The CIA Has Been Hacking Your iPhone

The Central Intelligence Agency has secretly attempted for years to crack the security protections on a number of Apple products, including the iPhone and iPad, according to newly revealed documents from Edward Snowden.
CIA spies have been at work for nearly a decade to thwart the encryption standards on Apple’s devices, the classified files published Tuesday by The Intercept show.
At an annual CIA conference known as “Jamboree” and dating back to 2006, contracted researchers have tried to devise strategies for how to break through the security baked into electronics built by Apple, Microsoft, and other U.S. technology companies. A prime goal has been to build so-called surveillance backdoors that would allow for government snooping without the knowledge of the company.
The documents detail efforts by researchers to exploit Xcode, Apple’s popular app-developing software, so they could infect and extract private user data on devices that installed the “poisoned” version. “In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer—potentially millions of people,” The Intercept reported.
Additionally, the Snowden documents suggest that a compromised Xcode could be manipulated to create a “remote backdoor” allowing covert access to the contents of an Apple product. The hijacked software could also be used to impersonate targeted app developers, route any iPhone or iPad iOS application data through a government “listening post,” and disable key security protections.
It is not clear from the Snowden documents how successful these efforts to break Apple’s encryption protocols have been.
The revelations come amid a public push by senior government officials to convince tech companies not to deploy “unbreakable” encryption technologies. President Obama, Attorney General Eric Holder, FBI Director James Comey, and others have warned in recent months that efforts by Apple and Google to create too-tough-to-crack encryption protocols on their mobile devices could stifle law-enforcement investigations and jeopardize national security.
But while other intelligence agencies have been vocal about their encryption concerns, the CIA has remained largely silent on the matter. Last week, CIA Director John Brennan ordered a sweeping reorganization of his agency, a shift that includes a major refocus on digital spying. Brennan has defended the change as vital for the CIA to continue fulfilling its mission, although some have expressed concern the spy agency may be neglecting its more traditional intelligence-gathering capabilities.
The new revelations come just a day after Apple regaled technophiles in Silicon Valley with a “special event” in which CEO Tim Cook demoed the new Apple Watch. The forthcoming Internet-connected wearable has drawn some intrigue from lawmakers and regulators in Washington over its use and storage of personal data, such as health biometrics.
Privacy groups and number of lawmakers, such as Democrat Sen. Ron Wyden, have warned that forcing U.S. tech companies to build backdoors into their products does untold economic damage to Silicon Valley and gives overseas competitors an easy attack line. Such vulnerabilities, they contend, also jeopardizes national security by giving countries like China and Russia an easier way to conduct cyberattacks and access U.S. data.
“I’m a strong believer in strong encryption,” Obama said during an interview with Re/code last month during a White House-led summit held at Stanford University. “But I am sympathetic to law enforcement because I know the kind of pressure they’re under to keep us safe. And it’s not as black-and-white as it’s sometimes portrayed.”
Cook, who has pushed back strongly on government attempts to undermine encryption, spoke earlier at that same conference. In a brief speech, he laid out a forceful defense for digital privacy, likening it to a human right that can “make the difference between life and death.”  Defenseone  http://ow.ly/KfH1D

 

« Some Email Truths for Hillary Clinton
Snowden: New Zealand Spying on Pacific Islands »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.