Apple denies any knowledge of NSA's iPhone surveillance implant
Page 1 of 1
Apple denies any knowledge of NSA's iPhone surveillance implant
Apple says it was unaware of an NSA software implant that could control iOS devices and denies that it worked with the NSA to make surveillance easier. In a statement to All Things D, the company said "Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products." The program in question is called DROPOUTJEEP, described in a leaked 2008 slide as a tool capable of turning on and capturing data from iOS microphones and cameras and remotely pulling files, contact lists, text messages, location data, and more.
While security researcher Jacob Appelbaum suggested that the program could only work as perfectly as the NSA claimed with help from Apple, the leaked documents describe the FBI, NSA, and CIA covertly intercepting a variety of electronic devices to install malware, not necessarily with the company's knowledge. In this case, the slide says the first version of DROPOUTJEEP would be installed via close physical access, while future versions could be installed remotely. Previous leaks, especially for the internet data collection program known as PRISM, have apparently shown that Apple and other companies allowed the NSA to pull data from their servers, although all companies have denied these claims. But installing malware on an iPhone can be done by non-NSA hackers as well, and the DROPOUTJEEP exploit was leaked alongside other modules that could supposedly let agents control any GSM phone, regardless of manufacturer.
The real question is where the program has gone since this document — which was composed in the very early days of the iPhone and smartphones in general — and whether Apple and other companies can effect much meaningful change. "Whenever we hear about attempts to undermine Apple's industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them," says Apple in its statement. All signs so far, however, point to surveillance capabilities that let the NSA crack or entirely get around many security systems.
While security researcher Jacob Appelbaum suggested that the program could only work as perfectly as the NSA claimed with help from Apple, the leaked documents describe the FBI, NSA, and CIA covertly intercepting a variety of electronic devices to install malware, not necessarily with the company's knowledge. In this case, the slide says the first version of DROPOUTJEEP would be installed via close physical access, while future versions could be installed remotely. Previous leaks, especially for the internet data collection program known as PRISM, have apparently shown that Apple and other companies allowed the NSA to pull data from their servers, although all companies have denied these claims. But installing malware on an iPhone can be done by non-NSA hackers as well, and the DROPOUTJEEP exploit was leaked alongside other modules that could supposedly let agents control any GSM phone, regardless of manufacturer.
The real question is where the program has gone since this document — which was composed in the very early days of the iPhone and smartphones in general — and whether Apple and other companies can effect much meaningful change. "Whenever we hear about attempts to undermine Apple's industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them," says Apple in its statement. All signs so far, however, point to surveillance capabilities that let the NSA crack or entirely get around many security systems.
Similar topics
» Kremlin accuses U.S. security firm sending 'private army' to Ukraine
» iPhone Evidence Cam app
» Gotek Prime iPhone app
» Update your iPad & iphone!
» Best Iphone APPS for Security Work
» iPhone Evidence Cam app
» Gotek Prime iPhone app
» Update your iPad & iphone!
» Best Iphone APPS for Security Work
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
29/5/2017, 15:47 by Phil_Reed
» OSINT's books
7/3/2017, 18:15 by tibah
» Hire Bodyguard in London
1/3/2017, 16:51 by UK security
» Contact for work
19/2/2017, 00:55 by Hawk
» Updated CV
4/2/2017, 13:06 by Richard.Adams
» Introduction
26/1/2017, 10:25 by ThomasGLR
» Intersec 2017
24/1/2017, 05:43 by Hawk
» HLR/D-HLR Instructor Sweden
23/1/2017, 21:52 by Hawk
» CP SIA, MIRA Quaified
23/1/2017, 21:41 by Hawk