Jump to content

ANT catalog: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
+2 cites
+list
Line 1: Line 1:
The '''NSA ANT catalog''' is a 50 page document listing technology available to the [[United States]] [[National Security Agency]] (NSA) ANT division to aid in cyber surveillance. According to ''[[Der Spiegel]]'', "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data."<ref name=Applebaum /><ref name=Brandon /><ref name=Elmer-DeWitt /><ref name=Hathaway /><ref name=Condliffe /><ref name=Edwards />
The '''NSA ANT catalog''' is a 50 page document listing technology available to the [[United States]] [[National Security Agency]] (NSA) ANT division to aid in cyber surveillance. According to ''[[Der Spiegel]]'', "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data."<ref name=Applebaum /><ref name=Brandon /><ref name=Elmer-DeWitt /><ref name=Hathaway /><ref name=Condliffe /><ref name=Edwards />

==Capabilities list==
* ANGRYMONK: Technology that can infiltrates the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital
* CANDYGRAM: A device that emulates a cellphone tower.
* COTTONMOUTH: A modified USB device that can be used to install Trojan software or for intercepting communications
* DIETYBOUNCE: Technology that installs software on Dell computers by via the motherboard BIOS
* DROPOUTJEEP:"A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."
* FOXACID: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level
* HEADWATER: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level on Huawai routers
* HOWLERMONKEY: A [[RF]] transceiver that makes it possible to extract data from systems or allow them to be controlled remotely
* IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O BIOS.
* JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco firewall
* MONKEYCALENDAR: Software that transmits a mobile phone's location by hidden text message
* NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles
* RAGEMASTER: Teechnology that can intercept video between a desktop computer video card and monitor
* SOMBERKNAVE: Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters
* SPARROW II: Technology that detects and maps wireless networks via drones
* SURLYSPAWN: Keystroke monitor technology that can be used on remote computers that are not internet connected
* SWAP: Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows
* TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control
* WATERWITCH: A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phones


==References==
==References==
Line 17: Line 38:


<ref name=Edwards>{{cite web | url=http://www.businessinsider.com/nsa-spyware-backdoor-on-iphone-2013-12#ixzz2p9j67gXN | title=DOCUMENTS: NSA Has 'A 100% Success Rate' Putting Spyware On iPhones | publisher=''[[Business Insider]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Edwards, Jim}}</ref>
<ref name=Edwards>{{cite web | url=http://www.businessinsider.com/nsa-spyware-backdoor-on-iphone-2013-12#ixzz2p9j67gXN | title=DOCUMENTS: NSA Has 'A 100% Success Rate' Putting Spyware On iPhones | publisher=''[[Business Insider]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Edwards, Jim}}</ref>




}}
}}

Revision as of 14:39, 1 January 2014

The NSA ANT catalog is a 50 page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber surveillance. According to Der Spiegel, "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data."[1][2][3][4][5][6]

Capabilities list

  • ANGRYMONK: Technology that can infiltrates the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital
  • CANDYGRAM: A device that emulates a cellphone tower.
  • COTTONMOUTH: A modified USB device that can be used to install Trojan software or for intercepting communications
  • DIETYBOUNCE: Technology that installs software on Dell computers by via the motherboard BIOS
  • DROPOUTJEEP:"A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."
  • FOXACID: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level
  • HEADWATER: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level on Huawai routers
  • HOWLERMONKEY: A RF transceiver that makes it possible to extract data from systems or allow them to be controlled remotely
  • IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O BIOS.
  • JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco firewall
  • MONKEYCALENDAR: Software that transmits a mobile phone's location by hidden text message
  • NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles
  • RAGEMASTER: Teechnology that can intercept video between a desktop computer video card and monitor
  • SOMBERKNAVE: Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters
  • SPARROW II: Technology that detects and maps wireless networks via drones
  • SURLYSPAWN: Keystroke monitor technology that can be used on remote computers that are not internet connected
  • SWAP: Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows
  • TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control
  • WATERWITCH: A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phones

References

  1. ^ Applebaum, Jacob and Stöcker, Christian (December 29, 2013). "Shopping for Spy Gear: Catalog Advertises NSA Toolbox". Der Spiegel. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)CS1 maint: multiple names: authors list (link)
  2. ^ Brandon, Russell (December 30, 2013). "The NSA's elite hackers can hijack your Wi-Fi from 8 miles away". The Verge. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  3. ^ Elmer-DeWitt, Philip (December 31, 2013). "Apple, Jacob Appelbaum and the National Security Agency". Fortune. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  4. ^ Hathaway, Jay (December 30, 2013). "The NSA has nearly complete backdoor access to Apple's iPhone". Daily Dot. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  5. ^ Condliffe, Jamie (December 31, 2013). "The NSA Has Crazy Good Backdoor Access to iPhones". Gizmodo. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  6. ^ Edwards, Jim (December 30, 2013). "DOCUMENTS: NSA Has 'A 100% Success Rate' Putting Spyware On iPhones". Business Insider. Retrieved January 1, 2014. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)