Revision as of 07:21, 31 December 2013 edit30c3Extractor (talk | contribs)2 edits ←Created page with 'RAGEMASTER<ref>http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/</ref> is a NSA...' | Latest revision as of 20:04, 23 June 2022 edit undoEmausBot (talk | contribs)Bots, Template editors2,854,116 editsm Bot: Fixing double redirect to ANT catalogTags: Redirect target changed PAWS [2.1] | ||
(27 intermediate revisions by 9 users not shown) | |||
Line 1: | Line 1: | ||
#REDIRECT ] | |||
RAGEMASTER<ref>http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/</ref> is a NSA codeword for a product that enables spies to watch what is being displayed on a monitor, by way of active components embedded in the VGA cable that respond to incoming radar signals, modulating the red channel of the video on to re-emitted RF. | |||
{{R from merge}} | |||
== Timeline == | |||
The capabilities of RAGEMASTER were detailed in a set of documents published by Der Spiegel on 2013-12-30, concurrent with Jacob Appelbaum's talk at the 30th Chaos Communications Conference. | |||
The original documents are dated 2008-07-24, and state that RAGEMASTER devices are already operational and available to USA nationals and members of the Five Eyes alliance. | |||
== References == | |||
{{reflist}} |
Latest revision as of 20:04, 23 June 2022
Redirect to:
- From a merge: This is a redirect from a page that was merged into another page. This redirect was kept in order to preserve the edit history of this page after its content was merged into the content of the target page. Please do not remove the tag that generates this text (unless the need to recreate content on this page has been demonstrated) or delete this page.
- For redirects with substantive page histories that did not result from page merges use {{R with history}} instead.