| FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | DIETYBOUNCE: Dell BIOS backdoor. | SURLYSPAWN: Remote RF keystroke monitor. | HOWLERMONKEY: A radio transceiver for exploiting systems. | GOPHERSET: Controls phone remotely via SIM card. |
| CUSTOMS: Customs opportunities. | DROPOUTJEEP: Software implant for the Apple iPhone. | OCEAN: Optical Collection System for Computer Screens. | MINERALIZE: Collection from LAN Implant. | ECHELON: Interception and content inspection of communications. |
| STELLARWIND: Data mining the communications of American citizens. | RAGEMASTER: Video cable implant / remote screen viewing via RF. | NSA CAPABILITIES BINGO (free square) | DROPMIRE: Passive collection using antenna. | LIFESAFER: Imaging of the Hard Drive. |
| LOUDAUTO: Audio-based RF retro-reflector listening device. | JETPLOW: A firmware backdoor for Cisco firewalls. | SPARROW II: Detecting and mapping wireless networks via drone. | IRONCHEF: BIOS malware that communicates with RF implants. | HIGHLANDS: Collection from Implants. |
| HEADWATER: A firmware backdoor into Huawai routers. | DEWSWEEPER: USB wireless Bridge into target network. | BULLDOZER: Hidden wireless bridge for remote control. | MONKEYCALENDAR: Sends a mobile phone's location by text message. | NIGHTSTAND: Wirelessly installs exploits of Windows. |