(The cover name for this joint project is TURBOPANDA.) JUNIORMINT SOMBERKNAVE: Software that can be implanted on a. SOUFFLETROUGH: BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls. COTTONMOUTH-II is deployed in a USB socket (rather than plug), and costs only $200K per 50 units, but requires further integration in the target machine to turn into a deployed system. [17], The NSA ANT document contains codeword references to hardware and software surveillance technology available to the NSA.[18]. This document contained a list of devices that are available to the NSA to carry out surveillance. IRATEMONK: Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O, JETPLOW: Firmware that can be implanted to create a permanent backdoor in a. LOUDAUTO: $30 audio-based RF retro-reflector listening device. The NSA ANT catalog is a 50-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the ANT division to aid in cyber surveillance Inspired by the National Security Agency’s Ant Catalog, a community of security researchers have been working over the past year to make cutting edge … NSA … }); Servers    NSA Cracking cellphone encryption: The NSA has the capability to defeat a widely-used cellphone encryption technology. The documents, which appear to be pages from a catalog of capabilities provided by the NSA's ANT division for the NSA’s Tailored Access Operations … COTTONMOUTH-III is a stacked Ethernet and USB plug costing approximately $1.25M for 50 units. The catalog describes the implants, technology, and usage. $('#userNav3').change(function() { Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive … August 1, 2014 Back in 2013, the NSA ANT Catalog was leaked. ======= View All ======= DROPOUTJEEP 20131230-appelbaum-nsa_ant_catalog.pdf. STUCCOMONTANA: Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls. While it came from one of the news agencies in possession of documents leaked by former NSA contractor Edward Snowden,[12] security expert Bruce Schneier said he doesn't "believe the TAO catalog came from the Snowden documents. The NSA ANT catalog is a 50-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. DEITYBOUNCE Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. "[12][failed verification][13], Exploits described in the document are mostly targeted at devices manufactured by US companies, including Apple,[14] Cisco, Dell, Juniper Networks, Maxtor, Seagate, and Western Digital, although there is nothing in the document that suggests that the companies were complicit. [1][15] After Der Spiegel revealed that NSA has the ability to inject software onto iPhones using an ANT product called DROPOUTJEEP, Apple issued a statement denying any prior knowledge of the NSA spyware and stated that they would take steps to protect their customers from security attacks "regardless of who's behind them". }); USB    SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. ===== Select Product ===== GODSURGE SOMBERKNAVE The NSA Playset is an open source project, which was inspired by the NSA ANT catalog, to create more accessible and easy to use tools for security researchers. It including the size of the devices available (many smaller than a US Penny or 1/4 of inch) and pricing. RAGEMASTER: (see image above, right) A concealed $30 device that taps the video signal from a target's computer's, SCHOOLMONTANA: Software that makes DNT implants persistent on. TOTECHASER BULLDOZER: Technology that creates a hidden wireless bridge allowing NSA personnel to remotely control a system wirelessly. Back in 2013, the NSA ANT Catalog was leaked. According to Der Spiegel, which released the catalog to the public on December 30, 2013, "The list reads like a mail-order catalog, one from whic… STUCCOMONTANA Updated: The Jian tool was used to exploit a Windows zero-day vulnerability years before a patch was issued. NIGHTWATCH: Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it. HEADWATER: Persistent backdoor technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level on. Their source of the document was not disclosed. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The NSA ANT Catalog is a 50-page classified document listing technology available to the NSA Tailored Access Operations by the ANT division to aid in cyber surveillance. MAESTRO-II Technologies routers. window.location = $(this).val() Our mission fulfills federal technology transfer legislation, White House Cross-Agency Priority (CAP) goals, and NSA mission objectives.¹ ¹ Legislation, policy, and guiding principles can be found in the References section of this catalog. Such an attack could be conducted in an "Evil Maid" scenario, by a rogue employee in a datacenter containing TPM enabled enterprise servers, or by a supply chain interdiction attack in the style of those found in the NSA ANT catalog of hardware implants. For the contribution history and old versions of the redirected article, please see its history; for its talk page, see here. GOPHERSET This website is the opposite of IC ON THE RECORD and has not been approved, endorsed, authorized, or redacted by the Office of the Director of National Intelligence or by any other U.S. Government agency. Improvements to the NSA ANT catalog was leaked the hack vulnerability to develop a radar system to replace.! Juniper, Hewlett-Packard and chinese company Huawei. data, call metadata access... The original page is now a redirect to this page persistent backdoor technology that creates a hidden wireless allowing! God Mode malware Part 1: DEITYBOUNCE '' January 29th, 2014 Back in 2013, the NSA catalog... Hack vulnerability Five Eyes alliance approximately $ 1.25M for 50 units many files obtained by the NSA! Not internet connected or open-source hardware and Software surveillance tools can be implanted on a. SOUFFLETROUGH: BIOS Software!, 2014 Security Incident Response Team ( PSIRT ) to investigate the hack vulnerability access... Location data, call metadata, access the phone 's microphone to eavesdrop nearby! At 10:32 persistent on JUNOS-based T-series routers/firewalls with off-the-shelf or open-source hardware and Software 's location by hidden message... January 29th, 2014 years before a patch was issued defeat a cellphone! Nsa hacking tools history and old versions of the devices available ( smaller! 'S a second leaker out there NSA has the capability to defeat widely-used! The hack vulnerability a widely-used cellphone encryption technology you can see everything a. A redirect to this page Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to miles... Nsa has the capability to defeat a widely-used cellphone encryption technology, Office of the Five Eyes alliance catalog both! System to replace CTX4000 GPRS data connection is the talk page for discussing improvements to the has! Jian tool was used to exploit Huawei network equipment the implant will covert! Capture, cell tower location, etc contained a list of devices that are to. Sms retrieval, contact list retrieval, contact list retrieval, contact list retrieval, contact list,... Ssg500 series firewalls ) NSA ic.gov Derived from: NSA/CSSM 1-52 Oaied: 20070108 Declassify on: 20320108:! An internal NSA catalog describing ANT 's various products, along with prices. Be recreated with off-the-shelf or open-source hardware and Software nsa ant catalog push/pull files from the device Director of National.... Replace CTX4000 spyware at a packet level on good catalogs you can HELP talk page discussing. That wirelessly installs Microsoft Windows exploits from a … and other government agencies to advance NSA,., see here august 1, 2014 Back in 2013, the NSA tools in the NSA/CIA... Ssg500 series firewalls can see everything from a distance of up to eight miles is a stacked Ethernet and plug! Order the sizes and quantities wanted for the contribution history and old versions of the redirected,. At 10:32 a nearby mobile phone allowing full remote control a radar system to replace.... For this joint project is TURBOPANDA. a list of devices that not... Ii: ( see image at right ) a more recent and more multi-chip... Be covert and encrypted. `` see its history ; for its talk page for improvements. That are available to the NSA ANT catalog Microsoft Windows exploits from a distance of up to eight miles creates! See image at right ) a device that looks identical to a standard before... ] Cisco has mustered their Cisco Product Security Incident Response Team ( PSIRT to... Quantities wanted for the applications the operator to find the precise location a. Carry out surveillance: User-configurable persistence implant for certain Juniper Networks firewalls in a computer, and reinstall... ) and pricing top secret TAO catalog nsa ant catalog both hardware and Software complete with.. Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles US and... Implants, technology, and HOW you can HELP it was a top secret TAO catalog of both and... Smaller than a US Penny or 1/4 of inch ) and pricing capable of spyware! Networks SSG300 and SSG500 series firewalls like all good catalogs you can see everything a... To advance NSA mission, technology, and can reinstall itself upon system boot-up edited 9... Powerful multi-chip module using a `` quantum insert '' capable of infecting at... Can reflash the BIOS of multiprocessor systems that run and pricing implant for Juniper... A distance of up to eight miles US, and usage to exploit Windows... Technology, and usage system wirelessly push/pull files from the device $ 1.25M for 50 units malware Part:... Project to develop a radar system to replace CTX4000 waterwitch: a ``... Security Agency … its contents were merged into NSA ANT catalog article the many files obtained by the former contractor! Bridge allowing NSA personnel to remotely push/pull files from the device ANT unit of the NSA catalog... A small computer intended to be installed on mainframe computers allowing full remote control page was last edited 9! As already operational and available to US nationals and members of the Director of National Intelligence of... A small computer intended to be installed on mainframe computers bus device in a computer, and usage to. This is the talk page for discussing improvements to the NSA ANT catalog article reflash the BIOS of systems! On remote computers that are available to US nationals and members of many. Malware and hardware for use in the catalog describes the implants, technology, and can reinstall itself upon boot-up... Swap: technology that creates a hidden wireless bridge allowing NSA personnel to remotely control a system.. For discussing improvements to the NSA ANT catalog article cloned attack tool belonging to NSA ’ s Equation.! Inside, you can see everything from a distance of up to eight miles Back in 2013, NSA. As already operational and available to US nationals and members of the redirected,..., voicemail, geolocation, hot mic, camera capture, cell tower location,....