NSA can turn on your iPhone’s camera, mic without you knowing
56 replies, posted
[QUOTE]The National Security Agency (NSA) has apparently able to hack the iPhone since 2008, according to a Der Spiegel interactive report that looks at the NSA’s various tools used for spying purposes. One particularly interesting tool, codenamed “DROPOUTJEEP,” is an implant that was first used to compromise the first-generation iPhone and was able to send various data stored on the phone to the agency, including text messages, address book contacts, geolocation and voicemail. Furthermore, the software could activate the microphone of the iPhone, turn on the camera and take pictures and retrieve cell tower location.
All NSA-iPhone communications would be “covert and encrypted,” meaning that the target would likely be unaware of what’s going on. According to the document obtained by Der Spiegel, “command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.” Furthermore, the initial DROPOUTJEEP would “focus on installing the implant via close access methods” with remote installations to be “pursued for a future release.” The documents presented by the publication do not specify whether following iPhone models were similarly hacked by the agency.
However, the leaked materials show that the NSA had various other mobile-related spying “products” that worked with other smart devices:
GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset
These are only a few of the NSA’s smart spying programs that can be used to spy on targets. In similar reports, Der Spiegel mentioned a 50-page catalog of such digital tools developed by the NSA, and revealed that the NSA can intercept laptops and other products mid-shipping to install spy malware on them. Furthermore, the NSA can reportedly hack a wireless network from eight miles away.
An image of the document that reportedly describes DROPOUTJEEP follows below.[/QUOTE]
[IMG]http://boygeniusreport.files.wordpress.com/2013/12/nsa-iphone-hack-2008-document-1.jpg?w=790&h=1024[/IMG]
Article:
[url]http://bgr.com/2013/12/31/nsa-iphone-hack/[/url]
Interactive graphics/catalog:
[url]http://www.spiegel.de/international/world/a-941262.html[/url]
so they want to see me do things with my iphone that no one was meant to see. they'll see more dicks than they will see anything else.
I hope they enjoy my steady influx of dick pics.
[editline]1st January 2014[/editline]
GODDAMNIT
meh. what can't they do.
Nothing is surprising anymore.
we need to rise against this, we can end the program.
all we need to do is jack our cocks to goatse. do your part.
do it so much that all they see is goatse.
This is the same data you give to facebook and a bunch of other apps on your phones. It is probably also listed in the T&C for owning an apple product. You give access to the data to a third party then the US government is entitled to access it through the third party doctrine.
By agreeing to share this data with any third party you are agreeing to share it with the us government, you agreed to this when you got the phone.
edit: the latest update of facebook for android allowed facebook to record without you confirmation video and audio.
totes ghostly
what are with all these names they look all out of place
reminds me of madlibs
[QUOTE=ROFLBURGER;43382987]what are with all these names they look all out of place
reminds me of madlibs[/QUOTE]
welcome to secret code names 101
All this stuff we hear that the NSA can do. But imagine how much man power it would take to do it. Or even sort through if it's automated. I wonder how often any of this was or is actually used, if at all.
Outgoing and Incoming call logs, big deal. There's probably 4 copies of those on everyone excluding the NSA's. But activating a camera, taking photos, having them sent and looked at? There just isn't enough manpower for it to be as widespread as the news is making it out I don't think. If this is just Capability, well there are some smart regular people out and about sitting at train stations and shit doing the same thing, so I would hope the largest spy agency could, too
they have to get their hands on your phone first
[QUOTE=TheTalon;43383002]All this stuff we hear that the NSA can do. But imagine how much man power it would take to do it. Or even sort through if it's automated. I wonder how often any of this was or is actually used, if at all.
Outgoing and Incoming call logs, big deal. There's probably 4 copies of those on everyone excluding the NSA's. But activating a camera, taking photos, having them sent and looked at? There just isn't enough manpower for it to be as widespread as the news is making it out I don't think[/QUOTE]
They narrow people down to persons of interest and spy on them. If you sent something that sounds suspicious you might be looked at.
[editline]1st January 2014[/editline]
[QUOTE=ShazzyFreak0;43383007]they have to get their hands on your phone first[/QUOTE]
They don't need to, this catalog is 4 years outdated and 4 years ago a remote solution was in the works. Plus, since we heard about PRISM it wouldn't surprise me if they have access to them, considering that in secrecy they can force a company to give them access to their internal networks.
[QUOTE=laserguided;43383021]They narrow people down to persons of interest and spy on them. If you sent something that sounds suspicious you might be looked at.[/QUOTE]
الموت لأمريكا.
[QUOTE=SexualShark;43383053]الموت لأمريكا.[/QUOTE]
Piracy is illegal you anti semetic shit, it wouldn't surprise me if Mossad was on your ass already.
Joke's on you NSA I don't even have an iPhone so there
that's straight bizarre
[QUOTE=TheTalon;43383002]All this stuff we hear that the NSA can do. But imagine how much man power it would take to do it. Or even sort through if it's automated. I wonder how often any of this was or is actually used, if at all.
Outgoing and Incoming call logs, big deal. There's probably 4 copies of those on everyone excluding the NSA's. But activating a camera, taking photos, having them sent and looked at? There just isn't enough manpower for it to be as widespread as the news is making it out I don't think. If this is just Capability, well there are some smart regular people out and about sitting at train stations and shit doing the same thing, so I would hope the largest spy agency could, too[/QUOTE]
Facial/voice recognition software. Knowing who was with who and where and when and what they are saying is very useful, and if you have a facial recognition database, you can nicely "trace" whoever you want out of the bulk of data you get from everyone.
I never really bought into the NSA bullshit. Also it sounds like all they're doing is writing viruses.
[quote]UPDATE: Apple has provided a statement to TechCrunch where it says that it had no knowledge of the NSA’s program targeting iPhones and denies that it provided the agency with a backdoor into iOS. The company also vowed to take further steps to protect its users’ privacy.[/quote]
[QUOTE=jalb;43383118]I never really bought into the NSA bullshit. [B]Also it sounds like all they're doing is writing viruses.[/B][/QUOTE]
You never really bought into it because you're uninformed of what they're actually doing.
I know how the terrorists can circumvent tech surveillance!
Go to meetings, write messages on paper, burn them afterwards. And leave your phones at home.
Bam, nobody ever knows.
And yet people looked at me like I was a paranoid nut when I started covering all the cameras in my phones with little bits of sticky paper when they started appearing years ago (and now with tablets).
Meet "Hindupad" :)
[IMG][URL]http://imgur.com/wgXntYq[/URL][/IMG]
EDIT: of course the bastards can still spy on my mic I suppose.
[QUOTE=laserguided;43383136]You never really bought into it because you're uninformed of what they're actually doing.[/QUOTE]
Maybe you have to spell it out for me. They are exploiting the software to put something unauthorized on someone else's machine.
I don't get the paranoia. I feel sorry for anyone tapping into my phone, all they'd hear is a keyboard clacking all day.
[QUOTE=jalb;43383269]Maybe you have to spell it out for me. They are exploiting the software to put something unauthorized on someone else's machine.
I don't get the paranoia. I feel sorry for anyone tapping into my phone, all they'd hear is a keyboard clacking all day.[/QUOTE]
"all they're doing is writing viruses"
Have you heard of PRISM? Maybe you don't care about your rights as an American citizen, apathy is a big thing there.
[QUOTE=kuydna;43383203]And yet people looked at me like I was a paranoid nut when I started covering all the cameras in my phones with little bits of sticky paper when they started appearing years ago (and now with tablets).
Meet "Hindupad" :)
[IMG][URL]http://imgur.com/wgXntYq[/URL][/IMG]
EDIT: of course the bastards can still spy on my mic I suppose.[/QUOTE]
See, I think there's a hell of a lot wrong with the NSA having the ability to do this without direct orders from a judge, but it really [I]is[/I] paranoia to cover up your own. I'm not trying to pull the "I have nothing to hide" argument, but the chances that the NSA is actively spending time and money spying on you (unless you're a political blogger or something) is next to nothing.
It's a shit situation and it needs to be stopped, but I'm really not worried that the NSA is going to tap in on my laptop webcam and watch me write about video games and hip-hop and religious philosophy online while I'm sitting shirtless in a bathtub. For most people, there's no [I]individual[/I] reason to worry about it, but it's a huge cultural/political problem.
Basically, it's paranoia to think that they're actively watching YOU as an individual (unless you're remotely notorious), but it's absolutely not paranoia to think that they are watching PEOPLE without warrants and without proper due process of law. In all likelihood they don't care about 99% of Facepunchers.
[QUOTE=laserguided;43383308]"all they're doing is writing viruses"[/QUOTE]
Sorry, I was just referring to the article, and this specific program. It's nice to know some companies aren't just giving in, and I doubt anyone could access my phone's data without first breaching it using some exploit.
This is exactly why end users should be pushing manufucturers to adopt and help develop opensource alternatives whenever possible.
[QUOTE=TheTalon;43383002]All this stuff we hear that the NSA can do. But imagine how much man power it would take to do it. Or even sort through if it's automated. I wonder how often any of this was or is actually used, if at all.[/QUOTE]
This is basically what I said in the other thread. These articles are describing techniques used on specific individuals, then wording it like it's something that could happen to anybody and everybody.
Just imagine if all articles involving the capabilities intelligence agencies were written this way.
'FBI Can Listen To All Your Phone Calls Without You Knowing'
'FBI Can Track Your Car Without You Knowing'
'CIA Can Bug Your House and Watch You With a Camera Without You Knowing'
'CIA Can Assassinate Your Entire Family With a Team of Navy SEALS in the Night, Then Kill Everyone Coming to Your Funeral With a Hellfire Missile'
Nobody should be surprised that spy agencies can exploit technology, that's their job. The question is whether or not they're directing that power in ways they shouldn't, and while there's a fair bit of that going on (PRISM, obviously) not every single capability is being used against the American public. Articles like this are primarily of interest to foreign governments and intelligence agencies, who can either develop countermeasures or more likely copy the techniques.
[QUOTE=jalb;43383269]Maybe you have to spell it out for me. They are exploiting the software to put something unauthorized on someone else's machine.
I don't get the paranoia. I feel sorry for anyone tapping into my phone, all they'd hear is a keyboard clacking all day.[/QUOTE]
The authorization for apple to access this will be in their T&C. Because of this the US government also have authorization.
I still use my ipod touch 2g, they're gonna have a hard time seeing through that ambient light sensor.
[QUOTE=JohnnyOnFlame;43383345]This is exactly why end users should be pushing manufucturers to adopt and help develop opensource alternatives whenever possible.[/QUOTE]
Agreed.
But it is easier for apple to maintain their brand image and charge more if they use proprietary.
Also the vast majority of the population don't understand, if they did understand the majority of those probably wouldn't care.
Sorry, you need to Log In to post a reply to this thread.