Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Edward Snowden, the infamous former contractor for the National Security Agency who leaked thousands of pages of previously classified NSA intelligence documents, reportedly thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather details about the user.

"Edward never utilizes an iPhone he's got a very simple telephone," said the lawyer of Snowden, Anatoly Kucherena, in an interview with the Russian media business RIA Novosti.
"The iPhone has a special application that can activate itself without the need of the owner obtaining to press a button and gather facts about him that is why on security grounds he refused to have this telephone," Kucherena added.

It is not clear if the "special software program" getting referred to in the interview is created up of common diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have discovered a way to compromise the mobile operating system developed by Apple.

Apple was amongst the very first organizations accused of participating in the PRISM data-mining project of the NSA, following the release by Snowden of the agency's classified documents. The project reportedly involved extracting video, audio, pictures, documents, emails and connection logs from devices, permitting analysts to track the movement of the device's user and the communications that they are getting or sending out. At the time the accusations were quickly denied by Apple, stating that the organization is not involved in the PRISM project and that it does not grant government agencies direct access to any Apple's servers.

Succeeding leaks showed that the NSA developed spyware that would target iPhones, allowing intelligence agencies to access messages, live microphone feeds, data contained in the devices and location information.

Apple stated that the firm has under no circumstances been involved with the NSA in the creation of backdoor software for any of the company's items. In addition, Apple mentioned that it is not conscious of any alleged programs by the NSA to target the company's merchandise such as the iPhone, as the firm values the security and privacy of its users.

Union Gazette

 

 

« Industrial Internet of Things: Big Opportunities and Challenges
Kaspersky Lab Presents a Forecast for 2045 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.