Close Protection Domain
Welcome to Close Protection Domain,

Please Log In or Register.
Security is our main priority and you will not be able to view posts or navigate on CPD until you register or Log In.

Join the forum, it's quick and easy

Close Protection Domain
Welcome to Close Protection Domain,

Please Log In or Register.
Security is our main priority and you will not be able to view posts or navigate on CPD until you register or Log In.
Close Protection Domain
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Apple denies any knowledge of NSA's iPhone surveillance implant

Go down

Apple denies any knowledge of NSA's iPhone surveillance implant Empty Apple denies any knowledge of NSA's iPhone surveillance implant

Post by Ted-Pencry 4/1/2014, 11:54

Apple says it was unaware of an NSA software implant that could control iOS devices and denies that it worked with the NSA to make surveillance easier. In a statement to All Things D, the company said "Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products." The program in question is called DROPOUTJEEP, described in a leaked 2008 slide as a tool capable of turning on and capturing data from iOS microphones and cameras and remotely pulling files, contact lists, text messages, location data, and more.
While security researcher Jacob Appelbaum suggested that the program could only work as perfectly as the NSA claimed with help from Apple, the leaked documents describe the FBI, NSA, and CIA covertly intercepting a variety of electronic devices to install malware, not necessarily with the company's knowledge. In this case, the slide says the first version of DROPOUTJEEP would be installed via close physical access, while future versions could be installed remotely. Previous leaks, especially for the internet data collection program known as PRISM, have apparently shown that Apple and other companies allowed the NSA to pull data from their servers, although all companies have denied these claims. But installing malware on an iPhone can be done by non-NSA hackers as well, and the DROPOUTJEEP exploit was leaked alongside other modules that could supposedly let agents control any GSM phone, regardless of manufacturer.
Apple denies any knowledge of NSA's iPhone surveillance implant S3222_DROPOUTJEEP_medium
The real question is where the program has gone since this document — which was composed in the very early days of the iPhone and smartphones in general — and whether Apple and other companies can effect much meaningful change. "Whenever we hear about attempts to undermine Apple's industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them," says Apple in its statement. All signs so far, however, point to surveillance capabilities that let the NSA crack or entirely get around many security systems.
Ted-Pencry
Ted-Pencry
CPD Founder & Administrator
CPD Founder & Administrator

Posts : 1977
Join date : 2012-08-23
Location : London

https://www.linkedin.com/pub/ted-pancri/5a/170/7a4

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum