La Unión (Spanien) und Benutzer:Predatorix/NSA-ANT-Katalog: Unterschied zwischen den Seiten
→Background: Citation is broken - archive link not working. But I found another source AND added it AND recall that the original source worked too. WHAT THE FUCK?? I've tried to save this edit 5 times with no success. |
|||
Zeile 1: | Zeile 1: | ||
[[File:NSA RAGEMASTER.jpg|thumb|NSA ANT product data for RAGEMASTER]] |
|||
{{Ficha de localidad de España |
|||
The '''NSA ANT catalog''' is a 50-page [[Classified information|classified]] document listing technology available to the [[United States]] [[National Security Agency|National Security Agency (NSA)]] [[Tailored Access Operations|Tailored Access Operations (TAO)]] by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. Most devices are described as already operational and available to US nationals and members of the [[Five Eyes]] alliance. According to ''[[Der Spiegel]]'', which released the catalog to the public on December 30, 2013, "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data."<ref name=Applebaum /><ref name=Hathaway /><ref name=Condliffe /><ref name=Edwards /><ref name=LeMonde /><ref name=Satter /><ref name=Hardawar /><ref name=Kain /><ref name=Zetter /> The document was created in 2008.<ref name=Lawler /> |
|||
| nombre = La Unión |
|||
| escudo= |
|||
| imagen = [[Imagen:La Union.png|center|150px]] |
|||
| cod_provincia = 30 |
|||
| comarca = [[Campo de Cartagena]] |
|||
| partido = [[Partidos judiciales de Murcia|Cartagena]] |
|||
| altitud = 86 |
|||
| distancia = 54 |
|||
| referencia = [[Murcia]] |
|||
| distancia2 = 11 |
|||
| referencia2 = [[Cartagena (España)|Cartagena]] |
|||
| distancia3 = 457 |
|||
| referencia3 = [[Madrid]] |
|||
| superficie = 24.6 |
|||
| fundación = [[1868]] |
|||
| población = 16471 |
|||
| ine_año = 2007 |
|||
| patrona = [[Virgen del Rosario|Ntra. Sra. del Rosario]] |
|||
| coor = {{coord|37|37|N|0|53|O|type:city|display=inline,title}} |
|||
| densidad = 650 |
|||
| gentilicio = Unionense |
|||
| cp = 30360 |
|||
| alcalde = Francisco M. Bernabé Pérez ([[PP]]) |
|||
| alcalde_año = 2007 |
|||
| web = [http://www.ayto-launion.com/ www.ayto-launion.com] |
|||
}} |
|||
'''La Unión''' es un municipio de la [[Región de Murcia]], [[España]]. Pertenece a la Comarca del [[Campo de Cartagena]] y al partido jurídico de [[Partidos judiciales de Murcia|Cartagena]]. |
|||
Security researcher [[Jacob Appelbaum]] gave a speech at the [[Chaos Communications Congress]] in [[Hamburg]], [[Germany]], in which he detailed techniques that the simultaneously published ''Der Spiegel'' article he coauthored indicate the NSA uses in its surveillance efforts in the US and internationally.<ref name=Satter /><ref name=Mick /> |
|||
== Organización Territorial == |
|||
El termino municipal está estructurado en dos pedanías además de la propia ciudad de La Unión, [[Roche (Murcia)|Roche]] y [[Portmán]]. |
|||
The prices of the items in the catalog range from free (typically for software) to US$250,000.<ref name=Applebaum /> |
|||
=== Localidades limítrofes === |
|||
*norte, este y oeste: [[Cartagena (Murcia)|Cartagena]] |
|||
*sur: [[Mar Mediterráneo]] |
|||
== |
==Background== |
||
In 2013, ''Der Spiegel'' published an article, co-written by [[Jacob Appelbaum]], Judith Horchert and Christian Stöcker, that exposed the NSA "toolbox". Their source of the document was not disclosed. While it came from one of the news agencies in possession of documents leaked by former NSA contractor [[Edward Snowden]],<ref name=Kirk /> security expert [[Bruce Schneier]] said he doesn't "believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."<ref name="Kirk" />{{Failed verification|date=February 2016|reason=Schneier is not mentioned by name nor quoted in this article.}}<ref>{{cite news|last1=Stiennon|first1=Richard|title=Is There A Second NSA Leaker?|url=http://www.forbes.com/sites/richardstiennon/2014/07/03/is-there-a-second-nsa-leaker/}}</ref> |
|||
[[Imagen:La Union mercado.jpg|thumb|250px|left|Antiguo mercado público. Arquitectura ecléctico-modernista de [[Víctor Beltrí]]]] |
|||
El asentamiento más antiguo se encuentra en la diputación de [[Portmán]] (topónimo de origen catalán, i.e. "Port Many"), un importante puerto en época romana con el nombre de Portus Magnus, el cual hasta 1898 pertenecería a [[Cartagena (Murcia)|Cartagena]]. Debido al rápido y pingüe desarrollo de la minería durante el siglo XIX, las corporaciones pedáneas de Garbanzal, Herrerías y Portmán decidieron secesionarse de [[Cartagena (Murcia)|Cartagena]], y fusionarse en Municipio y Ayuntamiento propios con el nombre de Villa de El Garbanzal (1 de enero de 1860). Portmán serviría a partir de entonces como puerto mineralero. Sin embargo, pronto las desavenencias entre los pobladores de los principales caseríos (Garbanzal y Herrerías) condujeron al cambio de nombre del joven municipio, que pasó a ser llamado -desde 1868- La Unión. En esto, se dice, actuó la mediación del General Miláns del Bosch, a quien la ciudad dedicaría una de sus calles. Isabel II concedió el título de ciudad al pujante municipio. Una considerable inmigración de andaluces almerienses y granadinos, venidos a trabajar en las minas, contribuyó al especial carácter de la ciudad. Tras la primera gran guerra europea disminuye considerablemente la demanda de mineral de plomo (hasta entonces utilizado en la fabricación de proyectiles), causando esto una severa decadencia con el correspondiente éxodo (al parecer, la ciudad había llegado al alcanzar la cima de los 90.000 habitantes ''de facto'' hacia finales del XIX). Ignorancia, incuria y lucro permitieron a partir de entonces el derribo de una interesante arquitectura decimonónica, de la que aún quedan ciertas muestras como el antiguo Mercado y las casas Plazas, Piñón, antiguo Telégrafos y otras varias en las calles Mayor y Real... En 1940, el Ayuntamiento y sus archivos fueron pasto de un fatal incendio, lo que hasta hoy dificulta el estudio histórico de esta interesante población, ejemplo de una colonización que, tardía en la misma península, era contemporánea a la que se llevaba a cabo en regiones mineras de las Américas. Queda pendiente un estudio de este curioso paralelismo. |
|||
Exploits described in the document are mostly targeted at devices manufactured by US companies, including [[Apple Computer|Apple]],<ref name=Campbell /> [[Cisco]], [[Dell]], [[Juniper Networks]], [[Maxtor]], [[Seagate Technology|Seagate]], and [[Western Digital]], although there is nothing in the document that suggests that the companies were complicit.<ref name=Applebaum /><ref name=Gallagher /> After ''Der Spiegel'' revealed that NSA has the ability to inject software onto [[iPhone]]s using an ANT product called DROPOUTJEEP, Apple issued a statement denying any prior knowledge of the NSA spyware and stated that they would take steps to protect their customers from security attacks "regardless of who's behind them".<ref name=Hughes /> Cisco has mustered their Cisco Product Security Incident Response Team (PSIRT) to investigate the hack vulnerability.<ref name=Brandon /> |
|||
== Economía == |
|||
La economía de La Unión se basó durante mucho tiempo en la explotación de las minas de su sierra. Tras larga decadencia, nuevas iniciativas y procedimientos de explotación (relavado de viejos detritos y roza abierta) animaron la minería hacia los años 60. Por entonces llegan los primeros inmigrantes marroquíes a participar en el laboreo. Agotadas o abandonadas por poco rentables las distintas explotaciones, La Unión se ha ido convirtiendo en una ciudad dormitorio de [[Cartagena (España)|Cartagena]], ya que no pocos de sus habitantes trabajan en dicha ciudad o en los polígonos industriales de sus alrededores. También tiene relativa importancia para La Unión el turismo (Festival del Cante de las Minas, cercanía a las playas del Mar Menor). |
|||
==Capabilities list== |
|||
== Administración == |
|||
The NSA ANT document contains codeword references to hardware and software surveillance technology available to the NSA.<ref name=Elmer-DeWitt /> |
|||
{| align="center" rules="all" cellspacing="0" cellpadding="4" style="border: 1px solid #999; border-right: 2px solid #999; border-bottom:2px solid #999" |
|||
# BULLDOZER: Technology that creates a hidden wireless bridge allowing NSA personnel to remotely control a system wirelessly.<ref name=Gallagher /><ref>GINSU NSA ANT catalog page: [[:File:NSA_GINSU.jpg]] (not publicly known to have its own page in the catalog)</ref> |
|||
|+ style="font-weight: bold; font-size: 1.1em; margin-bottom: 0.5em"| Lista de alcaldes |
|||
# [[:File:NSA CANDYGRAM.jpg|CANDYGRAM]]: A $40,000 [[tripwire]] device that emulates a [[GSM]] cellphone tower. [[File:NSA COTTONMOUTH-I.jpg|thumb|right|COTTONMOUTH-I]] |
|||
! Legislatura !! Nombre !! Partido |
|||
# [[:File:NSA COTTONMOUTH-I.jpg|COTTONMOUTH]]: (see image at right) A family of modified USB and Ethernet connectors that can be used to install [[Trojan horse (computing)|Trojan horse]] software and work as [[wireless bridge]]s, providing covert remote access to the target machine.<ref name="Hesseldahl">{{cite web|url=http://allthingsd.com/20131230/you-wont-believe-all-the-crazy-hardware-the-nsa-uses-for-spying/ |title=You Won't Believe All the Crazy Hardware the NSA Uses for Spying |first=Arik |last=Hesseldahl |authorlink=Arik Hesseldahl |publisher=[[All Things Digital]] |date=2013-12-30 |accessdate=2014-01-20}}</ref> COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. Cost in 2008 was slightly above $1M for 50 units. |
|||
|- |
|||
# COTTONMOUTH-II is deployed in a USB socket (rather than plug), and costs only $200K per 50 units, but requires further integration in the target machine to turn into a deployed system. |
|||
| align=right| [[1995]]-1999 || [[Castañol Conesa]] || [[PP]] |
|||
# COTTONMOUTH-III is a stacked Ethernet and USB plug costing approximately $1.25M for 50 units. |
|||
|- |
|||
# CROSSBEAM is "a GSM communications module capable of collecting and compressing voice data" <ref name="SchneierCrossbeam">{{cite web|url=https://www.schneier.com/blog/archives/2014/02/crossbeam_nsa_e.html|title=CROSSBEAM: NSA Exploit of the Day|first=Bruce|last=Schneier|authorlink=Bruce Schneier|date=2014-02-21|accessdate=2015-02-01}}</ref> |
|||
| align=right| [[1999]]-2003 || [[José Manuel Sanes Vargas]] || [[PSOE]] |
|||
# CTX4000: [[Continuous wave]] radar device that can ""illuminate" a target system for recovery of "off net" information.<ref name=LeakSource /> |
|||
|- |
|||
# [[:File:Nsa-ant-cyclone-hx9.jpg|CYCLONE-HX9]] - GSM Base Station Router |
|||
| align=right| [[2003]]-2007 || [[José Manuel Sanes Vargas]] || [[PSOE]] |
|||
# DEITYBOUNCE: Technology that installs a [[backdoor (computing)|backdoor]] software implant on [[Dell]] [[PowerEdge]] servers via the motherboard BIOS and RAID controller(s).<ref name=God>Darmawan Salihun. "NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE" January 29th, 2014.</ref><ref>DEITYBOUNCE NSA ANT catalog page: [[:File:NSA DEITYBOUNCE.jpg]]</ref> |
|||
|- |
|||
# DROPOUTJEEP: "A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."<ref name=Kain /> |
|||
| align=right| [[2007]]-2011 || [[Francisco M. Bernabé Pérez]] || [[PP]] |
|||
# [[:File:Nsa-ant-ebsr.jpg|EBSR]] is a "tri-band active GSM base station with internal 802.11/GPS/handset capability" <ref name="SchneierEBSR">{{cite web|url=https://www.schneier.com/blog/archives/2014/02/ebsr_nsa_exploi.html|title=EBSR: NSA Exploit of the Day |
|||
|} |
|||
|first=Bruce|last=Schneier|authorlink=Bruce Schneier|date=2014-02-25|accessdate=2015-02-01}}</ref> |
|||
# [[:File:Nsa-ant-entourage.jpg|ENTOURAGE]] |
|||
# FEEDTROUGH: Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.<ref name=Applebaum /><ref name=Zetter /><ref name=Whitwam /> [[File:NSA FIREWALK.jpg|thumb|right|FIREWALK]] |
|||
# FIREWALK: (see image at right) A device that looks identical to a standard [[RJ45 (telecommunications)|RJ45]] socket that allows data to be injected, or monitored and transmitted via radio technology.<ref name=Thomson /> using the HOWLERMONKEY RF transceiver. It can for instance create a [[VPN]] to the target computer. Cost in 2008: $537K for 50 units. |
|||
#* [[FOXACID]]: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level. (''Not numbered because FOXACID may or may not be part of the NSA ANT catalog; sources differ.'') |
|||
# [[:File:Nsa-ant-genesis.jpg|GENESIS]] |
|||
# GINSU: Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.<ref>GINSU NSA ANT catalog page: [[:File:NSA_GINSU.jpg]]</ref> |
|||
# GOPHERSET: GSM software that uses a phone's SIM card’s API (SIM Toolkit or STK) to control the phone through remotely sent commands.<ref name=Estes /> |
|||
# GOURMETTROUGH: User-configurable persistence implant for certain Juniper Networks firewalls.<ref name=LeakSource /> |
|||
# [[:File:NSA HALLUXWATER.jpg|HALLUXWATER]]: Back door exploit for Huawei Eudemon firewalls.<ref name=LeakSource /> |
|||
# HEADWATER: Persistent backdoor technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level on [[Huawei]] routers.<ref name=LeakSource /> [[File:NSA HOWLERMONKEY.jpg|thumb|right|HOWLERMONKEY]] |
|||
# HOWLERMONKEY: (see image at right) A [[RF]] transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely. |
|||
# IRATEMONK: Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, [[Samsung]], Seagate, and Western Digital.<ref name=Meyer /> |
|||
# IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O [[BIOS]].<ref name=Gallagher /> IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software [[Regin (malware)|REGIN]].<ref>{{cite web|first1=Christian |last1=Stöcker|first2=Marcel |last2=Rosenbach|url=http://www.spiegel.de/netzwelt/netzpolitik/trojaner-regin-ist-ein-werkzeug-von-nsa-und-gchq-a-1004950.html|title=Trojaner Regin ist ein Werkzeug von NSA und GCHQ|language=German|date=25 November 2014|work=SPIEGEL ONLINE|accessdate=2 February 2015}}</ref> |
|||
# [[:File:NSA JUNIORMINT.jpg|JUNIORMINT]] |
|||
# JETPLOW: Firmware that can be implant to create a permanent backdoor in a [[Cisco]] PIX series and ASA firewalls.<ref name=LeakSource /> |
|||
# LOUDAUTO: $30 audio-based RF retro-reflector listening device.<ref name=LeakSource /> [[File:NSA TRINITY.jpg|thumb|right|TRINITY]] |
|||
# MAESTRO-II: a [[multi-chip module]] approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz [[ARM7]] processor, 4 MB of flash, 8 MB of RAM, and a [[FPGA]] with 500,000 gates. Unit cost: $3–4K (in 2008). It replaces the previous generation modules which were based on the [[HC12]] microcontroller. |
|||
# MONKEYCALENDAR: Software that transmits a mobile phone's location by hidden text message. |
|||
<!--# MONTANA: A collection of tools, including SIERRAMONTANA, SCHOOLMONTANA and STUCCOMONTANA, designed to compromise Juniper Networks routers running the [[JUNOS]] operating system.<ref name=Gallagher /> Commented out because each has its own document/entry below; there is no MONTANA--> |
|||
# [[:File:Nsa-ant-nebula.jpg|NEBULA]] |
|||
# NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles.<ref name=LeakSource /> |
|||
# NIGHTWATCH: Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it. |
|||
# PICASSO: Software that can collect mobile phone location date, call metadata, access the phone’s microphone to eavesdrop on nearby conversations.<ref name=Estes /> |
|||
# PHOTOANGLO: A joint NSA/GCHQ project to develop a radar system to replace CTX4000.<ref name=LeakSource /> |
|||
# RAGEMASTER: (see image above, right) A concealed $30 device that taps the video signal from a target's computer's [[VGA]] signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most [[DVI]] ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the [[ferrite choke]] of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.<ref name=Satter /> |
|||
# SCHOOLMONTANA: Software that makes DNT implants persistent on [[JUNOS]]-based ([[FreeBSD]]-variant) J-series routers/firewalls.<ref name=LeakSource /> |
|||
# SIERRAMONTANA: Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.<ref name=LeakSource /> |
|||
# STUCCOMONTANA: Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.<ref name=LeakSource /> |
|||
# SOMBERKNAVE: Software that can be implanted on a [[Windows XP]] system allowing it to be remotely controlled from NSA headquarters. |
|||
# SOUFFLETROUGH: BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.<ref name=LeakSource /> [[File:NSA SPARROW II.jpg|SPARROW II|thumb|right]] |
|||
# SPARROW II: (see image at right) A small computer intended to be used for [[WLAN]] collection, including from [[UAV]]s. Hardware: IBM [[Power PC]] 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 [[mini PCI]] slots, [[CompactFlash]] slot, and 802.11 B/G hardware. Running [[Linux]] 2.4 and the BLINDDATE software suite. Unit price (2008): $6K. |
|||
# SURLYSPAWN: Keystroke monitor technology that can be used on remote computers that are not internet connected. |
|||
# SWAP: Technology that can reflash the BIOS of multiprocessor systems that run [[FreeBSD]], [[Linux]], [[Solaris (operating system)|Solaris]], or [[Microsoft Windows|Windows]]. |
|||
# [[:File:NSA TAWDRYYARD.jpg|TAWDRYYARD]] |
|||
# [[:File:NSA TOTECHASER.jpg|TOTECHASER]] |
|||
# TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control. |
|||
# TRINITY: (see image at right) A more recent and more powerful multi-chip module using a 180 MHz [[ARM9]] processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny. Estimated cost (2008) $625K for 100 units. |
|||
# WATERWITCH: A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phones. |
|||
# [[:File:NSA WISTFULTOLL.jpg|WISTFULTOLL]] |
|||
==See also== |
|||
== Edificios, monumentos y lugares de interés == |
|||
* [[Computer and Internet Protocol Address Verifier]] (CIPAV) — FBI trojan |
|||
* [[Duqu]] — spyware worm |
|||
* [[Equation Group]] - a highly advanced secretive computer espionage group, suspected of being tied to the NSA |
|||
* [[FinFisher]] — private-sector trojan used by several states |
|||
* [[MiniPanzer and MegaPanzer]] — Swiss state-sponsored trojans |
|||
* [[R2D2 (trojan)]] — a German state-sponsored trojan |
|||
* [[TEMPEST]] — NSA standards for electromagnetic protection |
|||
* [[WARRIOR PRIDE]] — more recent (2010) NSA/GCHQ capabilities against smartphones |
|||
* [[Communications Assistance for Law Enforcement Act]] - CALEA |
|||
* [[Tempora]] |
|||
==References== |
|||
=== Yacimientos Arqueológicos === |
|||
<!-- PLEASE try to preserve this citation format - It makes editing the article text easier --> |
|||
{{Reflist|2|refs= |
|||
* [[Villa romana del Paturro]] en [[Portmán]] |
|||
<ref name=Applebaum>{{cite web | url=http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html | title=Shopping for Spy Gear: Catalog Advertises NSA Toolbox | publisher=''[[Der Spiegel]]'' | date=December 29, 2013 | accessdate=January 1, 2014 |author1=Applebaum, Jacob |author2=Stöcker, Christian |lastauthoramp=yes }}</ref> |
|||
=== Monumentos civiles === |
|||
<ref name=Brandon>{{cite web | url=http://www.theverge.com/2013/12/30/5256636/nsa-tailored-access-jacob-appelbaum-speech-30c3 | title=The NSA's elite hackers can hijack your Wi-Fi from 8 miles away | publisher=''[[The Verge]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Brandon, Russell}}</ref> |
|||
* El [[Mercado público de La Unión|Antiguo Mercado Público]]. Obra de [[Víctor Beltrí]]. |
|||
*Casa del Piñón de La Unión|Casa del Piñón. Obra de [[Pedro Cerdán]]. |
|||
*Hospital de Sangre (demolido), obra de Carlos Mancha (autor de la torre del Arsenal de Cartagena). |
|||
*Liceo de Obreros |
|||
*La Cooperativa. Obra de Carlos Mancha Escobar |
|||
*Casa Cortés. Obra de [[Víctor Beltrí]]. |
|||
*Antiguo Hospital de la Caridad (Pedanía de [[Portmán]]) |
|||
*Casa del Tío Lobo (Pedanía de [[Portmán]]) |
|||
<ref name=Elmer-DeWitt>{{cite web | url=http://tech.fortune.cnn.com/2013/12/31/apple-nsa-appelbaum-spiegel/ | title=Apple, Jacob Appelbaum and the National Security Agency | publisher=''[[Fortune (magazine)|Fortune]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Elmer-DeWitt, Philip}}</ref> |
|||
=== Monumentos religiosos === |
|||
[[Imagen:La Union Casa.jpg|thumb|250px|right|Casa del Piñón. Eclecticismo ''beaux-arts'', obra de Pedro Cerdán.]] |
|||
<ref name=Hathaway>{{cite web | url=http://www.dailydot.com/politics/nsa-backdoor-iphone-access-camera-mic-appelbaum/ | title=The NSA has nearly complete backdoor access to Apple's iPhone | publisher=''[[Daily Dot]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Hathaway, Jay}}</ref> |
|||
*Parroquia Nuestra Señora del Rosario |
|||
*Parroquia Nuestra Señora de Los Dolores (En Roche) |
|||
*Parroquia Nuestra Señora de Los Dolores (El Garbanzal) |
|||
<ref name=Condliffe>{{cite web | url=http://gizmodo.com/the-nsa-has-crazy-good-backdoor-access-to-iphones-1492117035 | title=The NSA Has Crazy Good Backdoor Access to iPhones | publisher=''[[Gizmodo]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Condliffe, Jamie}}</ref> |
|||
== Gastronomía == |
|||
*michirones con guindilla |
|||
*potaje de legumbres |
|||
*caracoles chupaeros |
|||
*mero a la cazuela |
|||
*sopa de pescado |
|||
*cabrito al horno |
|||
*embutidos caseros |
|||
*salazón de melba con tomate fresco |
|||
*tápenas |
|||
*bebidas típicas mineras: láguena y reparo. |
|||
*pan sobao |
|||
*tostadas del Café Mayor |
|||
*rollicos de Pascua |
|||
*mostachones |
|||
*crespillos |
|||
*torraos |
|||
*migas de pan |
|||
*migas de harina de trigo |
|||
<ref name=Edwards>{{cite web | url=http://www.businessinsider.com/nsa-spyware-backdoor-on-iphone-2013-12#ixzz2p9j67gXN | title=DOCUMENTS: NSA Has 'A 100% Success Rate' Putting Spyware On iPhones | publisher=''[[Business Insider]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Edwards, Jim}}</ref> |
|||
== Demografía == |
|||
<ref name=Whitwam>{{cite web | url=http://www.extremetech.com/computing/173721-the-nsa-regularly-intercepts-laptop-shipments-to-implant-malware-report-says | title=The NSA regularly intercepts laptop shipments to implant malware, report says | publisher=''[[Extreme Tech]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Whitwam, Ryan}}</ref> |
|||
[[Imagen:Poblacion-La-Union-Murcia-España-1900-2005.png|float|right|210px]] |
|||
<ref name=LeMonde>{{cite web | url=http://www.lemonde.fr/technologies/article/2013/12/30/de-l-interception-de-colis-a-l-espionnage-du-moniteur-inventaire-des-outils-de-la-nsa_4341385_651865.html | title=De l'interception de colis à l'espionnage de l'écran, inventaire des outils de la NSA | publisher=''[[Le Monde]]'' | date=December 30, 2013 | accessdate=January 1, 2014}}</ref> |
|||
En la evolución demográfica de La Unión desde 1900 resultan evidentes los efectos de la crisis minera de principios de siglo, con una pérdida de casi los dos tercios de la población. Desde el mínimo histórico de 1950, en cambio, la tendencia general es ascendente. |
|||
<ref name=Satter>{{cite web | url=http://abcnews.go.com/International/wireStory/hacker-pulls-curtain-back-nsa-spy-gear-21372219 | archiveurl=http://archive.today/20131231235935/http://abcnews.go.com/International/wireStory/hacker-pulls-curtain-back-nsa-spy-gear-21372219{{dead link <!-- consider change the domain --> |date=February 2016}} | archivedate=2013-12-31 <!-- 235935 --> | title=Privacy Advocate Exposes NSA Spy Gear at Gathering | publisher=''[[ABC News]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Satter, Raphael}}</ref> |
|||
{| align="center" {{tablabonita}} |
|||
!bgcolor=black colspan=20 style="color:white;"|Evolución demográfica del municipio de La Unión<ref><small>'''Fuente''': [[Población de hecho]] según el [[Instituto Nacional de Estadística de España]]. [http://www.ine.es/intercensal/index Alteraciones de los municipios en los Censos de Población desde 1842,] [http://www.ine.es/inebase2/leer.jsp?L=0&divi=DPOP&his=0 Series de población de los municipios de España desde 1996.] </small></ref> |
|||
|- |
|||
! !![[1900]] !! [[1910]] !! [[1920]] !! [[1930]] !! [[1940]] !! [[1950]] !! [[1960]] |
|||
|- |
|||
| Población|| align=center| 30.275 || align=center| 30.249 || align=center| 24.837 || align=center| 11.776 || align=center| 10.079 || align=center| 10.131 || align=center| 11.687 |
|||
|- |
|||
! !! [[1970]] !! [[1981]] !! [[1991]] !! [[2001]] !! [[2005]] !! [[2006]] !! [[2007]] |
|||
|- |
|||
| Población|| align=center| 13.145 || align=center| 14.097 || align=center| 13.732 || align=center| 14.793 || align=center| 15.599 || align=center| 15.599 || align=center| 16.180 |
|||
|- |
|||
|} |
|||
<ref name=Mick>{{cite web | url=http://www.dailytech.com/Tax+and+Spy+How+the+NSA+Can+Hack+Any+American+Stores+Data+15+Years/article34010.htm | title=Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years | publisher=''[[Daily Tech]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Mick, Jason}}</ref> |
|||
== Fiestas y Otros Eventos == |
|||
<ref name=Lawler>{{cite web | url=http://www.engadget.com/2013/12/31/nsa-drououtjeep-iphone-hack-details/ | title=Leaked documents detail 2008 NSA program to hack and remote control iPhones | publisher=''[[Engadget]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Lawler, Richard}}</ref> |
|||
*[[Festival Internacional del Cante de las Minas]] |
|||
*Semana Santa Minera [http://www.ayto-launion.com/?id=43&idsub=43] |
|||
*Fiestas Patronales en honor a Nuestra Señora del Rosario. Octubre. |
|||
*Fiestas Populares de Roche. Julio y Agosto |
|||
*Fiestas Patronales de Portman, Santiago Apostol. 25 de julio. |
|||
*Feria Anual de Minerales y Fósiles |
|||
<ref name=Hardawar>{{cite web | url=http://venturebeat.com/2013/12/31/the-iphone-has-reportedly-been-fully-hacked-by-the-nsa-since-2008/ | title=The iPhone has reportedly been fully hacked by the NSA since 2008 (Update: Apple denies working with NSA) | publisher=''[[Venture Beat]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Hardawar, Devindra}}</ref> |
|||
== Personas célebres nacidas en esta localidad == |
|||
*[[Ramón Perelló]], poeta-letrista de celebridades (1903-1978). |
|||
*[[Juan Pujol (poeta)|Juan Pujol]], poeta ([[1883]]-[[1960]]). |
|||
*[[Santos Martínez Sanrá]], escritor, secretario del Presidente Azaña (1909 - México, 1997) |
|||
*[[Pencho Cros]] (cantaor), ([[1925]]-[[2007]]) |
|||
*[[Andrés Cegarra]], poeta ([[3 de mayo]] de [[1894]] - [[14 de enero]] de [[1928]]). |
|||
*[[María Cegarra Salcedo]], químico y poeta. |
|||
*[[Clemente Cebrián Martínez]],([[1920-]], ingeniero físico, industrial, profesor, Caballero de la Legion d´Honneur |
|||
*[[Asensio Sáez]], poeta, cronista, articulista, dibujante. |
|||
*[[Paco Conesa]], pintor e imaginero. |
|||
*[[Maruja Vicente]], artesana bordadora. |
|||
*[[Rojo el Alpargatero]], cantaor trovero. |
|||
*[[Emilia Benito]], cantaora. |
|||
<ref name=Kain>{{cite web | url=http://www.forbes.com/sites/erikkain/2013/12/30/the-nsa-reportedly-has-total-access-to-your-iphone/ | title=The NSA Reportedly Has Total Access To The Apple iPhone | publisher=''[[Forbes]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Kain, Erik}}</ref> |
|||
== Véase también == |
|||
<ref name=Zetter>{{cite web | url=http://www.wired.com/threatlevel/2013/12/nsa-hacking-catalogue/ | title=NSA Hackers Get the ‘Ungettable’ With Rich Catalog of Custom Tools | publisher=''[[Wired (magazine)|Wired]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Zetter, Kim}}</ref> |
|||
*[[Campo de Cartagena]] |
|||
*[[Playas de la Región de Murcia]] |
|||
* [[Modernismo en Cartagena y La Unión]] |
|||
<ref name=Meyer>{{cite web | url=http://gigaom.com/2013/12/29/nsas-backdoor-catalog-exposed-targets-include-juniper-cisco-samsung-and-huawei/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+OmMalik+%28GigaOM%3A+Tech%29 | title=NSA’s backdoor catalog exposed: Targets include Juniper, Cisco, Samsung, Huawei | publisher=''[[Gigaom]]'' | date=December 29, 2013 | accessdate=January 1, 2014 | author=Meyer, David}}</ref> |
|||
== Bibliografía == |
|||
<ref name=Thomson>{{cite web | url=http://www.theregister.co.uk/Print/2013/12/31/nsa_weapons_catalogue_promises_pwnage_at_the_speed_of_light/ | title=How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks | publisher=''[[The Register]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Thomson, Iain}}</ref> |
|||
* FERNÁNDEZ DE AVILÉS, A. El poblado minero iberorromano del Cabezo Agudo, en La Unión. Consejo Superior de Investigación Científica. Instituto Diego Velázquez. Madrid. (1942). |
|||
* LINARES MARTÍNEZ, F. La crisis de la comarca minera de Cartagena-La Unión (1987-1991). Un estudio sociológico sobre las paradojas de la acción racional. Concejalía de Cultura del Ayuntamiento de Cartagena y la Cámara Minera. Cartagena. (2001). |
|||
* OLMOS SÁNCHEZ, I. La ciudad de La Unión durante la II república (1931-1939). Universidad de Murcia. Murcia. (1997). |
|||
* SÁEZ, A. Libro de La Unión. Biografía de una ciudad alucinante. Asociación Belenista de Cartagena-La Unión. Murcia. (1998). |
|||
<ref name=Campbell>{{cite web | url=http://appleinsider.com/articles/13/12/30/nsa-worked-on-iphone-spyware-to-remotely-monitor-users-leaked-documents-show | title=NSA worked on iPhone spyware to remotely monitor users, leaked documents show | publisher=''[[Apple Insider]]'' | date=December 30, 2013 | accessdate=January 1, 2014 | author=Campbell, Mickey}}</ref> |
|||
== Enlaces externos == |
|||
* [http://www.ayto-launion.com Ayuntamiento de La Unión] |
|||
<ref name=Hughes>{{cite web | url=http://appleinsider.com/articles/13/12/31/apple-says-it-was-unaware-of-nsas-iphone-spying-vows-to-defend-customers-privacy | title=Apple says it was unaware of NSA's iPhone spying, vows to defend customers' privacy | publisher=''[[Apple Insider]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Hughes, Neil}}</ref> |
|||
* [http://www.launionweb.com La Unión Web, CIUDAD MINERA], información general sobre La Unión |
|||
* [http://centros5.pntic.mec.es/ies.maria.cegarra.salcedo IES “María Cegarra Salcedo”], instituto de educación secundaria. |
|||
<ref name=Gallagher>{{cite web | url=http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/ | title=Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic | publisher=''[[Ars Technica]]'' | date=December 31, 2013 | accessdate=January 1, 2014 | author=Gallagher, Sean}}</ref> |
|||
*[http://www.cantedelasminas.org/ Festival Internacional del Cante de las Minas] |
|||
*[http://www.agrupacionmusicallaunion.com/ Agrupación Musical La Unión], escuela y banda de música. |
|||
<ref name="Kirk">{{cite web|url=http://www.computerworld.com/s/article/print/9245064/The_NSA_intercepts_computer_deliveries_to_plant_spyware|title=The NSA intercepts computer deliveries to plant spyware|first=Jeremy|last=Kirk|work=Computerworld|issn=0010-4841|date=December 30, 2013|accessdate=9 September 2014|archive-url=http://timetravel.mementoweb.org/memento/20140101203813/www.computerworld.com/s/article/print/9245064/The_NSA_intercepts_computer_deliveries_to_plant_spyware|archivedate=2014-01-01}} WARNING: SOMEONE IS FUCKING WITH THIS REFERENCE. [http://archive.is/wz1tT THIS IS A WORKING ARCHIVE OF THE ARTICLE CONTENT.] The other archiveURL link does not bring up the article content. </ref> |
|||
*[http://www.elgachero.es/ Peña El Gachero de La Unión-Murcia], Asociación Cultural Peña El Gachero. |
|||
*[http:////club.telepolis.com/minaloveremos/ Distrito minero de La Unión] Web dedicada a la minería en La Unión. |
|||
<ref name=Estes>{{cite web | url=http://www.gizmodo.com.au/2014/01/a-peek-inside-the-nsas-spy-gear-catalog/ | title=A Peek Inside The NSA's Spy Gear Catalogue | publisher=''[[Gizmodo]]'' Australia | date=December 31, 2013 | accessdate=January 1, 2014 | author=Estes, Adam Clark}}</ref> |
|||
<ref name=LeakSource>{{cite web | url=http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/ | title=NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | publisher=''LeakSource'' | date=December 30, 2013 | accessdate=January 2, 2014}}</ref> |
|||
}} |
|||
{{commons category|NSA ANT}} |
|||
[[Categoría:Localidades de Murcia|Union, La]] |
|||
[[Categoría:Municipios de la Región de Murcia|Union, La]] |
|||
{{DEFAULTSORT:NSA ANT catalog}} |
|||
[[ca:La Unión]] |
|||
[[Category:Mass surveillance]] |
|||
[[en:La Unión, Murcia]] |
|||
[[Category:National Security Agency operations]] |
|||
[[eu:La Union]] |
|||
[[it:La Unión (Spagna)]] |
|||
[[la:Unio]] |
|||
[[nl:La Unión (Murcia)]] |
|||
[[pl:La Unión (miasto w Hiszpanii)]] |
|||
[[pt:La Unión (Espanha)]] |
|||
[[ru:Ла-Унион (Испания)]] |
Version vom 22. Juli 2016, 21:27 Uhr

The NSA ANT catalog is a 50-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. Most devices are described as already operational and available to US nationals and members of the Five Eyes alliance. According to Der Spiegel, which released the catalog to the public on December 30, 2013, "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data."[1][2][3][4][5][6][7][8][9] The document was created in 2008.[10]
Security researcher Jacob Appelbaum gave a speech at the Chaos Communications Congress in Hamburg, Germany, in which he detailed techniques that the simultaneously published Der Spiegel article he coauthored indicate the NSA uses in its surveillance efforts in the US and internationally.[6][11]
The prices of the items in the catalog range from free (typically for software) to US$250,000.[1]
Background
In 2013, Der Spiegel published an article, co-written by Jacob Appelbaum, Judith Horchert and Christian Stöcker, that exposed the NSA "toolbox". Their source of the document was not disclosed. While it came from one of the news agencies in possession of documents leaked by former NSA contractor Edward Snowden,[12] security expert Bruce Schneier said he doesn't "believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."[12]Vorlage:Failed verification[13]
Exploits described in the document are mostly targeted at devices manufactured by US companies, including Apple,[14] Cisco, Dell, Juniper Networks, Maxtor, Seagate, and Western Digital, although there is nothing in the document that suggests that the companies were complicit.[1][15] After Der Spiegel revealed that NSA has the ability to inject software onto iPhones using an ANT product called DROPOUTJEEP, Apple issued a statement denying any prior knowledge of the NSA spyware and stated that they would take steps to protect their customers from security attacks "regardless of who's behind them".[16] Cisco has mustered their Cisco Product Security Incident Response Team (PSIRT) to investigate the hack vulnerability.[17]
Capabilities list
The NSA ANT document contains codeword references to hardware and software surveillance technology available to the NSA.[18]
- BULLDOZER: Technology that creates a hidden wireless bridge allowing NSA personnel to remotely control a system wirelessly.[15][19]
- CANDYGRAM: A $40,000 tripwire device that emulates a GSM cellphone tower.
COTTONMOUTH-I - COTTONMOUTH: (see image at right) A family of modified USB and Ethernet connectors that can be used to install Trojan horse software and work as wireless bridges, providing covert remote access to the target machine.[20] COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. Cost in 2008 was slightly above $1M for 50 units.
- COTTONMOUTH-II is deployed in a USB socket (rather than plug), and costs only $200K per 50 units, but requires further integration in the target machine to turn into a deployed system.
- COTTONMOUTH-III is a stacked Ethernet and USB plug costing approximately $1.25M for 50 units.
- CROSSBEAM is "a GSM communications module capable of collecting and compressing voice data" [21]
- CTX4000: Continuous wave radar device that can ""illuminate" a target system for recovery of "off net" information.[22]
- CYCLONE-HX9 - GSM Base Station Router
- DEITYBOUNCE: Technology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller(s).[23][24]
- DROPOUTJEEP: "A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."[8]
- EBSR is a "tri-band active GSM base station with internal 802.11/GPS/handset capability" [25]
- ENTOURAGE
- FEEDTROUGH: Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.[1][9][26]
FIREWALK - FIREWALK: (see image at right) A device that looks identical to a standard RJ45 socket that allows data to be injected, or monitored and transmitted via radio technology.[27] using the HOWLERMONKEY RF transceiver. It can for instance create a VPN to the target computer. Cost in 2008: $537K for 50 units.
- FOXACID: Technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level. (Not numbered because FOXACID may or may not be part of the NSA ANT catalog; sources differ.)
- GENESIS
- GINSU: Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.[28]
- GOPHERSET: GSM software that uses a phone's SIM card’s API (SIM Toolkit or STK) to control the phone through remotely sent commands.[29]
- GOURMETTROUGH: User-configurable persistence implant for certain Juniper Networks firewalls.[22]
- HALLUXWATER: Back door exploit for Huawei Eudemon firewalls.[22]
- HEADWATER: Persistent backdoor technology that can install spyware using a "quantum insert" capable of infecting spyware at a packet level on Huawei routers.[22]
HOWLERMONKEY - HOWLERMONKEY: (see image at right) A RF transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely.
- IRATEMONK: Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital.[30]
- IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O BIOS.[15] IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software REGIN.[31]
- JUNIORMINT
- JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco PIX series and ASA firewalls.[22]
- LOUDAUTO: $30 audio-based RF retro-reflector listening device.[22]
TRINITY - MAESTRO-II: a multi-chip module approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz ARM7 processor, 4 MB of flash, 8 MB of RAM, and a FPGA with 500,000 gates. Unit cost: $3–4K (in 2008). It replaces the previous generation modules which were based on the HC12 microcontroller.
- MONKEYCALENDAR: Software that transmits a mobile phone's location by hidden text message.
- NEBULA
- NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles.[22]
- NIGHTWATCH: Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it.
- PICASSO: Software that can collect mobile phone location date, call metadata, access the phone’s microphone to eavesdrop on nearby conversations.[29]
- PHOTOANGLO: A joint NSA/GCHQ project to develop a radar system to replace CTX4000.[22]
- RAGEMASTER: (see image above, right) A concealed $30 device that taps the video signal from a target's computer's VGA signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most DVI ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the ferrite choke of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.[6]
- SCHOOLMONTANA: Software that makes DNT implants persistent on JUNOS-based (FreeBSD-variant) J-series routers/firewalls.[22]
- SIERRAMONTANA: Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.[22]
- STUCCOMONTANA: Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.[22]
- SOMBERKNAVE: Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters.
- SOUFFLETROUGH: BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.[22]
SPARROW II - SPARROW II: (see image at right) A small computer intended to be used for WLAN collection, including from UAVs. Hardware: IBM Power PC 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 mini PCI slots, CompactFlash slot, and 802.11 B/G hardware. Running Linux 2.4 and the BLINDDATE software suite. Unit price (2008): $6K.
- SURLYSPAWN: Keystroke monitor technology that can be used on remote computers that are not internet connected.
- SWAP: Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows.
- TAWDRYYARD
- TOTECHASER
- TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control.
- TRINITY: (see image at right) A more recent and more powerful multi-chip module using a 180 MHz ARM9 processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny. Estimated cost (2008) $625K for 100 units.
- WATERWITCH: A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phones.
- WISTFULTOLL
See also
- Computer and Internet Protocol Address Verifier (CIPAV) — FBI trojan
- Duqu — spyware worm
- Equation Group - a highly advanced secretive computer espionage group, suspected of being tied to the NSA
- FinFisher — private-sector trojan used by several states
- MiniPanzer and MegaPanzer — Swiss state-sponsored trojans
- R2D2 (trojan) — a German state-sponsored trojan
- TEMPEST — NSA standards for electromagnetic protection
- WARRIOR PRIDE — more recent (2010) NSA/GCHQ capabilities against smartphones
- Communications Assistance for Law Enforcement Act - CALEA
- Tempora
References
- ↑ a b c d Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Applebaum. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Hathaway. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Condliffe. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Edwards. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen LeMonde. - ↑ a b c Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Satter. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Hardawar. - ↑ a b Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Kain. - ↑ a b Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Zetter. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Lawler. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Mick. - ↑ a b Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Kirk. - ↑ Richard Stiennon: Is There A Second NSA Leaker?
- ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Campbell. - ↑ a b c Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Gallagher. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Hughes. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Brandon. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Elmer-DeWitt. - ↑ GINSU NSA ANT catalog page: File:NSA_GINSU.jpg (not publicly known to have its own page in the catalog)
- ↑ Arik Hesseldahl: You Won't Believe All the Crazy Hardware the NSA Uses for Spying. All Things Digital, 30. Dezember 2013, abgerufen am 20. Januar 2014.
- ↑ Bruce Schneier: CROSSBEAM: NSA Exploit of the Day. 21. Februar 2014, abgerufen am 1. Februar 2015.
- ↑ a b c d e f g h i j k l Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen LeakSource. - ↑ Darmawan Salihun. "NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE" January 29th, 2014.
- ↑ DEITYBOUNCE NSA ANT catalog page: File:NSA DEITYBOUNCE.jpg
- ↑ Bruce Schneier: EBSR: NSA Exploit of the Day. 25. Februar 2014, abgerufen am 1. Februar 2015.
- ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Whitwam. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Thomson. - ↑ GINSU NSA ANT catalog page: File:NSA_GINSU.jpg
- ↑ a b Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Estes. - ↑ Referenzfehler: Ungültiges
<ref>
-Tag; kein Text angegeben für Einzelnachweis mit dem Namen Meyer. - ↑ Christian Stöcker, Marcel Rosenbach: Trojaner Regin ist ein Werkzeug von NSA und GCHQ. In: SPIEGEL ONLINE. 25. November 2014, abgerufen am 2. Februar 2015 (deutsch).