Statements (88)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:library
manual |
gptkbp:author |
gptkb:National_Security_Agency
|
gptkbp:contains |
hardware backdoors
network exploitation tools software backdoors |
gptkbp:countryOfOrigin |
gptkb:United_States
|
gptkbp:dateLeaked |
2013
|
https://www.w3.org/2000/01/rdf-schema#label |
NSA ANT catalog
|
gptkbp:impact |
gptkb:international_relations
policy changes increased encryption adoption public awareness of surveillance debate on privacy increased scrutiny of intelligence agencies increased cybersecurity measures software security research awareness of supply chain attacks hardware security research technology supply chain concerns vendor security responses |
gptkbp:language |
English
|
gptkbp:leakedBy |
gptkb:Der_Spiegel
gptkb:Jacob_Appelbaum |
gptkbp:mediaCoverage |
gptkb:The_Guardian
gptkb:Wired gptkb:Der_Spiegel gptkb:The_Intercept |
gptkbp:notableTool |
gptkb:TURBULENCE
gptkb:DEITYBOUNCE gptkb:FIREWALK gptkb:GINSU gptkb:IRATEMONK gptkb:JETPLOW gptkb:TURBINE gptkb:TURMOIL gptkb:VALIDATOR COTTONMOUTH SOMBERKNAVE SURLYSPAWN FEEDTROUGH GOPHERSET NIGHTSTAND RAGEMASTER SLICKERVICAR SOUFFLETROUGH |
gptkbp:publicationDate |
2008
|
gptkbp:purpose |
cybercrime
surveillance network infiltration |
gptkbp:relatedTo |
gptkb:NSA
gptkb:Edward_Snowden gptkb:Tailored_Access_Operations |
gptkbp:subject |
Surveillance
computer network exploitation hardware implants software implants |
gptkbp:target |
gptkb:Linux_systems
gptkb:network_protocol gptkb:print gptkb:Sun_Microsystems_servers gptkb:Apple_devices firewalls industrial equipment routers keyboards satellite communications computers mobile devices servers monitors network devices critical infrastructure hard drives wireless devices Windows systems network cables USB devices Huawei devices HP servers Cisco devices Dell servers Juniper devices Maxtor hard drives Seagate hard drives Western Digital hard drives |
gptkbp:bfsParent |
gptkb:Equation_Group
|
gptkbp:bfsLayer |
7
|