Dozens of mobile phone surveillance devices, including equipment never revealed publicly, have been revealed in a secret, internal government catalogue obtained by the Intercept. The authenticity of the document has not yet been confirmed.

CBR rounds up some of the items on the list.

1. Stingray I/II

Listed on the catalogue at $134,952.00, the Stingray is already well-known and was reported by Sky News to be in use by the London Metropolitan Police.

The device is a cell-site simulator, which mimicks the towers of telecoms companies with a range of up to 200 metres. It tricks the mobile phone into connecting with the Stingray terminal instead, providing information about the owner’s location to the tower.

It can drain phone batteries in the vicinity and block phone calls.

2. CYBERHAWK

This device is able to gather a large range of data from 79 different makes of phones. The data it gathers includes saved and dialled numbers, SMS messages, pictures, calendar entries, and sound files.

It works with GSM handsets only and takes between 4 and 10 minutes to download information from the phones.

3. Blackfin II

Costing $75,000, Blackfin can be worn on the body and provides a mobile controller for discrete control and configuration via Bluetooth.

The device can listen in on calls or read text messages. It also allows the user to kick nearby phones off the network, with the ability to choose between blocking one phone or all within the vicinity.

4. Thoracic

This device costs $7,500 and weighs in at 2 pounds, making it suitable to be worn on the body by agents in the field.

By passively listening in on radio frequencies in common cellular communications bands, the device is able to locate a mobile phone.

5. Cellbrite

This device costs $9,920.00 with additional $900 per year service support and maintenance costs. It is battery operated and required no PC or phone drivers.

The portable, handheld device can extract all data from a seized phone in 1 to 3 minutes. This includes the phonebook, pictures, video, text messages, call logs, ESN/IMEI, and MSISDN information.