#1 Source for Leaks Around the World!

NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

In ANT, Archive, Hacking, NSA, NSA Files, Surveillance, TAO, Technology on December 30, 2013 at 3:17 AM

nsa-ant

12/29/2013

SPIEGEL:

After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.

When it comes to modern firewalls for corporate computer networks, the world’s second largest network equipment manufacturer doesn’t skimp on praising its own work. According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is one attacker none of these products can fend off — the United States’ National Security Agency.

Specialists at the intelligence organization succeeded years ago in penetrating the company’s digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry — including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell and Apple’s iPhone.

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

In the case of Juniper, the name of this particular digital lock pick is “FEEDTROUGH.” This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH “has been deployed on many target platforms.”

The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such “implants,” as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this “Persistence” and believe this approach has provided them with the possibility of permanent access.

Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are “remotely installable” — in other words, over the Internet. Others require a direct attack on an end-user device — an “interdiction,” as it is known in NSA jargon — in order to install malware or bugging equipment.

There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. “Cisco does not work with any government to modify our equipment, nor to implement any so-called security ‘back doors’ in our products,” the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company “respects and complies with the laws of all countries in which it operates.”

Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it’s not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be “pursued for a future release”.

nsa-ant-deitybounce

nsa-ant-ironchef

nsa-ant-feedthrough

nsa-ant-gourmettrough

nsa-ant-halluxwater

nsa-ant-jetplow

nsa-ant-souffletrough

nsa-ant-headwater

nsa-ant-schoolmontana

nsa-ant-sierramontana

nsa-ant-stuccomontana

nsa-ant-ctx4000

nsa-ant-loudauto

nsa-ant-nightstand

nsa-ant-nightwatch

nsa-ant-photoanglo

nsa-ant-sparrow-ii

nsa-ant-tawdryyard

nsa-ant-ginsu

nsa-ant-howlermonkey

nsa-ant-iratemonk

nsa-ant-juniormint

nsa-ant-maestro-ii

nsa-ant-somberknave

nsa-ant-swap

nsa-ant-trinity

nsa-ant-wistfultoll

nsa-ant-surlyspawn

nsa-ant-dropoutjeep

nsa-ant-gopherset

nsa-ant-monkeycalendar

nsa-ant-picasso

nsa-ant-totechaser

nsa-ant-toteghostly-2.0

nsa-ant-candygram

nsa-ant-crossbeam

nsa-ant-cyclone-hx9

nsa-ant-ebsr

nsa-ant-entourage

nsa-ant-genesis

nsa-ant-nebula

nsa-ant-typhon-hx

nsa-ant-waterwitch

nsa-ant-cottonmouth-i

nsa-ant-cottonmouth-ii

nsa-ant-cottonomouth-iii

nsa-ant-firewalk

nsa-ant-ragemaster

Related Links:

American Companies Respond to New NSA Hacking Claims

To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3

Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years

NSA Can Hack WiFi Devices From Eight Miles Away

The NSA Has a Backdoor Called “DROPOUTJEEP” for Nearly Complete Access to the Apple iPhone

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack

The NSA Product Generator

  1. […] special NSA unit has its own development department in which new technologies are developed and tested. This division is where the real tinkerers can […]

  2. […] Related: NSA’s ANT Division Has Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  3. […] Related Link: NSA’s ANT Division Has Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  4. […] See: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  5. Reblogged this on peoples trust toronto and commented:
    NSA Ant division hacking into every device on the internet

  6. […] First – I think that the Der Spiegel article that covers the “latest” NSA spying capabilities (http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html) is very important, and I applaud Jake and the crew that covered this. If you haven’t yet, go read it and go over the slides. Also make sure to read through the “product catalog” here: http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-ma… […]

  7. […] those at the Chaos Communications Congress this weekend that the NSA's big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  8. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  9. […] Here’s where to find it, if you want to look for yourself. […]

  10. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  11. […] LeakSource 0 likesLeaksCatalogDivisioneveryExploitsMAJORNearlyNSA’sSoftware/Hardware/Firmware […]

  12. […] To tylko niektóre ze slajdów, pokazanych dzisiaj przez Jacoba. Jeszcze raz polecamy obejrzenie całej prezentacji poniżej, a tutaj znajdziecie w formie testowo-obrazkowej pełen katalog gadżetów NSA. […]

  13. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  14. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  15. […] Here’s where to find it, if you want to look for yourself. […]

  16. […] and include prices that range from free to $250,000, according to der Spiegel. The 2008 catalog (which can be viewed here) includes $30 rigged monitor cables that let NSA spies see what a target sees on his computer, a […]

  17. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  18. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  19. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  20. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  21. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  22. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  23. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  24. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | LeakSou…. […]

  25. […] Related Link: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  26. […] and include prices that range from free to $250,000, according to der Spiegel. The 2008 catalog (which can be viewed here) includes $30 rigged monitor cables that let NSA spies see what a target sees on his computer, a […]

  27. […] and include prices that range from free to $250,000, according to der Spiegel. The 2008 catalog (which can be viewed here) includes $30 rigged monitor cables that let NSA spies see what a target sees on his computer, a […]

  28. […] backdoor met de naam “DROPOUTJEEP.” Applebaum lekte de afgelopen week een aantal NSA exploits maar deze is toch wel bijzonder intimiderend voor iPhone gebruikers. Het zijn tools die het […]

  29. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  30. […] Here’s where to find it, if you want to look for yourself. […]

  31. […] Apple has yet to comment on the matter but we'll let you know as soon as any more news breaks. Read More [via […]

  32. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  33. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includesNightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  34. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  35. […] should checkout the Spiegel article above, and also the complete LeakSource article containing more of the NSA’s Catalog… we’ve taken the liberty of posting a few of […]

  36. […] of the NSA and its methods, Appelbaum’s claims – supported by what appeared to be internal NSA slideshows – still caused a […]

  37. […] Operations (TAO), got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  38. […] of the NSAs Gear Pretty interesting read… NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… […]

  39. […] Operations (TAO), got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  40. […] อุปกรณ์ดังกล่าวใช้ในการแฮกข้อมูลจากเป้าหมายผ่าน Wi-Fi ซึ่งผู้เชี่ยวชาญด้านความปลอดภัยก็ได้ออกมาอธิบายถึงสเปกของมัน โดยเจ้าอุปกรณ์ชิ้นนี้ชื่อว่า Nightstand ซึ่งเป็นโน้ตบุ๊กพร้อมอุปกรณ์เสริมรันบน Linux และสามารถส่งสัญญาณ Wi-Fi เข้าไปแฮกยังอุปกรณ์เป้าหมายที่รัน Windows OS (Win XP, Win2K) ได้จากระยะ 8 ไมล์ (12.87 กม.) โดยเจ้าตัวไม่สามารถตรวจจับได้ แต่สิ่งที่น่าตื่นเต้นกว่านั้นก็คือ Engadget บอกว่า Nightstand นี้เป็นอุปกรณ์ที่ใช้งานจริงเมื่อปี “ค.ศ. 2008” ซึ่งหมายความว่ามันมีอายุ 5 ปี และแน่นอนว่าต้องมีอุปกรณ์รุ่นใหม่ๆที่ความสามารถสูงกว่าเดิมให้ NSA หน่วยงานฉาวแห่งปีใช้งาน แต่ก็แน่นอนว่าข่าวนี้ไม่มีคำยืนยันอย่างเป็นทางการจากที่ใด แต่ Engadget ก็ระบุแหล่งข้อมูลที่น่าสนใจ เพราะภายในนั้นมีรายละเอียดของอุปกรณ์และซอฟแวร์ที่ NSA ใช้สอดแนมไว้แม้จะไม่เป็นทางการก็ตาม (leaksource.wordpress.com) […]

  41. […] Operations (TAO), got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  42. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  43. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includesNightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  44. […] Here’s where to find it, if you want to look for yourself. […]

  45. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware LeakSource (Deontos).Recap/discussion of Der Spiegel article […]

  46. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  47. […] the article had a couple of pages from the 50-page catalog of tools; they’re now on Cryptome. This seems to be the whole TOP SECRET catalog; there’s a lot of really interesting information […]

  48. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  49. […] lista completa de los proyectos de ANT lo podéis ver en la página web oficial, sin embargo, os vamos a nombrar los más destacados, aunque hay decenas donde […]

  50. […] and include prices that range from free to $250,000, according to der Spiegel. The 2008 catalog (which can be viewed here) includes $30 rigged monitor cables that let NSA spies see what a target sees on his computer, a […]

  51. […] is but one of nearly 50 technology programs the NSA uses to gather […]

  52. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  53. […] 50-stránkový katalóg špionážneho backdoor-kódu, používaného agentami tajnej služby NSA, medzi cieľmi týchto […]

  54. […] intimidating) equipment for snooping on nearby targets. The NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  55. Interestingly traitorous…

  56. […] We’ve listed a few of the sketchier items below, but it’s worth clicking though to Leaksource for the full catalogue. […]

  57. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  58. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  59. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  60. […] now December 31st: the latest revelations released are regarding a 50-page catalog of surveillance equipment available for use by NSA’s officials. The document contains a large […]

  61. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  62. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  63. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  64. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  65. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  66. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  67. […] Appelbaum, a security researcher leaked a series of documents yesterday about the program which allows backdoor access to iPhones and […]

  68. […] — Der Spiegel: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/F… […]

  69. […] across this page, NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… Interesting read about what gadgets the NSA was using. Like CANDYGRAM, NEBULA, COTTENMOUTH I, II […]

  70. […] the best of the NSA’s jokenames. For a more serious take on what all this spy jargon means, see here and here. Otherwise, sit back and enjoy the wit of our nation’s sleeper […]

  71. […] is but one of nearly 50 newly revealed technology programs the NSA uses to gather […]

  72. […] Le journal allemand Der Spiegel a lancé des révélations chocs sur le cyberespionnage à partir de documents confidentiels partagés par l’ancien consultant de la NSA Edward Snowden. Voici un palmarès des outils les plus fous utilisés par la National Security Agency pour nous espionner. Il semblerait que pour chaque porte verrouillée par les fournisseurs d’équipements réseaux, les produits informatiques et les télécoms, la NSA possède une clé. La liste complète de ces outils disponible ici. […]

  73. Reblogged this on flying cuttlefish picayune and commented:
    The Fiend Without A Face:

  74. With the latest leaks regarding ANT and TAO it just goes to show how important it is for companies and it’s employees to have an understanding of even elementary IT security and computer hacking. By educating our workforce and private companies, we can help protect our digital censorship and protect valuable data sources from any backdoor intrusions

  75. […] item from the NSA’s Tailored Access Operations (TAO) group implant catalog is […]

  76. […] by the recent dump of NSA’s TAO product catalog, containing weirdly-codenamed products beyond the wildest paranoid’s dreams. Each time you […]

  77. […] The NSA product name generator website was “inspired by the recent dump of NSA’s TAO product catalog, containing weirdly-codenamed products beyond the wildest paranoid’s dreams,” the top of […]

  78. […] om tekniska bakdörrar som NSA har lyckats få in i hårdvara. Det är tyska Der Spiegel som publicerat avslöjandet tillsammans med bilder från NSA på hur det fungerar. Som vanligt så vimlar frågan runt i […]

  79. […] Read more at http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-ma… […]

  80. […] item from the NSA’s Tailored Access Operations (TAO) group implant catalog is […]

  81. […] and include prices that range from free to $250,000, according to der Spiegel. The 2008 catalog (which can be viewed here) includes $30 rigged monitor cables that let NSA spies see what a target sees on his computer, a […]

  82. […] Le journal allemand Der Spiegel a lancé des révélations chocs sur le cyberespionnage à partir de documents confidentiels partagés par l’ancien consultant de la NSA Edward Snowden. Voici un palmarès des outils les plus fous utilisés par la National Security Agency pour nous espionner. Il semblerait que pour chaque porte verrouillée par les fournisseurs d’équipements réseaux, les produits informatiques et les télécoms, la NSA possède une clé. La liste complète de ces outils disponible ici. […]

  83. […] NSA’s ANT Division catalog of implants, 48 pages. […]

  84. […] NSA-ANT division catalog of exploits for nearly every major software hardware firmware […]

  85. […] Puedes ver el catálogo al completo aquí, una especie de galería de los horrores del espionaje. [víaDer Spiegel y LeakSource] […]

  86. […] NSA har en katalog med färdiga verktyg för att ta sig in genom bakdörrar i nästan alla de kommersiella produkter som säkerheten på internet bygger på. Det avslöjar Der Spiegel. Katalogen finns läckt här. […]

  87. […] ”NSA har en katalog med färdiga verktyg för att ta sig in genom bakdörrar i nästan alla de kommersiella produkter som säkerheten på internet bygger på. Det avslöjar Der Spiegel. Katalogen finns läckt här.” […]

  88. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  89. […] the best of the NSA’s jokenames. For a more serious take on what all this spy jargon means, see here and here. Otherwise, sit back and enjoy the wit of our nation’s sleeper […]

  90. […] Gadgets e implantes de la NSA en hardware comercial para espiar a la gente http://bit.ly/1lGQj1v Me ha parecido […]

  91. […] to Jacob Applebaum revealing the NSA’s Advanced Network Technology (ANT) division’s catalog of exploits. In fact, according to documents obtained by Der Spiegel, the NSA-developed custom BIOS exploits […]

  92. […] Continuing our walk through the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  93. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  94. […] flashing malicious BIOS on Dell servers. Not until the next day did I realize that it was part of a much larger set of descriptions of such hacks. In this image gallery I describe many of the most interesting […]

  95. […] NSA leak included a hardware catalog with tons of interesting gadgets. The ANGRYNEIGHBOR used RADAR to bounce some of these signals back to a base station for […]

  96. […] OPPDATERT: Nettstedet Leaksource har allerede offentliggjort det som ser ut til å være hele den 50-siders NSA-katalogen. […]

  97. […] Today’s implant from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  98. […] Today’s implant from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  99. […] O catálogo completo foi publicado pelo site LeakSource (clique aqui para ver). […]

  100. […] too, Senator Raises Concern That The FBI Could Access iPhone Fingerprint Data – disinformation NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… NON android phones are much safer, especially if they're […]

  101. […] Iphone and android phone users, Semi-dumb phones are safer. Here's why, NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… Senator Raises Concern That The FBI Could Access iPhone Fingerprint Data – […]

  102. […] safe, Senator Raises Concern That The FBI Could Access iPhone Fingerprint Data – disinformation NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… NSA can hack WiFi devices from eight miles away (video) All legit information. The last I knew, […]

  103. […] Today’s implant from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  104. […] has made available an almost complete catalog of products and services clearly intended as an internal resource to […]

  105. […] news of specific tools used by the NSA Advanced Network Technology (ANT) division detailed in the catalog of exploits described by Der Spiegel and […]

  106. […] this to provide context: the NSA has an even more capable clandestine unit, unofficially known as Advanced/Access Network Technology […]

  107. […] why couldn’t these computers be compromised in such ways? In fact the NSA backdoor catalogue explicitly details BIOS level security compromises and implants! Go read this list, specially the […]

  108. […] Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency’s hilariously-named and terrifying spy gear […]

  109. […] of the top secret NSA documents published by Der Spiegel is a 50-page catalog of “implants” from the NSA’s Tailored Access Group. Because the individual […]

  110. […] Today’s implant from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  111. […] of the top secret NSA documents published by Der Spiegel is a 50-page catalog of “implants” from the NSA’s Tailored Access Group. Because the individual […]

  112. […] Today’s implant from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  113. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  114. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  115. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  116. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  117. […] una tavernetta e così mentre mangiavo un hamburger mi sono messo a leggere un paio di cose circa uno degli ultimi leaks  rilasciati da Snowden e compagnia […]

  118. […] are dozens of ANT programs, but here’s a rundown of just a […]

  119. […] are dozens of ANT programs, but here’s a rundown of just a […]

  120. […] these on the Chaos Communications Congress this weekend that the NSA's big box of tools contains Nightstand, a custom instrument that can compromise WiFi networks for the sake of inserting spy instrument. […]

  121. This is so bogus. Der Speegul, eh? Vat ees dee answehr to ahll dees? No doubt we will soon hear “buy German” because USA producta are all tainted.

    I say trust in America. Trust in our USA Universities, labs, scientists, and engineers. Our government is not working against us. Don’t forget that as Americans, we own the NSA. The rest of the world will not bring us down. Snowden is a damn traitor. Let him rot away in Russia, while his skills become stale and out of date. He is already old news.

  122. […] More about the actual documents presented you find here at Leaksource. […]

  123. […] If you want to remain anon then dont have any contact with the outside world anything more than that and its game over. Protecting yourself from script kiddies is easier… but if you are online and the NSA needs to know something they have the budget and the exploits to do it. NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | Lea… […]

  124. […] Today’s device — this one isn’t an implant — from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  125. […] not new; societies have been doing this for thousands of years. There’s only one exception: technology is smarter than it ever was. The NSA spying makes the Watergate scandal look […]

  126. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  127. […] esta página web hay más información sobre esta y otras herramientas de la […]

  128. […] we’re sophisticated enough to be able to break into any device in the world we want to (up to and including Angela Merkel’s phone, if reports are to be believed), there’s […]

  129. […] Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: […]

  130. […] O catálogo completo foi publicado pelo site LeakSource (clique aqui para ver). […]

  131. […] well documented, both through several years of hacker conferences and previous NSA disclosures in Der Spiegel, and both the NSA and GCHQ have extensive tools ready to deploy against iPhone, Android and other […]

  132. […] are dozens of ANT programs, but here’s a rundown of just a […]

  133. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  134. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  135. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  136. […] at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The […]

  137. […] OT, but you should really be aware of just how good they have got at monitoring. FYI, even if you don't have "technical" knowledge, I highly recommend on reward over the ANT catalog that Snowden released. Makes James Bond's Q's stuff seem like kids stuff. http://en.wikipedia.org/wiki/NSA_ANT_catalog http://leaksource.wordpress.com/2013…ware-firmware/ […]

  138. […] 50-stránkový katalóg špionážneho backdoor-kódu, používaného agentami tajnej služby NSA, medzi cieľmi týchto […]

  139. […] qoftë se dëshironi t’i hidhni një sy listës së plotë mund të ndiqni këtë link. (NpK […]

  140. […] of the Edward Snowden revelations about the US Government being able to break into pretty much any secure network they want to, you’d have to say the National Security Agency might […]

  141. […] материалам FreeSnowden, LeakSource, […]

  142. […] You can find a full cache of documents that overview the exploits at NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | LeakSou… […]

  143. […] Wenn die NSA eine Zielperson auskundschaften will, greift sie in die Trickkiste der Tailored Access Operations (TAO), einer Geheimdienst-Abteilung, die Software- und Hardware-Wanzen baut. TAO hält fertige Spionage- und Überwachungskits vorrätig und entwickelt ständig neue. Der (etwas veraltete) Katalog befand sich in den von Edward Snowden stibitzten Daten, der Spiegel hatte ihn neulich veröffentlicht und als interaktive Grafik aufbereitet. Handhabbarer ist diese unformatierte Auflistung. […]

  144. […] Here’s where to find it, if you want to look for yourself. […]

  145. What worries me more than this revelation is the fact that so many people just don’t seem to care in the slightest!

  146. […] à l’insu des prestataires de services. Les « plombiers » du net savent être discrets, leur catalogue de jamesbonderies pullule de gadgets facilitant ces écoutes, légales ou […]

  147. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  148. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  149. […] Agency has a large “Tailored Access Operations” department dedicated to building offensive hacking capabilities. If the NSA didn’t build Careto, it’s a safe bet that they have something like it. And […]

  150. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  151. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  152. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  153. […] Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: […]

  154. […] German weekly Der Spiegel, ANT, which stands for Advanced Network Technology, has developed a catalogue of “products” that include rigged cables, USB plugs, Cellular base stations, and software malware that […]

  155. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  156. […] all of the NSA’s spying gadgetry and back doors for numerous devices, there are no assurances their methods are 100% accurate when […]

  157. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan […]

  158. […] National Security Agency documents have shown that the US intelligence community has an arsenal of offensive/cyberweapons at its […]

  159. […] Knowledge of NSA surveillance has been around for a while, but not until recently has the entire extent. as to what their capabilities are. been released. If you are interested, entire pages from the NSA ANT catalog has been leaked and is available @ http://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-softw… […]

  160. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan […]

  161. […] the NSA has a trove of thousands of such vulnerabilities that can be used to breach some of the world’s most […]

  162. […] ANT – AKA Advanced or Access Network Technology and home to the infamous ANT Catalog, ANT is a sub-division of the TAO that acts as the NSA’s own in-house version of Radio Shack. They specialize in computer engineering hacks that can exploit back doors in corporate networking devices or imbed “implants” so deep inside a computer’s memory that it’s nearly impossible to remove. Part of their inventory are various programs specifically tailored to certain networking routers or hard drives. One example is FEEDTROUGH, an implant that can break through the firewalls of popular corporate security company Juniper Networks. It imbeds itself so well in the software architecture that it can remain in place, smuggling hidden NSA surveillance and programs into the computer, even if the computer is wiped and reset. ANT have access to software which can exploit the products of a whole host of international and US-based companies including Western Digital, Seagate, Maxtor and Samsung. Read more. […]

  163. […] When it comes to modern firewalls for corporate computer networks, the world’s second largest network equipment manufacturer doesn’t skimp on praising its own work. According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is …read more […]

  164. […] NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  165. […] See: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware […]

  166. […] said it, I do not believe that this came from the Snowden documents. I also don’t believe the TAO catalog came from the Snowden documents. I think there’s a second leaker out […]

  167. […] said it, I do not believe that this came from the Snowden documents. I also don’t believe the TAO catalog came from the Snowden documents. I think there’s a second leaker out […]

  168. […] it, I do not believe that this came from the Snowden documents. I also don’t believe the TAO catalog came from the Snowden documents. I think there’s a second leaker out […]

  169. Its such as you read my mind! You seem to understand a lot approximately this,
    such as you wrote the book in it or something.
    I think that you simply could do with some p.c. to force the message home a little bit,
    however other than that, this is fantastic blog. A great read.
    I’ll certainly be back.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: