Zum Inhalt springen
DER SPIEGEL
International
Abonnement
Abo
Anmelden
" data-sara-click-el="button" :class="{'lg:opacity-none lg:invisible md:opacity-none md:invisible': !isCollapsed,}">
Menü öffnen
International
●
News
●
Ticker
●
Magazin
●
Audio
●
Account
$swiper.update())" x-swiper="{freeMode: true,roundLengths: false,slidesPerView: 'auto',watchOverflow: true,}" @swiper-init="$swiper.slideTo($swiper.slides.length - 1, 500, false)" data-area="nav-bar" data-app-hidden x-lazyload>
●
Startseite
●
International
●
World
●
NSA Spying Scandal
NSA Secret Toolbox: ANT Unit Offers Spy Gadgets for Every Need
$swiper.update(), 300);},close() {this.isOpen = false;setTimeout(() => $swiper.update(), 300);}}" @keyup.escape="if (!$event.defaultPrevented) {$event.preventDefault();close();$focus($refs.toggle);}" @mousedown.outside="close()" :class="{'lg:w-4/12': isOpen,'md:w-5/12': isOpen,}">
EILMELDUNG —
__proto_headline__
EILMELDUNG —
__proto_headline__
NSA's Secret Toolbox
Unit Offers Spy Gadgets for Every Need
The NSA has a secret unit that produces special equipment ranging from spyware for computers and cell phones to listening posts and USB sticks that work as bugging devices. Here are some excerpts from the intelligence agency's own catalog.
●
●
X.com
●
Facebook
●
E-Mail
●
●
●
X.com
●
Facebook
●
E-Mail
●
Messenger
●
WhatsApp
●
Dieser Beitrag stammt aus dem SPIEGEL-Archiv. Warum ist das wichtig?
Interactive Graphic:
The NSA's Spy Catalog

Editor's note: This is a sidebar to our main feature story on the NSA's Tailored Access Operations unit. You can read the main text here
.
When agents with the NSA's Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that's what the division produces -- tools for penetrating network equipment and monitoring mobile phones and computers. ANT's products help TAO agents infiltrate networks and divert or even modify data wherever the NSA's usual methods won't suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.
SPIEGEL has obtained an internal NSA catalog describing ANT's various products, along with their prices. A rigged monitor cable, for example, which allows "TAO personnel to see what is displayed on the targeted monitor," goes for $30 (€22). An "active GSM base station" that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.
Intelligence agencies, incidentally, are not the only ones using these types of devices. The same kind of modified USB plug played a role, for example, in a recent high-tech drug-smuggling case uncovered at the port of Antwerp, Belgium.
Spying on Allies
It has become clear that the ANT arsenal isn't used exclusively to track suspected terrorists. GSM base stations, for example, make it possible to monitor mobile phones, such as that of German Chancellor Angela Merkel . Radar systems such as the one known as "DROPMIRE " have also been used to spy on allies, for example EU representatives in Washington . And the hardware "implants" found in the ANT catalog evidently have been used, for example, to tap encrypted faxes.
NSA malware has also been used against international telecommunications companies , such as partially state-owned Belgian company Belgacom and mobile phone billing service provider MACH. One internal NSA document dating from 2004 describes a spyware program called "VALIDATOR" by saying that it provides "unique backdoor access to personal computers of targets of national interest, including but not limited to terrorist targets."
In the graphic in this article, you can browse nearly 50 pages from the ANT catalog, sorted by where these devices would potentially be used and purged of the names and email addresses of agents. There are "implants," as the NSA calls them, for computers, servers, routers and hardware firewalls. There is special equipment for covertly viewing everything displayed on a targeted individual's monitor. And there are bugging devices that can conduct surveillance without sending out any measurable radio signal -- their signals are instead picked up using radar waves. Many of these items are designed for subverting the technical infrastructure of telecommunications companies to exploit them, undetected, for the NSA's purposes, or for tapping into company networks.
Spyware for mobile phones was even on offer in the 2008 version of the catalog. A Trojan for gaining total access to iPhones, which were still new at the time, was still in development, though its specifications are listed in the catalog.
'Implants' for Cisco, Juniper, Dell, Huawei and HP
The catalog is not up to date. Many of the software solutions on offer date from 2008, some apply to server systems or mobile phone models no longer on the market, and it is very likely that the portions SPIEGEL has seen are far from complete. And yet this version still provides considerable insight both into the tools the NSA has had at its disposal for years and into the agency's boundless ambitions. It is safe to assume that ANT's hackers are constantly improving their arsenal. Indeed, the catalog makes frequent mention of other systems that will be "pursued for a future release."
The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.
There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. The company has also since commented on SPIEGEL's intitial reporting on a Cisco blog . "We are deeply concerned with anything that may impact the integrity of our products or our customers' networks and continue to seek additional information," the company wrote.
A representative of Hewlett-Packard wrote that the company was not aware of any of the information presented in the report and that it did "not believe any of it to be true." Contacted by SPIEGEL reporters, officials at Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates."
TAO's implants, in place around the world, have played a significant role in the NSA's ability to establish a global covert network consisting partly of the agency's own hardware, but also of other computers subverted to serve its purposes.


Fotostrecke
Photo Gallery: NSA's TAO Unit Introduces Itself
Foto: SPIEGEL ONLINE
Intercepting Packages and Manipulating Computers
ANT's developers often seek to place their malicious code in BIOS, software located directly on a computer's motherboard that is the first thing to load when the computer is turned on. Even if the hard drive is wiped and a new operating system installed, ANT's malware continues to function, making it possible to later add other spyware back onto the computer.
Along with the BIOS software of computers and servers, the NSA's hackers also attack firmware on computer hard drives, essentially the software that makes the hardware work. The ANT catalog includes, for example, spyware capable of embedding itself unnoticed into hard drives manufactured by Western Digital, Seagate and Samsung. The first two of these are American companies.
Many of these digital tools are "remotely installable," meaning they can be put in place over the Internet. Others, however, require direct intervention, known in NSA jargon as "interdiction." This means that brand new products being delivered by mail are secretly intercepted, and hardware or software implants installed on them. The package is forwarded to its intended destination only after this has been done.
Windows Error Messages Potential Sources of Information
One example of the creativity with which the TAO spies approach their work can be seen in a hacking method that exploits frequent errors on Microsoft Windows. Every user of the operating system is familiar with the window that pops up on screen when an internal problem is detected, asking the user to report the error to Microsoft with a click of the mouse. The window promises this communication will be "confidential and anonymous."
For TAO specialists, these crash reports either were or continue to be a welcome source of potential information. When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft.

A typical Windows crash report prompt.
Foto: SPIEGEL ONLINE
The automated crash reports are a "neat way" to gain "passive access" to a targeted machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.
Although the method appears to have little importance in practical terms, the NSA's agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant. In one internal graphic, they replaced the text of Microsoft's original error message with one of their own reading, "This information may be intercepted by a foreign sigint system to gather detailed information and better exploit your machine." ("Sigint" stands for "signals intelligence.")

NSA analysts have a laugh at the expense of Microsoft.
Foto: SPIEGEL ONLINE
In response to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission.
One trail also leads to Germany. According to a document dating from 2010 that lists the "Lead TAO Liaisons" domestically and abroad as well as names, email addresses and the number for their "Secure Phone," a liaison office is located near Frankfurt -- the European Security Operations Center (ESOC) at the so-called "Dagger Complex " at a US military compound in the Griesheim suburb of Darmstadt.
BY JACOB APPELBAUM, JUDITH HORCHERT, OLE REISSMANN, MARCEL ROSENBACH, JÖRG SCHINDLER AND CHRISTIAN STÖCKER
WITH ADDITIONAL REPORTING BY ANDY MÜLLER-MAGUHN
= $appBridge.minAppNavigationHomepageVersion ? $publish('APP_NAVIGATION', { targetId: 'homepage' }) : window.location.href = $el.href">
= $appBridge.minAppNavigationHomepageVersion? $publish('APP_NAVIGATION', { targetId: 'homepage' }) : window.location.href = $el.href">
Startseite
{if (response.status !== 200) {throw new Error(`smartfeed init - failed to fetch prototypes, URL: ${response.url}`);}response.text().then((result) => {const containerElement = document.createElement('template');containerElement.innerHTML = result;const templates = containerElement.content.querySelectorAll('template');templates.forEach((template) => {if (template.id === 'footer-svgs') {const footerSvgsContainerElement = document.body.querySelector('[data-el=footerSvgs]');if (footerSvgsContainerElement instanceof Element) {const prototypeFooterSvgs = template.content.querySelectorAll('svg[id]');prototypeFooterSvgs.forEach((prototypeFooterSvg) => {if (prototypeFooterSvg.id && !footerSvgsContainerElement.querySelector(`#${prototypeFooterSvg.id}`)) {footerSvgsContainerElement.append(prototypeFooterSvg);}});}return;}document.body.append(template);});this.prototypesInitialized = true;}).catch((error) => { console.error(`smartfeed init - failed to parse prototypes, URL: ${response.url}`); });}).catch((error) => { console.error(error.message); });},async getTeasersFromSmartfeedAPI(block) {let teasers;const payload = {sortBy: block?.sortBy || 'newest',pageSize: block?.pageSize || 10,};if (block?.type === 'channel' && block.channel) {payload.channel = block.channel;if (block.subchannel && payload.sortBy === 'newest') {payload.subchannel = block.subchannel;}try {teasers = await $smartfeedAPI.getTeasersByChannel(payload);} catch (e) {return [];}} else if (block?.type === 'domain' && block.domain) {payload.domain = block.domain;try {teasers = await $smartfeedAPI.getTeasersByDomain(payload);} catch (e) {return [];}} else if (block?.type === 'style' && block.style) {payload.style = block.style;try {teasers = await $smartfeedAPI.getTeasersByStyle(payload);} catch (e) {return [];}} else {return [];}if (!Array.isArray(teasers)) {return [];}if (Number.isInteger(block.maxAge)) {teasers = teasers.filter((teaser) => {return !teaser.time || teaser.time > 1769956039 - block.maxAge;});}if (teasers.length === 0) {return [];}const breakpoint = $store.MediaQuery?.breakpoint ? $store.MediaQuery.breakpoint : 'lg';const teaserLayouts = Array.isArray(block?.teaserLayouts?.[breakpoint]) ? block.teaserLayouts[breakpoint] : [];const teaserCount = teaserLayouts.length > 0 ? teaserLayouts.length : 3;const filteredTeasers = teasers.filter((teaser) => teaser.id && !this.consumedArticleIds.includes(teaser.id));teasers = filteredTeasers.length < teaserCount ? teasers : filteredTeasers;teasers ‖ $arrayUtils.shuffle(teasers);teasers = teasers.slice(0, teaserCount);teasers.forEach((teaser, teaserIndex) => {teaser.layout = teaserLayouts[teaserIndex] ? teaserLayouts[teaserIndex] : 'm';teaser.pos = `${block.index + 1}:${teaserIndex + 1}`;if (teaser.id) {this.consumedArticleIds.push(teaser.id);}});return teasers;},async getTeasersFromRECOService(block) {if (!$store.User.isLoggedIn || !$store.User.recommendations?.smartfeed) {return null;};await $waitForCustomVendorConsents();const recommendationsPurposeId = $store.User.hasNoAdsAccess ? '64bf9cc6b4a67c0535f66213' : '655f1ab47129a00595f31a65';if (!$arePurposeIdsVerified([recommendationsPurposeId])) {return null;}let recoResponse;try {recoResponse = await $RECO.getRecommendedArticles(type='smartfeed');} catch (e) {return null;}if (!Array.isArray(recoResponse?.articleIds) || recoResponse.articleIds.length === 0) {return null;}let articleIds = recoResponse.articleIds;const runId = recoResponse.runId;const createdAt = recoResponse.createdAt ?? undefined;const breakpoint = $store.MediaQuery?.breakpoint ? $store.MediaQuery.breakpoint : 'lg';const teaserLayouts = Array.isArray(block?.teaserLayouts?.[breakpoint]) ? block.teaserLayouts[breakpoint] : [];const teaserCount = teaserLayouts.length > 0 ? teaserLayouts.length : 3;const filteredArticleIds = articleIds.filter((articleId) => !this.consumedArticleIds.includes(articleId));articleIds = filteredArticleIds.length < teaserCount ? articleIds : filteredArticleIds;articleIds ‖ $arrayUtils.shuffle(articleIds);articleIds = articleIds.slice(0, teaserCount);this.consumedArticleIds = this.consumedArticleIds.concat(articleIds);let sitesearchResponse;try {sitesearchResponse = await $siteSearchAPI.getTeasersByIds(articleIds);} catch (e) {return null;}if (!sitesearchResponse.success || !Array.isArray(sitesearchResponse.teasers) || sitesearchResponse.teasers.length === 0) {return null;}const teasers = sitesearchResponse.teasers;teasers.forEach((teaser, teaserIndex) => {teaser.layout = teaserLayouts[teaserIndex] ? teaserLayouts[teaserIndex] : 'm';teaser.pos = `${block.index + 1}:${teaserIndex + 1}`;});return {teasers,runId,createdAt,};},createAdSlot(adIndex) {if (this.$refs.adSlot && this.$refs.adSlot.content) {const adContainer = document.createElement('div');adContainer.appendChild(this.$refs.adSlot.content.cloneNode(true));const adPositionId = 'pos_recommendation_'.replace(new RegExp(``, 'g'), adIndex + 1);adContainer.innerHTML = adContainer.innerHTML.replace(new RegExp(`pos_mobile`, 'g'), adPositionId);adContainer.innerHTML = adContainer.innerHTML.replace(new RegExp(`pos_desktop`, 'g'), adPositionId);return adContainer.firstElementChild;}},}" x-lazyload data-area="smartfeed">
$publish('LAZYLOADING_UPDATE'))">
0}">
martfeed">
0) {teasers = response?.teasers;this.runId = response.runId;this.createdAt = response.createdAt;this.itemSource = 'RECO';sarasViewEventName = 'replace recommendation';}if (!teasers && block.fallback?.type) {teasers = await this.getTeasersFromSmartfeedAPI(block.fallback);this.itemSource = block.fallback.itemSource || this.itemSource;}if (!teasers || teasers.length === 0) {return;}const teaserContainer = $teaserFactory.blocksContentArticleTeaserFull({ teasers, headlineOffset: !!this.label });const container = $el.querySelector('[x-ref=container]');if (!container || !teaserContainer) {return;}container.append(teaserContainer);$publish('LAZYLOADING_UPDATE');if (typeof window.polygon?.componentLoader?.scan === 'function') {window.polygon.componentLoader.scan();}this.isLoading = false;this.items = teasers.map((teaser, index) => ({item_id: teaser.id,item_title: teaser.headline || '',item_pos: index + 1,}));$SARAs.sendComponentViewEvent(block.id, sarasViewEventName);},}" x-lazyload x-ignore x-effect="if (prototypesInitialized) loadTeasers();" :data-sara-component="JSON.stringify(saraComponentObject)" :data-sara-action="!isLoading ? 'impression' : null">
martfeed">
martfeed">
Mehr lesen über
NSA Spying Scandal
United States
US Spying
Internet
Verwandte Artikel
Inside TAO : Documents Reveal Top NSA Hacking Unit
e hinzufügen
Embassy Espionage: The NSA's Secret Spy Hub in Berlin
iste hinzufügen
Quantum Spying: GCHQ Used Fake LinkedIn Pages to Target Engineers
Ally and Target: US Intelligence Watches Germany Closely
rkliste hinzufügen
SPIEGEL Games
Alle Games
Wordle
Viererkette
Solitär
Sudoku
Kreuzworträtsel
Quiz des Tages
Mini-Sudoku
Wortsuche
Paarsuche
Wabenrätsel
Serviceangebote von SPIEGEL-Partnern
●
Bußgeldrechner
●
Firmenwagenrechner
●
Brutto-Netto-Rechner
●
Kurzarbeitergeld-Rechner
●
Studienfächer erklärt
●
Gehaltsvergleich
●
Versicherungen
●
Währungsrechner
●
Eurojackpot
●
GlücksSpirale
●
LOTTO 6aus49
●
Spiele
●
Streaming Guide
●
Das tägliche Quiz
●
Reisewelt
Alle Magazine des SPIEGEL
DER SPIEGEL
SPIEGEL GESCHICHTE
SPIEGEL COACHING
SPIEGEL BESTSELLER
DEIN SPIEGEL
SPIEGEL CHRONIK
SPIEGEL WISSEN
Effilee
SPIEGEL SPEZIAL
S-Magazin
SPIEGEL Gruppe
●
Abo
●
Abo kündigen
●
Shop
●
manager magazin
●
Harvard Business manager
●
11FREUNDE
●
Effilee
●
Werbung
●
Jobs
●
Branded Partnerships
●
SPIEGEL Akademie
●
SPIEGEL Ed
●
Impressum
●
Datenschutz
●
Barrierefreiheit
●
Nutzungsbedingungen
●
Teilnahmebedingungen
●
Cookies & Tracking
●
Utiq verwalten
●
Newsletter
●
Kontakt
●
Hilfe & Service
●
Text- & Nutzungsrechte
●
Facebook
●
Instagram
●
Wo Sie uns noch folgen können
{$data.initialX = event.touches[0].clientX;$data.initialY = event.touches[0].clientY;},onTouchMove: (event) => {if ($data.initialX === null || $data.initialY === null) {return;}const currentX = event.touches[0].clientX;const currentY = event.touches[0].clientY;const diffX = $data.initialX - currentX;const diffY = $data.initialY - currentY;const tolerance = 5;const yTolerance = (diffY > -Math.abs(tolerance)) && (diffY < Math.abs(tolerance))‥if (Math.abs(diffX) > Math.abs(diffY)) {$data.isOpen = !(diffX > 0 && yTolerance);}$data.initialX = null;$data.initialY = null;},}" x-subscribe.open_menu_drawer="isOpen = true;" @keyup.escape="if (!$event.defaultPrevented && isOpen) { $event.preventDefault(); isOpen = false; }" @touchstart.passive="onTouchStart($event)" @touchmove.passive="onTouchMove($event)">
●
Anmelden
●
Abonnement
●
Startseite
●
Schlagzeilen
●
Newsletter
●
Debatte
●
SPIEGEL Extra
●
Games und Quiz
●
Shop
●
SPIEGEL+
●
Magazine
●
Meinung
●
Politik
●
Bundesregierung
●
Bundestag
●
Ausland
●
USA
●
Europa
●
Nahost
●
Globale Gesellschaft
●
Asien
●
Afrika
●
Panorama
n
●
Justiz & Kriminalität
●
Leute
●
Gesellschaft
●
Bildung
●
Sport
●
Ergebnisse & Tabellen
●
Liveticker
●
Fußball
●
Bundesliga
●
Champions League
●
Formel 1
●
Formel 1 – Liveticker, Kalender, WM-Stand
●
Wintersport
●
Wirtschaft
appen
●
Börse
●
Verbraucher & Service
●
Versicherungen
●
Unternehmen & Märkte
●
Staat & Soziales
●
Brutto-Netto-Rechner
●
Wissenschaft
ufklappen
●
Klimakrise
●
Mensch
●
Natur
●
Technik
●
Weltall
●
Medizin
●
Netzwelt
n
●
Netzpolitik
●
Web
●
Gadgets
●
Games
●
Apps
●
Kultur
●
Kino
●
Musik
●
TV
●
Literatur
●
SPIEGEL-Bestseller
●
Leben
●
Reise
●
Stil
●
Gesundheit
●
Familie
●
Psychologie
●
SPIEGEL Coaching
●
Reporter
●
Daten & Visualisierungen
●
Job & Karriere
●
Start
●
Geschichte
appen
●
Zeitzeugen
●
Erster Weltkrieg
●
Zweiter Weltkrieg
●
DDR
●
Film
●
Mobilität
pen
●
Fahrberichte
●
Fahrkultur
●
SPIEGEL in English
●
DEIN SPIEGEL
●
Audio
●
Video
●
SPIEGEL-Events
●
Tests
●
Elektronik
●
Haushalt
●
Fahrrad & Zubehör
●
Küche
●
Camping
●
Garten
●
Brettspiele
●
Bestseller
●
Backstage
●
Themen
●
Vorteile mit S+
●
Marktplatz
Anzeige
z aufklappen
●
Lotto
Anzeige
en
●
Eurojackpot
●
LOTTO 6aus49
●
GlücksSpirale
●
Streaming Guide
Anzeige
aming Guide aufklappen
●
Amazon Prime Video
●
Apple TV +
●
Disney+
●
HBO Max
●
MagentaTV
●
Netflix
●
Paramount+
●
JOYN
●
WOW
●
Pluto TV
●
Kaufradar
Anzeige
aufklappen
●
Auto & Fahrrad
●
Technik & Elektronik
●
Finanzen & Versicherungen
●
Leben
●
Freizeit & Reise
●
Haus & Garten
●
Energiesysteme
●
Haushalt & Küche
●
Tarife
●
Reisewelt
Verlagsangebot
●
SPIEGEL-Heft
ufklappen
●
Heftarchiv
●
Shop
●
Alle Magazine
aufklappen
●
SPIEGEL WISSEN
●
DEIN SPIEGEL
●
SPIEGEL GESCHICHTE
●
SPIEGEL EDITION
●
SPIEGEL LESEZEICHEN
●
SPIEGEL COACHING
●
SPIEGEL TV
●
RSS-Feed
●
SPIEGEL Media
aufklappen
●
Branded Partnerships
●
Affiliate & Integrations
●
Media Products
●
SPIEGEL Ed
●
SPIEGEL Akademie
●
Services
n
●
Bußgeldrechner
●
Uni-Tools
●
Währungsrechner
●
Versicherungen
●
Nachrichtenarchiv
●
Facebook
●
Instagram
●
Wo Sie uns noch folgen können
onClipChanged())" x-if="isPlayerAttached">
isInitialized = true)" x-effect="document.documentElement.classList.toggle('audio-player-open', isOpen)" data-app-hidden data-area="audio-player">
Audio Player maximieren
Die Wiedergabe wurde unterbrochen.
playbackRate === $store.WebAudio.playbackRate);const nextIndex = (index + 1) % this.playbackRates.length;return this.playbackRates[nextIndex];}}" class="border font-bold font-sansUI h-24 px-6 rounded-oval text-xs border-sec2-dark dark:border-shade-lighter hover:border-sec2-darker dark:hover:border-shade-lightest text-sec2-dark dark:text-shade-lighter hover:text-sec2-darker dark:hover:text-shade-lightest" title="Wiedergabegeschwindigkeit ändern" @click="$publish('AUDIO_PLAYER_SET_PLAYBACK_RATE', nextPlaybackRate)" data-sara-click-el="button">
Wiedergabegeschwindigkeit ändern
or
0 ? $store.WebAudio.volume : this.lastVolume" class="md:hidden sm:hidden px-12 text-sec2-dark dark:text-shade-lighter hover:text-sec2-darker dark:hover:text-shade-lightest" :title="$store.WebAudio.volume === 0 ? 'Stummschaltung aufheben' : 'Stummschalten'" @click="$store.WebAudio.volume = $store.WebAudio.volume === 0 ? this.lastVolume : 0" data-sara-click-el="button">
Stummschalten
Stummschaltung aufheben
${type}`">
© Patrick Mariathasan / DER SPIEGEL
Anmelden oder Konto erstellen
{$browserHistory.register(this);if (window.location.hash && window.location.hash === `#${this.hash}`) {$publish('BROWSER_HISTORY_SERVICE_OPEN_LAYER', this.id);}});},initAds() {this.adContainers.forEach((container) => {container.dataset.layer = 'active';});$adBridge.createDynamicAds();},resetAds() {this.adContainers.forEach((container) => {container.dataset.layer = 'inactive';});$adBridge.removeDynamicAds();},}" x-transition:enter-start="translate-x-full" x-transition:leave-end="translate-x-full" x-show="isOpen" x-cloak data-sara-component="{"id":"66cd6fc3-0001-0002-0000-000000105372","name":"gallery","title":"Photo Gallery: NSA's TAO Unit Introduces Itself","type":"layer"}">
●
X.com
●
Facebook
●
E-Mail
●
Messenger
●
WhatsApp
●
16 Bilder
Photo Gallery: NSA's TAO Unit Introduces Itself

1 / 16
The starting slide of a presentation about the Texas Cryptologic Center where many of the agents with the NSA's Tailored Access Operations (TAO) unit are based. At the bottom left is a modified version of Intel¿s logo, reading ¿tao inside¿ instead of ¿Intel Inside.¿ The pink bars conceal the names of NSA personnel.
Foto: SPIEGEL ONLINE

2 / 16
The presentation addresses the current status and future planning for TAO facilities in Texas.
Foto: SPIEGEL ONLINE

3 / 16
The staffing situation at the TAO facility in Texas as of 2008.
Foto: SPIEGEL ONLINE

4 / 16
Operations using the OLYMPUS spyware during the 2007 and 2008 fiscal years, FOXACID spam operations, and operations with the spying programs SHARPFOCUS and PARCHDUSK. FOXACID is a system used for infecting targets' computers with spying software. Originally, spam emails were also used, but these days the NSA utilizes its far more reliable QUANTUMINSERT methods.
Foto: SPIEGEL ONLINE

5 / 16
Operations at the Requirements & Targeting unit in 2008: Operations against Mexico, Cuba, the Middle East, Colombia and Venezuela have been carried out from the Texas facility.
Foto: SPIEGEL ONLINE

6 / 16
Operation "WHITETAMALE": This particular operation, named after a kind of Mexican food, was directed against the computer networks of politicians and security agencies in Mexico.
Foto: SPIEGEL ONLINE

7 / 16
Operation WHITETAMALE: A potential "goldmine for multiple customers," referring to the diverse US agencies that stand to profit from the spying actions, including the Department of Homeland Security (DHS). Among the intelligence of interests to the "customers," according to this slide, are "drug trafficking, people smuggling and border security issues."
Foto: SPIEGEL ONLINE

8 / 16
"Enabling Strategy": In order to achieve its self-stated goals, TAO in this instance targets "System Administrators & Telecommunication Engineers".
Foto: SPIEGEL ONLINE

9 / 16
The fruits of spying: A digital dragnet in Mexico yielded network diagrams providing information about the computer networks of Mexican government agencies.
Foto: SPIEGEL ONLINE

10 / 16
Using information exploited by TAO workers, the unit was able to produce network diagrams showing computer descriptions, IP addresses and names of people (which have been pixilated here).
Foto: SPIEGEL ONLINE

11 / 16
The goals of Operation WHITETAMALE: "Identify human targets of interest," "direct exploitation of WHITETAMALE" computers, "identify network targets of interest to get to these human targets," "access the network to exploit and collect traffic."
Foto: SPIEGEL ONLINE

12 / 16
The personnel plan for TAO's Texas branch: The unit plans to grow from 57 employees to 270 within seven years.
Foto: SPIEGEL ONLINE

13 / 16
TAO's offices: Plentiful space for NSA server racks.
Foto: SPIEGEL ONLINE

14 / 16
A TAO facility with the codename "Baconridge" in San Antonio: 270 employees, 210 workstations and room for 200 server racks.
Foto: SPIEGEL ONLINE

15 / 16
Plans for the future: "Coop," "Development" -- DNT stands for Digital Network Technologies and ANT likely stands for Advanced Network Technologies or Access Network Technologies. CNA stands for Computer Network Access; CNE for Computer Network Exploitation.
Foto: SPIEGEL ONLINE

16 / 16
The end of the presentation: Any questions?
Foto: SPIEGEL ONLINE
Helfen Sie uns, besser zu werden
© Patrick Mariathasan / DER SPIEGEL
Haben Sie einen Fehler im Text gefunden, auf den Sie uns hinweisen wollen? Oder gibt es ein technisches Problem? Melden Sie sich gern mit Ihrem Anliegen.
Redaktionellen Fehler melden
Technisches Problem melden
Sie haben weiteres inhaltliches Feedback oder eine Frage an uns?
Zum Kontaktformular
Mehrfachnutzung erkannt
Die gleichzeitige Nutzung von SPIEGEL+-Inhalten ist auf ein Gerät beschränkt.
Sie können SPIEGEL+ auf diesem Gerät weiterlesen oder sich abmelden, um Ihr Abo auf einem anderen Gerät zu nutzen.
Dieses Gerät abmelden
Sie möchten SPIEGEL+ auf mehreren Geräten zeitgleich nutzen?
Zu unseren Angeboten
__proto_headline__
__proto_description__
__proto_headline__
__proto_description__