Page 1 of 2 12 LastLast
Results 1 to 20 of 28

Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.


Thread: Leaked Documents Reveal the NSA has Worked on iPhone Spyware to Monitor Its Users

  1. #1
    What's Jailbreak? Akshay Masand's Avatar
    Join Date
    Sep 2011
    Location
    New York City
    Posts
    5,897
    Thanks
    3
    Thanked 200 Times in 179 Posts

    Default Leaked Documents Reveal the NSA has Worked on iPhone Spyware to Monitor Its Users


    Recently revealed documents show the US National Security Agency has the capability of deploying software implants on Apple’s iPhone that grants remote access to on-board assets like SMS messages, location data and microphone audio. Security researcher Jacob Applebaum summarized the NSA’s iPhone-targeting spyware program called “DROPOUTJEEP” as part of a broader discussion dealing with the agency’s controversial electronic surveillance initiative.

    Regarding Apple’s iPhone, the findings, concurrently published by German magazine Der Spiegel, are limited to a single top secret document dating back to 2008. The page details DROPOUTJEEP’s basic operational structure and capabilities, which include the interception of SMS messages, access to on-board data, microphone activation, and approximate positioning via cell tower location. All communication takes place covertly over SMS or GPRS data protocols.

    Proliferation within the iPhone community is largely unknown while being a startling revolution. Furthermore, the NSA boasts a 100% success rate for implanting the spyware on iOS devices but the document suggests physical contact with a target phone is required to implant the software. In practice, the method is likely similar to a consumer jailbreak looking for root device access according to him. To this point, Applebaum alludes to complicit involvement by Apple but states that he “can’t really prove it.” He had the following to say regarding the matter:

    I don't really believe that Apple didn't help them," Appelbaum said. "I can't really prove it yet, but [the NSA] literally claim that anytime they target an iOS device, that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I'd like to believe that since Apple didn't join the PRISM program until after Steve Jobs died, that maybe it's just that they write [expletive redacted] software. We know that's true.
    According to Der Spiegel, specialized NSA Tailored Access Operations (TAO) teams intercept incoming device shipments, carefully open packages and install spyware before sending the bugged units along to end users. A more efficient delivery mechanism is remote installation, which is something the NSA said was being “pursued for future release.” Once again, it’s unknown if the agency moved forward with such a system in the intervening five years since the document was first issued.

    Those of you interested in hearing Applebaum’s talk regarding the iPhone discussion should watch the video below:



    Source: Daily Dot, Der Spiegel
    Last edited by Akshay Masand; 2013-12-31 at 06:42 AM.

    Twitter: @AkshayMasand

  2. #2
    Super Moderator Zokunei's Avatar
    Join Date
    Jun 2010
    Location
    Michigan
    Posts
    7,526
    Thanks
    690
    Thanked 945 Times in 709 Posts

    Wow.

  3. #3
    F*** the NSA. They are pigs who have overstepped their lines numerous times before and continue to do so. The NSA need to be **** down until someone actually fixes the BS that they have created.

  4. #4
    Quote Originally Posted by PokemonDesigner View Post
    F*** the NSA. They are pigs who have overstepped their lines numerous times before and continue to do so. The NSA need to be **** down until someone actually fixes the BS that they have created.
    Don't worry. Don't worry. It only installs on JB devices.

    :-)

  5. The Following User Says Thank You to kosher1 For This Useful Post:

    UtSulumSuusOwn (2014-01-04)

  6. #5
    Is there a jailbreak tweak to block them completely?
    Sent from my iPhone 4.

  7. The Following 2 Users Say Thank You to jose060789 For This Useful Post:

    Airwaves182 (2013-12-31), se23 (2013-12-31)

  8. #6
    Quote Originally Posted by PokemonDesigner View Post
    F*** the NSA. They are pigs who have overstepped their lines numerous times before and continue to do so. The NSA need to be **** down until someone actually fixes the BS that they have created.
    Yes, but they do this legally now because of the renewal of the patriot act, that clearly violates the constitution.

    Check out WW3 for iOS 9/10 - Widget-Weather 3.0

  9. #7
    Quote Originally Posted by PokemonDesigner View Post
    F*** the NSA. They are pigs who have overstepped their lines numerous times before and continue to do so. The NSA need to be **** down until someone actually fixes the BS that they have created.
    do you have any idea why they been doing this? maybe to prevent something like 9/11? So think again before talking.
    Last edited by nesamone; 2013-12-31 at 02:01 PM.

  10. #8
    iPhone? More like MyPhone WithinTemptationFan's Avatar
    Join Date
    Nov 2012
    Location
    "Anywhere But Home"...
    Posts
    169
    Thanks
    23
    Thanked 36 Times in 20 Posts

    If people truly think they have privacy in this country, then they're being really ignorant. No one has any privacy anymore after the 9/11 incident.

  11. #9
    Is that only in the states or they do that everywhere?

  12. #10
    Quote Originally Posted by WithinTemptationFan View Post
    If people truly think they have privacy in this country, then they're being really ignorant. No one has any privacy anymore after the 9/11 incident.
    Exactly... Which in the end, is a catch 22

  13. #11
    My iPhone is a Part of Me se23's Avatar
    Join Date
    Oct 2007
    Location
    London uk
    Posts
    889
    Thanks
    92
    Thanked 73 Times in 59 Posts

    Quote Originally Posted by jose060789 View Post
    Is there a jailbreak tweak to block them completely?
    I'd like to know this too.

  14. #12
    Quote Originally Posted by nesamone View Post
    do you have any idea why they been doing this? maybe to prevent something like 9/11? So think again before talking.
    I am so ******* tired of people using 9/11 as an excuse to give up privacy. Wake the **** up and stop being so stupid and ignorant. The government simply wants to control the population more and more. It's an invasion of privacy! Stop bending over for the government!

  15. The Following 2 Users Say Thank You to hogcia For This Useful Post:

    Faresismail (2013-12-31), se23 (2013-12-31)

  16. #13
    Quote Originally Posted by se23 View Post
    I'd like to know this too.
    Well there is a tweak called "untrackerd"(yes, that's how it's spelled) which adds a daemon to delete a hidden file that keeps track of your location and sends it to apple. But i dont think there is a tweak for this kind of thing

  17. The Following User Says Thank You to xWalmartCandyx For This Useful Post:

    se23 (2013-12-31)

  18. #14
    I'm addicted to jailbreak luvmytj's Avatar
    Join Date
    Jul 2008
    Location
    New York
    Posts
    843
    Thanks
    32
    Thanked 112 Times in 83 Posts

    Quote Originally Posted by nesamone View Post
    do you have any idea why they been doing this? maybe to prevent something like 9/11? So think again before talking.
    Think this will make you safer? Think again. I don't know about you but I don't feel the government needs to know everything about everybody. Are there some people the government should keep tabs on? Sure, but let them demonstrate a need to gain access to the info, not just tap everyone all the time.
    F'it. Lets all go get tracking/recording chips installed in our forearms and be done with it.

  19. The Following 2 Users Say Thank You to luvmytj For This Useful Post:

    Faresismail (2013-12-31), se23 (2013-12-31)

  20. #15
    iPhone? More like MyPhone BrainSmashR's Avatar
    Join Date
    Oct 2012
    Location
    Natchitoches, LA.
    Posts
    222
    Thanks
    36
    Thanked 51 Times in 38 Posts

    It just amazes me how many people get their panties in a bunch over this. Records of triangulation date back to the 6th Century BC, considerably older than the cell phone itself. What that means for you is that if your phone is on and you are within the reach of 2 cell towers, they can find you (if you took Geometry or Trig you should know this already). In other words, you NEVER had privacy on your cell phone, and pardon my French, but you're an idiot if you think you ever did.
    Last edited by BrainSmashR; 2013-12-31 at 04:06 PM.

  21. #16
    Master Theme Creator (aka Bluemetal) Blue's Avatar
    Join Date
    Dec 2008
    Location
    Germany
    Posts
    7,146
    Thanks
    3,488
    Thanked 14,284 Times in 3,850 Posts

    Default No, i have no idea
    Quote Originally Posted by nesamone View Post
    do you have any idea why they been doing this? maybe to prevent something like 9/11? So think again before talking.
    It's a thin line between a paranoid out of control democracy and a dictatorship. 9/11 NOT EXCUSES EVERYTHING FOREVER.

    This is what the USA are currently doing: spying the whole planet, torturing, kidnapping, illegal jails, killing without a trial, secrets courts...

    How would you call this ??? A democracy ?

    This is not a statement against the USA, it's a statement to rethink a lot and take a look at your constitution ....

  22. The Following User Says Thank You to Blue For This Useful Post:

    se23 (2013-12-31)

  23. #17
    My iPhone is a Part of Me se23's Avatar
    Join Date
    Oct 2007
    Location
    London uk
    Posts
    889
    Thanks
    92
    Thanked 73 Times in 59 Posts

    Thank God there's still lots of people with sense

    Quote Originally Posted by BrainSmashR View Post
    It just amazes me how many people get their panties in a bunch over this. Records of triangulation date back to the 6th Century BC, considerably older than the cell phone itself. What that means for you is that if your phone is on and you are within the reach of 2 cell towers, they can find you (if you took Geometry or Trig you should know this already). In other words, you NEVER had privacy on your cell phone, and pardon my French, but you're an idiot if you think you ever did.
    The difference is that Fred flintstone didn't have his WHOLE life on his horn phone :/
    Last edited by se23; 2013-12-31 at 05:41 PM.

  24. #18
    iPhone? More like MyPhone crouching's Avatar
    Join Date
    May 2008
    Location
    Tampa, FL
    Posts
    115
    Thanks
    5
    Thanked 12 Times in 12 Posts

    NSA, the ultimate jailbreaking team since 2008! ha

  25. #19
    My iPhone is a Part of Me se23's Avatar
    Join Date
    Oct 2007
    Location
    London uk
    Posts
    889
    Thanks
    92
    Thanked 73 Times in 59 Posts

    NSA analysts refer internally to iPhone users as “zombies” who “pay for their own surveillance.”

  26. #20
    Here is the rest of the story.

    NSA reportedly intercepting laptops purchased online to install spy malware.

    WTF is next ???

    http://mobile.thever...p-usb-plant-spy

    According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.

    While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.

    This tool, among others, is available to NSA agents through what Der Spiegel describes as a mail-order spy catalog. The report indicates that the catalog offers backdoors into the hardware and software of the most prominent technology makers, including Cisco, Juniper Networks, Dell, Seagate, Western Digital, Maxtor, Samsung, and Huawei. Many of the targets are American companies. The report indicates that the NSA can even exploit error reports from Microsoft's Windows operating system; by intercepting the error reports and determining what's wrong with a target's computer, the NSA can then attack it with Trojans or other malware.

    In response to Der Spiegel's report, Cisco senior vice president John Stewart wrote that "we are deeply concerned with anything that may impact the integrity of our products or our customers' networks," and that the company does "not work with any government to weaken our products for exploitation." Other US companies have fired back against reports of NSA tampering in recent months, including Microsoft, which labeled the agency an "advanced persistent threat" over its efforts to secretly collect private user data within the internal networks of Google and Yahoo.

    SOMETIMES THE NSA HOPS ON AN FBI JET FOR HIGH-TECH RAIDS

    The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
    IPhone 5s....
    First MacBook Pro 13" I7 2.8Ghz with win7
    1 rooted Thrive
    08 Chevy 2500HD LTZ
    06 Dyna Lowrider
    40ft Raptor toyhauler

Page 1 of 2 12 LastLast
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •