:
3844:
3842:
3836:
3835:
3828:
3826:
3824:
3823:
3816:
3809:
3802:
3795:
3788:
3781:
3774:
3767:
3760:
3753:
3746:
3739:
3732:
3725:
3718:
3711:
3704:
3697:
3690:
3683:
3676:
3669:
3662:
3654:
3652:
3648:
3647:
3640:
3639:
3632:
3625:
3617:
3611:
3610:
3597:
3584:
3570:
3569:External links
3567:
3566:
3565:
3543:
3540:
3537:
3536:
3507:
3473:
3446:
3415:
3381:
3349:
3317:
3299:Spiegel Online
3284:
3253:
3220:
3196:(2016-08-22).
3194:Bamford, James
3185:
3170:
3164:. p. 74.
3143:
3095:
3063:
3031:
2999:
2967:
2936:
2914:. 2013-12-29.
2897:
2865:
2848:Foreign Policy
2831:
2793:
2744:
2743:
2741:
2738:
2735:
2734:
2725:
2713:
2704:
2695:
2686:
2677:
2675:For two months
2668:
2659:
2646:
2636:
2635:
2633:
2630:
2629:
2628:
2623:
2618:
2613:
2611:Equation Group
2608:
2601:
2598:
2595:
2594:
2575:retroreflector
2569:
2565:
2564:
2553:
2549:
2548:
2545:
2541:
2540:
2533:
2529:
2528:
2521:
2517:
2516:
2505:
2501:
2500:
2489:
2485:
2484:
2477:
2473:
2472:
2465:
2461:
2460:
2445:
2441:
2440:
2433:
2429:
2428:
2425:rainbow tables
2423:including the
2417:
2413:
2412:
2401:
2397:
2396:
2385:
2381:
2380:
2377:
2354:
2351:
2339:Shadow Brokers
2330:
2327:
2324:
2323:
2320:
2314:
2311:
2303:
2302:
2299:
2296:
2293:
2285:
2284:
2281:
2278:
2275:
2267:
2266:
2263:
2256:
2253:
2245:
2244:
2241:
2238:
2235:
2227:
2226:
2223:
2217:
2214:
2206:
2205:
2202:
2199:retroreflector
2195:
2192:
2184:
2183:
2180:
2161:
2158:
2150:
2149:
2146:
2143:
2140:
2132:
2131:
2128:
2101:
2098:
2090:
2089:
2086:
2083:
2080:
2072:
2071:
2068:
2061:
2058:
2050:
2049:
2046:
2043:
2040:
2032:
2031:
2028:
2025:
2022:
2014:
2013:
2010:
1999:
1996:
1988:
1987:
1984:
1969:
1966:
1958:
1957:
1954:
1951:
1948:
1940:
1939:
1936:
1933:
1930:
1922:
1921:
1918:
1915:
1912:
1904:
1903:
1900:
1897:
1894:
1886:
1885:
1882:
1879:
1876:
1868:
1867:
1864:
1861:
1860:MONKEYCALENDAR
1858:
1850:
1849:
1846:
1828:
1825:
1817:
1816:
1813:
1810:
1807:
1799:
1798:
1795:
1784:
1781:
1773:
1772:
1769:
1758:
1755:
1747:
1746:
1743:
1732:
1729:
1721:
1720:
1717:
1698:
1695:
1687:
1686:
1683:
1676:
1673:
1665:
1664:
1661:
1654:quantum insert
1650:
1647:
1639:
1638:
1635:
1632:
1629:
1621:
1620:
1617:
1614:
1611:
1603:
1602:
1599:
1596:
1593:
1585:
1584:
1581:
1578:
1575:
1567:
1566:
1563:
1559:
1556:
1548:
1547:
1544:
1533:
1530:
1522:
1521:
1518:
1507:
1504:
1496:
1495:
1492:
1489:
1486:
1478:
1477:
1474:
1452:
1449:
1441:
1440:
1437:
1434:
1431:
1423:
1422:
1419:
1416:
1413:
1405:
1404:
1401:
1387:
1384:
1376:
1375:
1372:
1366:
1363:
1355:
1354:
1351:
1345:
1342:
1334:
1333:
1330:
1327:
1324:
1316:
1315:
1312:
1309:
1306:
1298:
1297:
1294:
1291:
1290:COTTONMOUTH-II
1288:
1280:
1279:
1276:
1265:
1262:
1254:
1253:
1250:
1240:
1237:
1229:
1228:
1225:
1222:
1219:
1206:
1203:
1199:Bruce Schneier
1195:Edward Snowden
1164:
1161:
1153:Bruce Schneier
1096:" at the 30th
1092:militarization
1068:Jörg Schindler
1038:
1035:
1009:together with
1003:Edward Snowden
987:
984:
968:Edward Snowden
912:
911:
909:
908:
901:
894:
886:
883:
882:
879:
878:
866:
853:
852:
848:
847:
835:
823:
811:
798:
797:
791:
790:
780:
770:
760:
750:
740:
730:
719:
718:
714:
711:
710:
707:
706:
703:
702:
697:
691:
688:
687:
684:
683:
680:
679:
674:
669:
664:
659:
654:
649:
643:
640:
639:
636:
635:
632:
631:
626:
620:
617:
616:
613:
612:
609:
608:
606:Edward Snowden
603:
598:
593:
588:
583:
581:William Binney
577:
575:Whistleblowers
574:
573:
570:
569:
566:
565:
560:
555:
550:
545:
540:
535:
530:
524:
521:
520:
517:
516:
513:
512:
507:
502:
496:
493:
492:
489:
488:
485:
484:
479:
474:
469:
464:
459:
454:
449:
443:
440:
439:
436:
435:
432:
431:
426:
420:
419:
415:
414:
409:
404:
399:
394:
389:
384:
379:
374:
368:
367:
363:
362:
357:
352:
347:
342:
336:
335:
331:
330:
329:
328:
318:
313:
308:
303:
298:
293:
287:
286:
282:
281:
275:
274:
270:
269:
263:
262:
258:
257:
252:
247:
242:
237:
232:
226:
225:
221:
220:
215:
210:
205:
199:
198:
194:
191:
190:
187:
186:
180:
172:
171:
154:
153:
150:
146:
145:
142:
138:
137:
117:
113:
112:
105:
101:
100:
97:
93:
92:
89:
85:
84:
79:
75:
74:
64:
60:
59:
37:
36:
26:
9:
6:
4:
3:
2:
4494:
4483:
4480:
4478:
4475:
4473:
4470:
4468:
4465:
4463:
4460:
4459:
4457:
4441:
4437:
4434:
4430:
4427:
4423:
4420:
4416:
4413:
4409:
4406:
4402:
4399:
4395:
4392:
4388:
4385:
4381:
4380:
4378:
4374:
4367:
4363:
4360:
4356:
4353:
4349:
4346:
4342:
4339:
4335:
4332:
4328:
4325:
4321:
4320:
4318:
4314:
4307:
4303:
4300:
4296:
4293:
4289:
4286:
4282:
4279:
4275:
4272:
4268:
4265:
4261:
4258:
4254:
4251:
4247:
4244:
4240:
4237:
4233:
4230:
4226:
4223:
4219:
4216:
4212:
4209:
4205:
4204:
4202:
4198:
4191:
4187:
4184:
4180:
4177:
4173:
4170:
4166:
4163:
4159:
4156:
4152:
4149:
4148:James Bamford
4145:
4142:
4138:
4135:
4131:
4128:
4124:
4121:
4117:
4116:
4114:
4110:
4103:
4102:WARRIOR PRIDE
4099:
4096:
4092:
4089:
4085:
4082:
4078:
4075:
4071:
4068:
4064:
4061:
4057:
4054:
4050:
4049:
4047:
4043:
4036:
4032:
4029:
4025:
4022:
4018:
4015:
4011:
4008:
4004:
4001:
3997:
3994:
3990:
3987:
3983:
3982:
3980:
3976:
3969:
3968:Paul Nakasone
3965:
3962:
3958:
3955:
3951:
3948:
3944:
3941:
3937:
3934:
3930:
3927:
3926:Bill Studeman
3923:
3920:
3916:
3913:
3909:
3906:
3902:
3899:
3895:
3892:
3888:
3885:
3881:
3878:
3874:
3871:
3867:
3864:
3860:
3857:
3853:
3850:
3846:
3845:
3843:
3841:
3837:
3821:
3817:
3814:
3810:
3807:
3803:
3800:
3796:
3793:
3789:
3786:
3782:
3779:
3778:Roaring Creek
3775:
3772:
3768:
3765:
3761:
3758:
3754:
3751:
3747:
3744:
3740:
3737:
3733:
3730:
3726:
3723:
3719:
3716:
3712:
3709:
3705:
3702:
3698:
3695:
3691:
3688:
3684:
3681:
3677:
3674:
3670:
3667:
3663:
3660:
3656:
3655:
3653:
3649:
3645:
3638:
3633:
3631:
3626:
3624:
3619:
3618:
3615:
3608:
3604:
3601:
3598:
3595:
3591:
3588:
3585:
3583:
3579:
3576:
3573:
3572:
3555:
3551:
3548:Koop, Peter.
3546:
3545:
3526:on 2023-01-30
3525:
3521:
3517:
3511:
3495:
3491:
3487:
3480:
3478:
3461:
3457:
3450:
3434:
3430:
3426:
3419:
3403:
3399:
3395:
3388:
3386:
3370:
3366:
3365:
3364:IEEE Spectrum
3360:
3353:
3338:
3334:
3333:
3328:
3321:
3305:
3302:(in German).
3301:
3300:
3295:
3288:
3274:on 2014-01-02
3273:
3269:
3268:
3263:
3257:
3241:
3237:
3236:
3231:
3224:
3209:
3205:
3204:
3199:
3195:
3189:
3181:
3177:
3173:
3167:
3163:
3159:
3158:
3153:
3147:
3133:
3130:
3125:
3120:
3116:
3112:
3111:
3106:
3099:
3084:
3080:
3079:
3074:
3067:
3052:
3048:
3047:
3042:
3035:
3020:
3016:
3015:
3010:
3003:
2988:
2984:
2983:
2982:Computerworld
2978:
2971:
2956:
2952:
2951:
2946:
2940:
2925:
2921:
2917:
2913:
2912:
2907:
2901:
2886:
2882:
2881:
2876:
2869:
2854:
2850:
2849:
2844:
2841:
2835:
2820:
2816:
2812:
2808:
2804:
2797:
2782:
2778:
2774:
2770:
2769:
2764:
2760:
2754:
2752:
2750:
2745:
2729:
2723:
2717:
2708:
2699:
2690:
2681:
2672:
2663:
2656:
2650:
2641:
2637:
2627:
2626:WARRIOR PRIDE
2624:
2622:
2619:
2617:
2614:
2612:
2609:
2607:
2604:
2603:
2592:
2588:
2584:
2580:
2576:
2573:
2570:
2567:
2566:
2562:
2558:
2554:
2551:
2550:
2546:
2543:
2542:
2538:
2534:
2531:
2530:
2526:
2522:
2519:
2518:
2514:
2510:
2506:
2503:
2502:
2498:
2494:
2490:
2487:
2486:
2482:
2478:
2476:ADAPTERNOODLE
2475:
2474:
2470:
2466:
2463:
2462:
2458:
2454:
2451:in form of a
2450:
2446:
2443:
2442:
2438:
2434:
2431:
2430:
2426:
2422:
2418:
2415:
2414:
2410:
2406:
2402:
2399:
2398:
2394:
2390:
2386:
2383:
2382:
2378:
2375:
2374:
2371:
2369:
2365:
2361:
2350:
2348:
2344:
2343:IEEE Spectrum
2340:
2336:
2321:
2319:
2315:
2312:
2309:
2305:
2304:
2300:
2297:
2294:
2291:
2287:
2282:
2279:
2276:
2273:
2269:
2264:
2261:
2257:
2254:
2251:
2247:
2242:
2239:
2236:
2233:
2229:
2224:
2221:
2218:
2215:
2212:
2208:
2203:
2200:
2196:
2193:
2190:
2186:
2181:
2178:
2174:
2170:
2166:
2162:
2159:
2156:
2152:
2147:
2144:
2141:
2138:
2134:
2129:
2126:
2122:
2118:
2114:
2110:
2106:
2102:
2099:
2096:
2092:
2087:
2084:
2082:SOUFFLETROUGH
2081:
2078:
2074:
2069:
2066:
2062:
2059:
2056:
2052:
2047:
2044:
2042:STUCCOMONTANA
2041:
2038:
2034:
2029:
2026:
2024:SIERRAMONTANA
2023:
2020:
2016:
2011:
2008:
2004:
2000:
1998:SCHOOLMONTANA
1997:
1994:
1990:
1985:
1982:
1981:ferrite choke
1978:
1974:
1970:
1967:
1964:
1960:
1955:
1952:
1949:
1946:
1942:
1937:
1934:
1931:
1928:
1924:
1919:
1916:
1913:
1910:
1906:
1901:
1898:
1895:
1892:
1888:
1883:
1880:
1877:
1874:
1870:
1865:
1862:
1859:
1856:
1852:
1847:
1844:
1840:
1836:
1832:
1829:
1826:
1823:
1819:
1814:
1811:
1808:
1805:
1801:
1796:
1793:
1789:
1785:
1782:
1779:
1775:
1770:
1767:
1763:
1759:
1756:
1753:
1749:
1744:
1741:
1737:
1733:
1730:
1727:
1723:
1718:
1715:
1711:
1707:
1703:
1699:
1696:
1693:
1689:
1684:
1681:
1677:
1674:
1671:
1667:
1662:
1659:
1655:
1651:
1648:
1645:
1641:
1636:
1633:
1630:
1627:
1623:
1618:
1615:
1613:GOURMETTROUGH
1612:
1609:
1605:
1600:
1597:
1594:
1591:
1587:
1582:
1579:
1576:
1573:
1569:
1564:
1560:
1557:
1554:
1550:
1545:
1542:
1538:
1534:
1531:
1528:
1524:
1519:
1516:
1512:
1508:
1505:
1502:
1498:
1493:
1490:
1487:
1484:
1480:
1475:
1472:
1468:
1464:
1460:
1456:
1453:
1450:
1447:
1443:
1438:
1435:
1432:
1429:
1425:
1420:
1417:
1414:
1411:
1407:
1402:
1399:
1396:
1392:
1388:
1385:
1382:
1378:
1373:
1371:
1367:
1364:
1361:
1357:
1352:
1349:
1346:
1343:
1340:
1336:
1331:
1328:
1325:
1322:
1318:
1313:
1310:
1307:
1304:
1300:
1295:
1292:
1289:
1286:
1282:
1277:
1274:
1270:
1266:
1264:COTTONMOUTH-I
1263:
1260:
1256:
1251:
1248:
1244:
1241:
1238:
1235:
1231:
1216:
1210:
1202:
1200:
1196:
1192:
1188:
1184:
1183:James Bamford
1179:
1177:
1172:
1170:
1160:
1158:
1154:
1150:
1148:
1144:
1140:
1136:
1132:
1127:
1126:
1121:
1119:
1115:(part of the
1114:
1110:
1105:
1103:
1099:
1095:
1093:
1085:
1080:
1074:
1069:
1065:
1061:
1060:Laura Poitras
1055:
1050:
1046:
1045:
1034:
1032:
1028:
1027:Laura Poitras
1024:
1020:
1016:
1012:
1008:
1004:
999:
997:
993:
983:
981:
977:
973:
969:
965:
961:
957:
953:
949:
945:
941:
940:
935:
931:
927:
923:
919:
907:
902:
900:
895:
893:
888:
887:
885:
884:
877:
872:
867:
865:
860:
855:
854:
850:
849:
846:
841:
836:
834:
829:
824:
822:
817:
812:
810:
805:
800:
799:
796:
793:
792:
789:
785:
781:
779:
775:
771:
769:
765:
761:
759:
755:
751:
749:
745:
741:
739:
735:
731:
729:
725:
721:
720:
717:United States
716:
715:
712:Collaboration
709:
708:
701:
698:
696:
693:
692:
686:
685:
678:
675:
673:
670:
668:
665:
663:
660:
658:
657:Mail tracking
655:
653:
650:
648:
645:
644:
638:
637:
630:
627:
625:
622:
621:
615:
614:
607:
604:
602:
599:
597:
594:
592:
589:
587:
584:
582:
579:
578:
572:
571:
564:
561:
559:
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
531:
529:
526:
525:
519:
518:
511:
508:
506:
503:
501:
498:
497:
491:
490:
483:
480:
478:
475:
473:
470:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
444:
438:
437:
430:
427:
425:
422:
421:
417:
416:
413:
410:
408:
405:
403:
400:
398:
395:
393:
390:
388:
385:
383:
380:
378:
375:
373:
370:
369:
365:
364:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
337:
333:
332:
327:
324:
323:
322:
319:
317:
314:
312:
309:
307:
304:
302:
299:
297:
294:
292:
289:
288:
284:
283:
280:
277:
276:
272:
271:
268:
265:
264:
260:
259:
256:
253:
251:
248:
246:
243:
241:
238:
236:
233:
231:
228:
227:
223:
222:
219:
216:
214:
211:
209:
206:
204:
201:
200:
196:
195:
189:
188:
183:
178:
174:
173:
169:
164:
160:
159:
151:
147:
143:
139:
136:
130:
125:
121:
118:
114:
111:
110:
106:
102:
98:
94:
90:
86:
83:
80:
76:
72:
68:
65:
61:
57:
55:
51:
48:Seals of the
43:
38:
33:
30:
19:
4482:Surveillance
4306:Epic Shelter
4271:Stellar Wind
4052:
3870:Gordon Blake
3849:Ralph Canine
3558:. Retrieved
3528:. Retrieved
3524:the original
3519:
3510:
3498:. Retrieved
3490:Ars Technica
3464:. Retrieved
3449:
3437:. Retrieved
3418:
3406:. Retrieved
3373:. Retrieved
3362:
3352:
3341:. Retrieved
3330:
3320:
3308:. Retrieved
3297:
3287:
3276:. Retrieved
3272:the original
3265:
3256:
3244:. Retrieved
3240:the original
3233:
3223:
3212:. Retrieved
3201:
3188:
3156:
3146:
3135:. Retrieved
3109:
3098:
3087:. Retrieved
3076:
3066:
3055:. Retrieved
3044:
3034:
3023:. Retrieved
3012:
3002:
2991:. Retrieved
2980:
2970:
2959:. Retrieved
2948:
2939:
2928:. Retrieved
2909:
2900:
2889:. Retrieved
2878:
2868:
2857:. Retrieved
2846:
2834:
2823:. Retrieved
2806:
2796:
2785:. Retrieved
2766:
2728:
2716:
2707:
2698:
2689:
2680:
2671:
2662:
2654:
2649:
2640:
2520:BLINKERCOUGH
2504:TURNIPSCHOOL
2464:SLOTSCREAMER
2416:DRIZZLECHAIR
2403:a hand held
2379:Description
2356:
2332:
2121:CompactFlash
1764:core and an
1675:HOWLERMONKEY
1269:Trojan horse
1224:Description
1208:
1180:
1173:
1168:
1166:
1151:
1146:
1123:
1116:
1108:
1106:
1089:
1079:Holger Stark
1042:
1040:
1011:Runa Sandvik
1005:organized a
1000:
989:
946:devices and
937:
932:by the U.S.
921:
917:
915:
586:Thomas Drake
563:US v. Moalin
538:Jewel v. NSA
494:Institutions
392:TRAFFICTHIEF
170:surveillance
107:
47:
29:
4462:Der Spiegel
4278:TRAILBLAZER
4190:Matthew Aid
4183:Thomas Tamm
4112:Controversy
4053:ANT catalog
3884:Noel Gayler
3799:Sugar Grove
3743:Kent Island
3687:Dorsey Road
3600:NSA Playset
3267:Der Spiegel
2911:Der Spiegel
2807:Der Spiegel
2768:Der Spiegel
2702:Up to 4,000
2655:Der Spiegel
2532:SAVIORBURST
2353:NSA Playset
2335:Matt Suiche
2313:WISTFULTOLL
2237:TOTEGHOSTLY
2060:SOMBERKNAVE
1790:series and
1631:HALLUXWATER
1415:DROPOUTJEEP
1386:DEITYBOUNCE
1365:CYCLONE-HX9
1176:web crawler
1169:Der Spiegel
1147:Der Spiegel
1109:DROPOUTJEEP
1082: [
1071: [
1052: [
1044:Der Spiegel
1037:Publication
1007:CryptoParty
939:Der Spiegel
922:TAO catalog
918:ANT catalog
618:Publication
596:Thomas Tamm
528:ACLU v. NSA
467:Patriot Act
441:Legislation
301:Trailblazer
127: [
109:Der Spiegel
63:Description
35:ANT catalog
4456:Categories
4331:Interquake
4285:Turbulence
4045:Technology
3792:Salt Creek
3708:Fort Meade
3560:2022-04-12
3530:2021-12-18
3375:2021-12-21
3343:2021-12-18
3310:2 February
3278:2022-04-07
3246:7 February
3214:2022-02-09
3180:1039082430
3137:2023-10-28
3089:2022-04-08
3057:2021-12-18
3025:2021-12-18
3014:AllThingsD
2993:2021-12-18
2961:2021-12-18
2930:2022-02-09
2891:2022-04-06
2859:2022-02-12
2825:2022-04-11
2787:2021-12-21
2740:References
2568:CONGAFLOCK
2544:CACTUSTUTU
2444:KEYSWEEPER
2435:a passive
2389:boot image
2295:WATERWITCH
2220:Windows CE
2216:TOTECHASER
2194:TAWDRYYARD
2142:SURLYSPAWN
2100:SPARROW II
2065:Windows XP
1968:RAGEMASTER
1950:PHOTOANGLO
1914:NIGHTWATCH
1896:NIGHTSTAND
1827:MAESTRO-II
1794:firewalls.
1757:JUNIORMINT
1488:FEEDTROUGH
1221:Code name
986:Background
926:classified
591:Mark Klein
334:Since 2007
306:Turbulence
285:Since 2001
273:Since 1998
261:Since 1990
250:ThinThread
224:Since 1978
67:Classified
4338:Main Core
4316:Databases
4299:XKeyscore
4169:Russ Tice
4060:FROSTBURG
3978:Divisions
3898:Lew Allen
3785:Room 641A
3651:Locations
3046:The Verge
2920:2195-1349
2815:2195-1349
2777:2195-1349
2561:keylogger
2552:TINYALAMO
2488:CHUKWAGON
2449:keylogger
2400:LEVITICUS
2277:TYPHON HX
1788:Cisco PIX
1697:IRATEMONK
1649:HEADWATER
1595:GOPHERSET
1451:ENTOURAGE
1398:PowerEdge
1326:CROSSBEAM
1239:CANDYGRAM
1125:The Verge
1001:In 2012,
944:espionage
795:Five Eyes
647:Cablegate
601:Russ Tice
402:XKeyscore
382:Main Core
350:Stateroom
296:STORMBREW
267:RAMPART-A
245:Main Core
104:Publisher
99:2008–2009
4324:DISHFIRE
4292:Upstream
4243:MUSCULAR
4229:Fairview
4215:Dropmire
4200:Programs
3764:Pine Gap
3603:Archived
3590:Archived
3578:Archived
3554:Archived
3500:June 14,
3494:Archived
3466:June 14,
3460:Archived
3439:June 15,
3433:Archived
3408:June 14,
3402:Archived
3369:Archived
3337:Archived
3304:Archived
3208:Archived
3154:(2018).
3083:Archived
3051:Archived
3019:Archived
2987:Archived
2955:Archived
2924:Archived
2885:Archived
2853:Archived
2819:Archived
2781:Archived
2600:See also
2409:Motorola
2364:software
2117:mini PCI
2113:Power PC
2005:-based (
1884:250,000
1809:LOUDAUTO
1731:IRONCHEF
1660:routers.
1558:GODSURGE
1543:spectrum
1506:FIREWALK
1467:CDMA2000
1391:backdoor
1243:Tripwire
980:software
928:product
738:CYBERCOM
700:Metadata
689:Concepts
522:Lawsuits
424:MUSCULAR
397:DISHFIRE
345:Dropmire
311:Genoa II
240:FAIRVIEW
213:SHAMROCK
197:Pre-1978
192:Programs
4366:PINWALE
4345:MAINWAY
4222:ECHELON
4141:LOVEINT
4095:STU-III
4067:HARVEST
3840:Leaders
3332:Fortune
3203:Reuters
2621:Stuxnet
2255:TRINITY
2177:Windows
2173:Solaris
2165:FreeBSD
2119:slots,
2070:50,000
2007:FreeBSD
1956:40,000
1932:PICASSO
1783:JETPLOW
1710:Seagate
1706:Samsung
1546:15,000
1532:GENESIS
1520:10,740
1476:70,000
1473:signals
1439:40,000
1374:70,000
1344:CTX4000
1314:24,960
1278:20,300
1252:40,000
1205:Content
1181:Author
1139:Juniper
1102:Hamburg
930:catalog
924:) is a
641:Related
429:Tempora
407:ICREACH
387:MAINWAY
372:PINWALE
355:Bullrun
291:OAKSTAR
235:BLARNEY
208:MINARET
203:ECHELON
4426:VENONA
4359:Nymrod
4352:MARINA
4250:MYSTIC
4088:STU-II
3235:Quartz
3178:
3168:
2950:ccc.de
2918:
2813:
2775:
2589:) are
2347:Huawei
2265:6,250
2130:6,000
1938:2,000
1878:NEBULA
1848:3,000
1712:, and
1702:Maxtor
1658:Huawei
1332:4,000
1296:4,000
1163:Source
1143:Huawei
695:SIGINT
377:MARINA
360:MYSTIC
218:PROMIS
4376:Other
4257:PRISM
4081:STU-I
3429:ZDNet
2437:Wi-Fi
2376:Name
2175:, or
2169:Linux
2125:Linux
2003:JUNOS
1740:REGIN
1577:GINSU
1218:Page
1135:Cisco
1086:]
1075:]
1056:]
1047:with
960:Cisco
956:Apple
851:Other
340:PRISM
255:Genoa
131:]
4035:NSOC
4028:NTOC
3680:CSSG
3502:2017
3468:2017
3441:2017
3410:2017
3312:2015
3248:2022
3176:OCLC
3166:ISBN
3132:9446
2916:ISSN
2811:ISSN
2773:ISSN
2579:PS/2
2537:JTAG
2421:A5/1
2391:for
2362:and
2301:N/A
2283:N/A
2260:ARM9
2225:N/A
2160:SWAP
2109:UAVs
2105:WLAN
2048:N/A
2030:N/A
2012:N/A
1920:N/A
1902:N/A
1843:HC12
1839:FPGA
1835:ARM7
1771:N/A
1766:FPGA
1762:ARM9
1736:BIOS
1685:750
1663:N/A
1637:N/A
1565:500
1562:CPU.
1511:RJ45
1494:N/A
1469:and
1463:UMTS
1433:EBSR
1395:Dell
1353:N/A
1090:the
1077:and
1025:and
990:The
978:and
964:Dell
962:and
920:(or
916:The
864:DGSE
845:GCSB
821:GCHQ
809:CSEC
500:FISC
462:ECPA
457:FISA
152:2032
133:and
73:unit
52:and
4021:TAO
4014:SSO
4000:ROC
3986:CSS
3129:RFC
3119:doi
3078:CRN
2587:VGA
2583:USB
2557:BLE
2525:VGA
2509:USB
2497:I²C
2493:VGA
2481:USB
2469:PCI
2459:).
2457:GSM
2453:USB
2405:GSM
2393:GSM
2368:GSM
2204:30
2148:30
1986:30
1977:DVI
1973:VGA
1815:30
1792:ASA
1515:VPN
1471:FRS
1459:GSM
1247:GSM
1133:of
1100:in
1033:.
1017:at
876:BND
833:ASD
788:IAO
778:DHS
768:CIA
758:FBI
748:DOJ
728:CSS
50:NSA
4458::
3518:.
3492:.
3488:.
3476:^
3431:.
3427:.
3400:.
3396:.
3384:^
3367:.
3361:.
3335:.
3329:.
3296:.
3264:.
3232:.
3206:.
3200:.
3174:.
3127:.
3113:.
3107:.
3081:.
3075:.
3049:.
3043:.
3017:.
3011:.
2985:.
2979:.
2953:.
2947:.
2922:.
2908:.
2883:.
2877:.
2851:.
2845:.
2817:.
2809:.
2805:.
2779:.
2771:.
2765:.
2748:^
2479:a
2467:a
2447:a
2427:.
2387:a
2322:0
2243:0
2182:0
2171:,
2167:,
2088:0
1866:0
1797:0
1745:0
1719:0
1708:,
1704:,
1680:RF
1678:A
1619:0
1601:0
1583:0
1465:,
1461:,
1421:0
1403:0
1159:.
1149:.
1084:de
1073:de
1066:,
1062:,
1054:de
982:.
958:,
129:de
122:,
91:49
3636:e
3629:t
3622:v
3563:.
3533:.
3504:.
3470:.
3443:.
3412:.
3378:.
3346:.
3314:.
3281:.
3250:.
3217:.
3182:.
3140:.
3121::
3092:.
3060:.
3028:.
2996:.
2964:.
2933:.
2894:.
2862:.
2828:.
2790:.
2179:.
1768:.
1742:.
1716:.
1120:'
905:e
898:t
891:v
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.