Counterpoint of sorts from Matt Blaze: http://www.theguardian.com/commentisfree/2014/jan/06/nsa-tailored-access-operations-privacy
The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.
I don’t understand, one group in the NSA charges another group? They’re selling exploits to each other?
I doubt they produce them in-house; that’s probably vendor cost. I’d bet it’s similar to the GSA catalog in that regard.
Yes, what you said. Most of these devices are made by government contractors. Like other agencies and departments in the government, the NSA can put out a RFQ on a certain task and contractors will bid on that work.
Nothrop, Lockheed, Raytheon, etc. all have electronic warfare divisions. They usually hide under names like “Signal Technology”
The number of companies that do this type of contracting work is pretty large. Remember the attack on HBGary Federal? One of the things that came from it was HBGary selling zero-day exploits to the government.
Also, a shout out to Palantir’s Custom Solutions is also probably in order here just for fun.
Palantir only has two products–one is for analyzing timeseries data (finance) and the other is for analyzing graph data (government). They don’t have a core competency in electronic warfare.
Well, you’re reading an article sprinkled with weasel words like “impression” and “presumably”. Der Spiegel doesn’t quite know what they have.
I bet a few items were from the GCHQ. That said, large entities do internal line of business cross charging, so the prices may very well be them selling to each other.