Uncategorized

How The Government Hacks Your iPhone

MEET “DROPOUT JEEP” — THE NSA’S APPLE INFILTRATION PROGRAM It sounds like a defective sport utility vehicle, but “Dropout Jeep” is really the code name for a program used by the National Security Agency to access your iPhone. And no … the new fingerprint security feature on your iPhone 5S…

MEET “DROPOUT JEEP” — THE NSA’S APPLE INFILTRATION PROGRAM

It sounds like a defective sport utility vehicle, but “Dropout Jeep” is really the code name for a program used by the National Security Agency to access your iPhone.

And no … the new fingerprint security feature on your iPhone 5S won’t save you.

The program – revealed by presenter Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress – enables the spy agency to remotely monitor, manipulate and steal data from any Apple iPhone.

“DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality,” a slide from Applebaum’s presentation reveals. “This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

Translation?  Not only is Big Brother inside your iPhone, he can make it do his bidding.

“Do you think Apple helped them build that?” Applebaum asked during his address. “I don’t know. I hope Apple will clarify that.”

Ya think?  They better …

Our founding editor is a loyal Apple user (iMac, iPad, iPod and iPhone) … but he won’t be one if the company has been collaborating with government agencies on invading user privacy.

“Here’s the problem: I don’t really believe that Apple didn’t help them, I can’t really prove it but (the NSA) literally claim that anytime they target an iOS device that it will succeed for implantation,” Applebaum continued. “Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is.”

Either way, it is among the more frightening revelations about our government’s spy network … which recently received a stamp of approval from a federal judge.

Related posts

Uncategorized

Murdaugh Retrial Hearing: Interview With Bill Young

Will Folks
State House

Conservative South Carolina Lawmakers Lead Fight Against CRT

Mark Powell
Murdaughs

‘Murdaugh Murders’ Saga: Trial Could Last Into March

Will Folks

43 comments

9" December 30, 2013 at 2:48 pm

Duck and Cover.Build a fallout shelter.More BS propaganda.Knock yourself out,dude.

Reply
euwe max December 30, 2013 at 7:38 pm

If you’ve got something to hide – you’d better be more careful than the founding father’s were. Don’t trust anyone, only talk on the lawn when the sprinkler system is on, cover your mouth when you talk, don’t use phones, don’t use computers.

When you go somewhere, walk under a canopy of trees.

use low tech – bicycles, skateboards, skates, feet.

use paper and pen – burn it and blow the residue into the wind.

develop a code based on the text of books that only you and your partner in hiding something know, and don’t tell anyone else what the name of the books are, or what pages you’re using for the code.

wear tin foil on your head, and check your perimeter.

At night, peek through the curtains, and look for shadows moving along the curb. Just peeking sometimes messes up their rhythm.

Reply
9" December 30, 2013 at 7:57 pm

I talk to the wind.That’s it.If the good lord had wanted us talking on iphones,he would have embedded them in our butts…

http://www.youtube.com/watch?v=Ql8nTBO0apI

Reply
TheSaltMiner December 31, 2013 at 8:51 am

If you don’t have something to hide now, just wait a few more years. Look at Nazi Germany, Soviet Russia, Cuba, China, etc. One of these days they make something you do as part of your daily routine illegal for your own safety or for the safety of others, and then you’ll wish they hand’t installed spyware on your laptop.

Reply
Jackie Chiles December 30, 2013 at 2:49 pm

On the one hand, we’re to believe the government is incompetent and incapable of even paving a road. On the other, we’re to believe they’re in fact so competent, that they can process hundreds of thousands of trillions e-mails, phone messages, texts, phone conversations, in person conversations, etc., daily into come sort of coherent understanding to be a substantial violation of just normal joe blow’s constitutional rights?

Reply
SamAdams2010 December 30, 2013 at 3:19 pm

The technology exists and is capable; the end-user is regrettably, incompetent.

Reply
Jackie Chiles December 30, 2013 at 3:24 pm

Which is why it’s unlikely this will ever be anything other than another ineffective government program. I’m sure targeted surveillance works much better.

Reply
SamAdams2010 December 30, 2013 at 3:44 pm

Perhaps, but even a broken clock is right twice a day.

Reply
Smirks December 30, 2013 at 3:35 pm

It’s all about priorities, basically. Building a road is a low priority, being able to see everywhere you drive your car is a high one.

Reply
IntelIgentAPE December 31, 2013 at 11:10 pm

It depends entirely on WHICH level of government you’re talking about; local municipal government stooges do indeed have difficulties with pot holes. The Federal government – on the other end of the spectrum – have deep pockets and an even deeper need for private information on citizens under the pretension of NATIONAL SECURITY ! What a scam ,,,, the USA is more INSECURE than ever before. And those dummies in DC know it, but how could thye give up the GOLDEN GOOSE that is the NSA?!

Reply
jon December 4, 2014 at 8:41 am

I read your comment really fast, in Jackie Chile’s voice

Reply
tomstickler December 30, 2013 at 2:51 pm

I wish I was important enuf that NSA gave a shit what I had to say.

Reply
9" December 30, 2013 at 2:57 pm

You’re still able to use your phone? Last time I used mine,it blew up and I lost all hearing in my right ear…

Reply
Frank Pytel December 31, 2013 at 12:37 pm

So, you’re left handed now?

Reply
Roldan Fz December 31, 2013 at 6:11 pm

Even if you’re not, it still trickles down to you in one way or another. (no man is an island to himself) And second your privacy is your constitutional right.

Reply
jimlewisowb December 30, 2013 at 2:55 pm

“Our founding editor is a loyal Apple user (iMac, iPad, iPod and iPhone)’

OK, here is a new one to add to your list—- iFucked

Reply
ThreePalms December 30, 2013 at 3:06 pm

Before you and Mr. Applebaum get carried away with yourselves over whether or not Apple cooperated with the NSA, keep in mind what you might do in the face of a federal warrant.

Don’t be upset with those who cooperated with the federal government, be concerned about the methods used by the federal government to gain said cooperation.

Reply
TheSaltMiner December 31, 2013 at 8:54 am

We need more Ladar Levisons and Lavabits. The bottom line is more important than standing up for the people.

Reply
Smirks December 30, 2013 at 3:40 pm

Thank goodness the terrorists use prepaid junker phones and not expensive brand spanking new iPhones, otherwise the NSA might actually stop something bad from happening instead of finding out what bar some random schmoe went to last night, plus his drunk tweets and texts, his butt dials, and the frat boy uploading a picture of him passed out with crude drawings on his face to his Facebook wall.

Reply
Centrist View December 30, 2013 at 8:02 pm

Osama bin Laden used a courier.

Reply
Mike at the Beach December 31, 2013 at 2:30 am

…and eventually caught a .556 migraine (after 75% of his command staff caught the more standard “warhead on the forehead” migraines).

Reply
TheSaltMiner December 31, 2013 at 8:48 am

Exactly why this sort of surveillance is useless. “It is a universal truth that the loss of liberty at home is to be charged against provisions against danger, real or pretended from abroad.”

Reply
Here It Comes December 30, 2013 at 4:58 pm

Facebook (Zuckerfucker) is doing basically the samething. The backlash by consumers for their phones will be severe, we can see that coming.

Reply
vic December 30, 2013 at 6:08 pm

And that is where you are wrong. The American people don’t give a crap. I wish they did, but they don’t.

Reply
Torch December 30, 2013 at 6:12 pm

So once the iCrap is put together and loaded with software in China, Apple/NSA unbox them and put the spy software on them. Must use iTunes update to put the program on. Hmmm, maybe the Chinese are cooperating.

Reply
euwe max December 30, 2013 at 6:25 pm

It’s in the firmware that’s stamped onto the motherboard.

Reply
Torch December 30, 2013 at 6:30 pm

By the Chinese?

Reply
euwe max December 30, 2013 at 6:50 pm

The way it works is, the Chinese and Apple finalize the final Bill of Materials before loading the reels on the surface mount placement machine.

One of the reels contains EEPROM chips. Inside these chips is manufacturing test software, the product software, and all the secret spy software the government pays to have loaded.

Each printed circuit board goes through the SMP, and comes out the other end with the chip soldered to the motherboard, and with the software ready to run.

If there is a change in software, it is upgraded over the air without opening the case using software provided by Apple.

I would imagine that the encryption techniques that protect these “special” software packages added to the product are world-class and are integrated into the physical design in ways that insure it remains secret – even from 10-year old dweebs with access to 1-micron slicers and electron microscope-sized test points.

Reply
Torch December 30, 2013 at 7:05 pm

Thanks for the explanation.

The Colonel December 31, 2013 at 1:43 am

Holy cow Euwe – that’s the single most erudite post you’ve ever thrown up, well done sir, well done!

9" December 31, 2013 at 7:58 pm

When,The Colonel says,’erudite’,I become a little too moist.He gets my vote for sexiest FITS poster of the year…
Salute!

funnyfalcon December 31, 2013 at 1:27 am

Sorry, but all phones have something that does this. Sometimes it’s an actual application installed onto your phone and the other (100%) of the time it’s an embedded application from your carrier. Pretty lazy attempt a sensationalizing this and labeling it as more NSA intrusion.

Reply
The Colonel December 31, 2013 at 3:01 am

And yet another reason to go with the cheaper and more versatile Android operating system. To infect them all, the NSA’d have to go after 8 to 10 different companies, most of whom are not US based – I can just see the conversation between the NSA and Samsung going well “…you want us to do what!?! Go away round eye, you no welcome here!…”.

The ability to co-opt smart phones has existed for as long as we’ve had smart phones. The “smarter” they get the more vulnerable they become, particularly when you have remote operation features like diagnostic tools. The original cell phones generally had to be placed into operation before they were vulnerable but you could listen to most of them with a fairly easy to obtain scanner.

All of our SCIFs and secure areas have phone boxes outside the door. We haven’t allowed phones in since the “smart guys” figured the threat out. The Army has disabled many “smart” features like the cameras in an attempt to further prevent their abuse and misuse.

Reply
GrandTango December 31, 2013 at 6:49 am

This poster seems to be so much more informed,and relevant, than the “Founding Editor.” …And that seems to happen a lot.

Reply
Jack December 31, 2013 at 10:08 am

Naa, anyone who thinks Android phones work as well as Iphones is not that informed. And besides Android is a Google product, and we all know Google has the capability to spy on absolutely everything we do on the internet, and when push comes to shove will turn that information over to the government to protect their profits. As they did in China.

Reply
The Colonel December 31, 2013 at 10:36 am

“…anyone who thinks Android phones work as well as Iphones is not that informed. And besides Android is a Google product…” Speaking of not informed dud, er dude – check your mirror.

Android is Linux based and open source, developers tweak it anyway they want – that’s why there are multiple versions currently in use as “the latest version”. The phones OS is actually segregated from the “computer part” of the OS and is far more secure than the Apple series of OSes. The open source nature of Android makes it much more “rootable” and therefore much more closely examined by end users and much more tunable by corporations to enhance their security.

If Androids don’t work as well as Apples, why does 80% of the world use Android? Simple price and versatility. Apples are sexy and cool, and overpriced and over rated. I have and use a 5, a Casio Commando and a Crackberry. The Crackberry is provided by the gubamint and would be better known as a “crapberry”. The Apple is my normal “work phone”, sexy and nice but nothing special. My phone of choice is my three year old, hacked Commando. Water proof and indestructible out of the box.

Reply
GrandTango December 31, 2013 at 11:04 am

Thanks Colonel for the info. I was brought up on Apple products, and once swore by them. But I got tired of the snobbery and petty Bull-$#!* Apple plays on its usuers. You have to be stupid to get duped by them. And the the PC side caught up, Android included.

Apple is more of a tech-piety product now…for liberals to feel big, special and better-than-you about ..while they bash everybody else for being greedy and stingy….

You are very correct in your asessment….

Jan December 31, 2013 at 11:18 am

why does 80% of the world use Android (up from 3% just four years ago)? Simple, price and versatility.

I would say price and marketing. But price is becoming more and more irrelevant. The Iphone 5C is down to $99 with a two year contract.

I have used both. Iphones still work better for now. Additionally the number of available apps makes it no contest, unless you just want a phone and something to receive text messages. Maybe the Android market will catch up at some point, but not soon.

The Colonel December 31, 2013 at 11:36 am

Price. Hands down Android based phones are cheaper.
Marketing – Apple has some of the most iconic ads ever made.
Apps:
Android – 700,000
Apple – 775,000 (300,000 of which only work on the IPad)
The 5c has been universally panned – the reason they’re $99 is that Apple couldn’t give them away so make the price unbeatable to clear your stock – basic marketing.

Michael Anderson January 1, 2014 at 3:31 pm

Apple was more business-like. In the last year or twin they realized consumers where the main purchasers. That’s why they’re trying new things. Slightly bigger screens, colors, new looks and features are all apart of their effort to make things more consumer friendly.

Thomas December 31, 2013 at 6:11 pm

Two words: Tower Dump.

Reply
Derek Schoffstall February 24, 2014 at 10:23 pm

what….
not that I am surprised
but, what….

Reply
jon December 2, 2014 at 6:00 pm

still haven’t seen any tangible proof (schematics, program logic) that prove how this works or if it’s actually in place. anyone have any actual code or found anything in the iOS? all the articles just repeat the capabilities. anyone tried rooting and digging in to find the actual code?

Reply

Leave a Comment