| COTTONMOUTH: A USB plug for communications intercept. | PICASSO: Software that collects mobile phone data, audio. | IRONCHEF: BIOS malware that communicates with RF implants. | CANDYGRAM: Mimics a cellphone tower. | GENIE: Multi-stage operation: jumping the airgap etc. |
| NIGHTWATCH: Portable computer used to scan VAGRANT signals. | MONKEYCALENDAR: Sends a mobile phone's location by text message. | DROPOUTJEEP: Software implant for the Apple iPhone. | GOPHERSET: Controls phone remotely via SIM card. | LOUDAUTO: Audio-based RF retro-reflector listening device. |
| CTX4000: Radar device for recovery of "off net" information. | SOMBERKNAVE: A Windows XP implant for remote control. | NSA CAPABILITIES BINGO (free square) | OCEAN: Optical Collection System for Computer Screens. | TOTEGHOSTLY: Full remote control of Window Mobile phones. |
| FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | STELLARWIND: Data mining the communications of American citizens. | ECHELON: Interception and content inspection of communications. | PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000. | MONTANA: Tools to compromise Juniper Networks routers. |
| LIFESAFER: Imaging of the Hard Drive. | JETPLOW: A firmware backdoor for Cisco firewalls. | CUSTOMS: Customs opportunities. | BLACKHEART: Collection from an FBI Implant. | RADON: Bi-directional Ethernet host tap. |