ANT catalog
The ANT catalog is a classified product catalog by the U.S. National Security Agency of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures during the 2010s. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.
Background
The Tailored Access Operations unit has existed since the late 1990s. Its mission is to collect intelligence on foreign targets of the United States by hacking into computers and telecommunication networks. It has been speculated for years before that capabilities like those in the ANT catalog existed.In 2012, Edward Snowden organized a CryptoParty together with Runa Sandvik, a former colleague of Jacob Appelbaum at The Tor Project. In June 2013, Snowden took internal NSA documents which he shared with Glenn Greenwald and Laura Poitras, resulting in the global surveillance disclosures.
Publication
Jacob Appelbaum co-authored the English publication in Der Spiegel with and Judith Horchert, which was publicized on 29 December 2013. The related English publication on the same day about the TAO by Der Spiegel was also authored by the same people, and including Laura Poitras, Marcel Rosenbach, and. On December 30, Appelbaum gave a lecture about "the militarization of the Internet" at the 30th Chaos Communication Congress in Hamburg, Germany. At the end of his talk, he encouraged NSA employees to leak more documents.Apple denied the allegations that it collaborated on the development of DROPOUTJEEP in a statement to journalist Arik Hesseldahl from All Things Digital. The Verge questioned how the program developed in later years, since the document was composed in the early period of the iPhone and smartphones in general. Dell denied collaborating with any government in general, including the US government. John Stewart, senior vice president and chief security officer of Cisco stated that they were "deeply concerned and will continue to pursue all avenues to determine if we need to address any new issues." Juniper stated that they were working actively to address any possible exploit paths. Huawei stated they would take appropriate audits to determine if any compromise had taken place and would communicate if so. NSA declined to comment on the publication by Der Spiegel.
Bruce Schneier wrote about the tools on his blog in a series titled "NSA Exploit of the Week". He stated that because of this, his website got blocked by the Department of Defense.
Content
The published catalog pages were written between 2008 and 2009. The price of the items ranged from free up to $250,000.| Page | Code name | Description | Unit price in US$ |
| CANDYGRAM | Tripwire device that emulates a GSM cellphone tower. | 40,000 | |
| COTTONMOUTH-I | Family of modified USB and Ethernet connectors that can be used to install Trojan horse software and work as wireless bridges, providing covert remote access to the target machine. COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. | 20,300 | |
| COTTONMOUTH-II | Can be deployed in a USB socket, and, but requires further integration in the target machine to turn into a deployed system. | 4,000 | |
| COTTONMOUTH-III | Stacked Ethernet and USB plug | 24,960 | |
| CROSSBEAM | GSM communications module capable of collecting and compressing voice data | 4,000 | |
| CTX4000 | Continuous wave radar device that can "illuminate" a target system for recovery of "off net" information. | N/A | |
| CYCLONE-HX9 | GSM Base Station Router as a Network-In-a-Box | 70,000 | |
| DEITYBOUNCE | Technology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller. | 0 | |
| DROPOUTJEEP | "A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted." | 0 | |
| EBSR | Tri-band active GSM base station with internal 802.11/GPS/handset capability | 40,000 | |
| ENTOURAGE | Direction finding application for GSM, UMTS, CDMA2000 and FRS signals | 70,000 | |
| FEEDTROUGH | Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers. | N/A | |
| FIREWALK | Device that looks identical to a standard RJ45 socket that allows data to be injected, or monitored and transmitted via radio technology. using the HOWLERMONKEY RF transceiver. It can for instance create a VPN to the target computer. | 10,740 | |
| GENESIS | GSM handset with added software-defined radio features to record the radio frequency spectrum | 15,000 | |
| GODSURGE | Software implant for a JTAG bus device named FLUXBABBITT which is added to Dell PowerEdge servers during interdiction. GODSURGE installs an implant upon system boot-up using the FLUXBABBITT JTAG interface to the Xeon series CPU. | 500 | |
| GINSU | Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up. | 0 | |
| GOPHERSET | GSM software that uses a phone's SIM card's API to control the phone through remotely sent commands. | 0 | |
| GOURMETTROUGH | User-configurable persistence implant for certain Juniper Networks firewalls. | 0 | |
| HALLUXWATER | Back door exploit for Huawei Eudemon firewalls. | N/A | |
| HEADWATER | Persistent backdoor technology that can install spyware using a quantum insert capable of infecting spyware at a packet level on Huawei routers. | N/A | |
| HOWLERMONKEY | A RF transceiver that makes it possible to extract data from systems or allow them to be controlled remotely. | 750 | |
| IRATEMONK | Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital. | 0 | |
| IRONCHEF | Technology that can "infect" networks by installing itself in a computer I/O BIOS. IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software REGIN. | 0 | |
| JUNIORMINT | Implant based on an ARM9 core and an FPGA. | N/A | |
| JETPLOW | Firmware that can be implanted to create a permanent backdoor in a Cisco PIX series and ASA firewalls. | 0 | |
| LOUDAUTO | Audio-based RF retro-reflector listening device. | 30 | |
| MAESTRO-II | Multi-chip module approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz ARM7 processor, 4 MB of flash, 8 MB of RAM, and a FPGA with 500,000 gates. It replaces the previous generation modules which were based on the HC12 microcontroller. | 3,000 | |
| MONKEYCALENDAR | Software that transmits a mobile phone's location by hidden text message. | 0 | |
| NEBULA | Multi-protocol network-in-a-box system. | 250,000 | |
| NIGHTSTAND | Portable system that installs Microsoft Windows exploits from a distance of up to eight miles over a wireless connection. | N/A | |
| NIGHTWATCH | Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it. | N/A | |
| PICASSO | Software that can collect mobile phone location data, call metadata, access the phone's microphone to eavesdrop on nearby conversations. | 2,000 | |
| PHOTOANGLO | A joint NSA/GCHQ project to develop a radar system to replace CTX4000. | 40,000 | |
| RAGEMASTER | A concealed device that taps the video signal from a target's computer's VGA signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the ferrite choke of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH. | 30 | |
| SCHOOLMONTANA | Software that makes DNT implants persistent on JUNOS-based J-series routers/firewalls. | N/A | |
| SIERRAMONTANA | Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls. | N/A | |
| STUCCOMONTANA | Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls. | N/A | |
| SOMBERKNAVE | Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters. | 50,000 | |
| SOUFFLETROUGH | BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls. | 0 | |
| SPARROW II | A small computer intended to be used for WLAN collection, including from UAVs. Hardware: IBM Power PC 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 mini PCI slots, CompactFlash slot, and 802.11 B/G hardware. Running Linux 2.4 and the BLINDDATE software suite. Unit price : $6K. | 6,000 | |
| SURLYSPAWN | Keystroke monitor technology that can be used on remote computers that are not internet connected. | 30 | |
| SWAP | Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows. | 0 | |
| TAWDRYYARD | Radio frequency retroreflector to provide location information. | 30 | |
| TOTECHASER | Windows CE implant for extracting call logs, contact lists and other information. | N/A | |
| TOTEGHOSTLY | Software that can be implanted on a Windows mobile phone allowing full remote control. | 0 | |
| TRINITY | Multi-chip module using a 180 MHz ARM9 processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny. | 6,250 | |
| TYPHON HX | Network-in-a-box for a GSM network with signaling and call control. | N/A | |
| WATERWITCH | A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phone. | N/A | |
| WISTFULTOLL | Plugin for collecting information from targets using Windows Management Instrumentation | 0 |