A Peek Inside the NSA's Spy Gear Catalog

We may earn a commission from links on this page.

Der Spiegel's fairly harrowing report about the NSA's hacking unit, Tailored Access Operations (TAO), got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency's hilariously-named and terrifying spy gear catalog.

The 2008 catalog shows off the tools of an NSA division called ANT which presumable stands for Access or Advanced Network Technology. Inside, you can see everything from a mobile phone software that gobbles up location information or activates the phone's microphone to a USB stick that gives the NSA an open door into the computer's hard drive. Since a lot of the software implants target the BIOS—the most basic software on a computer used to boot up the machine—they can't be found or removed by wiping the hard drive. And some are as cheap as $0.

Advertisement

We've listed a few of the sketchier items below, but it's worth clicking though to Leaksource for the full catalog.

Advertisement

HEADWATER: This so-called Persistant Backdoor (PBD) gives spies a way to access Huawei routers. This is particularly since Huawei is the company that recently threatened to stop doing business in the US due to spying.

Advertisement

NIGHTSTAND: This hardware lets spies break into WiFi network and deliver cyberattacks. It works as far away as 8 miles.

Advertisement

GOPHERSET: This is a phone hacker's wet dream. It's a GSM software implant that uses the SIM card's API, known as the SIM Toolkit or STK, to send commands to the phone. From there, the spy can pull anything from lists of contacts to the content of text messages.

MONKEYCALENDAR: This software implant for GSM phones can grant spies access to all of a device's geolocation information. And like GOPHERSET it can be installed over-the-air.

Advertisement

PICASSO: Now this is spyware. This software implants can collect call metadata, location data and even turn on the phone's microphone to pick up conversations in the room. It also features something called a "panic button," but the catalog doesn't explain its function.

COTTONMOUTH-I: It looks like a regular old USB stick but it's actually a little spying computer. The catalog says it creates "wireless bridge into a target network as well as the ability to load exploit software onto target PCs."

Advertisement

You can hop over to Leaksource to see the full spread of gear in all its glory(?). [Leaksource via AllThingsD]

Advertisement