I got this far into the bread and thought, ok yeah this is easy. After this amount of time there should be some tools developed to find some of the more obvious ones. But no, nothing jumped out. So I think it's a much more complicated situation than just hunting down something on your filesystem. A lot of their techniques involve exploiting hardware, or exploits in operating systems that they have known about for a long time (put there?).
So the whole thing is comped, anon. I don't think there's a piece of hardware that you can be sure doesn't have some exploit built in to it.
Instead I got in to a dig on Joseph Adam Schulte (not pic related, as the first search result for his name didn't come up the first time, then it came back at first result the next time I searched… )
https://www.findagrave.com/memorial/166105799/joseph-adam-schulte
http://archive.is/76nnu
http://archive.is/ZTy5z
I'm sure it was dug at the time, so won't go in to it, but this is a good time line:
https://www.courtlistener.com/docket/6359557/united-states-v-schulte/
http://archive.is/kZSc7
And it is still ongoing. Something spoopy about the whole thing, but it's about federal clandestine surveillance, the C_A and SDNY so I guess that goes with the territory, kek.