NSA

Once called a conspiracy theory, NSA remote bugging of your iPhone is now confirmed

Thursday, January 09, 2014 by: J. D. Heyes
Tags: NSA, iPhones, remote bugging

eTrust Pro Certified

Most Viewed Articles
Popular on Facebook
BACK INTO THE CLOSET: Why U.S. reporters are not allowed to write about rainbow events in nations where being gay is still condemned
Depopulation test run? 75% of children who received vaccines in Mexican town now dead or hospitalized
A family destroyed: Six-month-old dies after clinic injects baby with 13 vaccines at once without mother's informed consent
Biologist explains how marijuana causes tumor cells to commit suicide
INVESTIGATION: Three days before Dr. Bradstreet was found dead in a river, U.S. govt. agents raided his research facility to seize a breakthrough cancer treatment called GcMAF
BOMBSHELL: China and America already at war: Tianjin explosion carried out by Pentagon space weapon in retaliation for Yuan currency devaluation... Military helicopters now patrolling Beijing
Companies begin planting microchips under employees' skin
BAM! Chipotle goes 100% non-GMO; flatly rejecting the biotech industry and its toxic food ingredients
ECONOMIC SLAVERY FOR ALL: While we were distracted with the Confederate flag flap, Congress quietly forfeited our entire economic future via fast-track trade authority
NJ cops bust teenagers shoveling snow without a permit
McDonald's in global profit free fall as people everywhere increasingly reject chemically-altered toxic fast food
March Against Monsanto explodes globally... World citizens stage massive protests across 38 countries, 428 cities... mainstream media pretends it never happened
Italian court rules mercury and aluminum in vaccines cause autism: US media continues total blackout of medical truth
SCOTUS same-sex marriage decision may have just legalized the concealed carry of loaded firearms across all 50 states, nullifying gun laws everywhere
Orthorexia Nervosa - New mental disorder aimed at people who insist on eating a clean diet
Vicious attack on Dr. Oz actually waged by biotech mafia; plot to destroy Oz launched after episode on glyphosate toxicity went viral
Nearly every mass shooting in the last 20 years shares one surprising thing? and it's not guns
Holistic cancer treatment pioneer Dr. Nicholas Gonzalez dies suddenly; patients mourn the loss of a compassionate, innovative doctor who helped thousands heal from cancer
Delicious
(NaturalNews) It has been said that one person's conspiracy theory is another's truth, depending on your interpretation of reality. Well, thanks to the rapid advances in technology - and a post-constitutional federal government, things that were once widely thought to be beyond the scope of reason are no longer so.

Take, for instance, recent reports that a special unit of the National Security Agency, called the Tailored Access Operations unit, has "burrowed into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell," Germany's Der Spiegel has reported.

But that's not all. As the magazine has further reported, the NSA is also capable of hacking your iPhone and other communication devices.

'Dropout Jeep'

The way in which the NSA accomplishes this little spy technique is through software called "Dropout Jeep," which the agency describes thusly: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."

The manner in which the NSA gets to "own" your iPhone is described in a chart republished by ZeroHedge here.

Jason Applebaum, who spoke of these new revelations recently at the 30th Chaos Communications Congress, also made some ominous observations about the NSA capabilities:

Do you think Apple helped them build that? I don't know. I hope Apple will clarify that. Here's the problem: I don't really believe that Apple didn't help them, I can't really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I'd like to believe that since Apple didn't join the PRISM program until after Steve Jobs died, that maybe it's just that they write s--tty software. We know that's true.

As to the NSA's special TAO unit, Spiegel describes how it can penetrate "erected" walls, using the NSA's ANT division's 50-page catalog of "backdoor penetration" techniques:

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.


What about a company built on privacy?

And, of course, as taxpayers, you are funding this constant constitutional usurpation of your privacy. Worse, it appears that some American companies might actually be involved as well.

The damage that has been done already is irreversible, but as ZeroHedge suggests, perhaps there is a company - maybe Blackberry, which has been "left for dead" - which could re-capture the market by touting absolute privacy:

How ironic would it be if Blackberry, left for dead by virtually everyone, began marketing its products as the only smartphone that does not allow the NSA access to one's data (and did so accordingly). Since pretty much everything else it has tried has failed, we don't see the downside to this hail mary attempt to strike back at Big Brother and maybe make some money, by doing the right thing for once.

It's a nice thought. We'll see how it plays out. In the meantime, be careful what you say and who you talk to, especially online.

Sources:

http://www.spiegel.de

http://www.zerohedge.com

http://youtube.com

Follow real-time breaking news headlines on
NSA at FETCH.news
Join over four million monthly readers. Your privacy is protected. Unsubscribe at any time.
comments powered by Disqus
Take Action: Support NaturalNews.com by linking back to this article from your website

Permalink to this article:

Embed article link: (copy HTML code below):

Reprinting this article:
Non-commercial use OK, cite NaturalNews.com with clickable link.

Follow Natural News on Facebook, Twitter, Google Plus, and Pinterest

Colloidal Silver

Advertise with NaturalNews...

Support NaturalNews Sponsors:

Advertise with NaturalNews...

GET SHOW DETAILS
+ a FREE GIFT

Sign up for the FREE Natural News Email Newsletter

Receive breaking news on GMOs, vaccines, fluoride, radiation protection, natural cures, food safety alerts and interviews with the world's top experts on natural health and more.

Join over 7 million monthly readers of NaturalNews.com, the internet's No. 1 natural health news site. (Source: Alexa.com)

Your email address *

Please enter the code you see above*

No Thanks

Already have it and love it!

Natural News supports and helps fund these organizations:

* Required. Once you click submit, we will send you an email asking you to confirm your free registration. Your privacy is assured and your information is kept confidential. You may unsubscribe at anytime.