NSA

Once called a conspiracy theory, NSA remote bugging of your iPhone is now confirmed

Thursday, January 09, 2014 by: J. D. Heyes
Tags: NSA, iPhones, remote bugging

eTrust Pro Certified

Most Viewed Articles
Popular on Facebook
Malaysia Airlines Flight 370 now clearly a government cover-up: All evidence contradicts official story
White House admits staging fake vaccination operation to gather DNA from the public
10 other companies that use the same Subway yoga mat chemical in their buns
High-dose vitamin C injections shown to annihilate cancer
Irrefutable proof we are all being sprayed with poison: 571 tons of toxic lead 'chemtrailed' into America's skies every year
EXCLUSIVE: Natural News tests flu vaccine for heavy metals, finds 25,000 times higher mercury level than EPA limit for water
Truvia sweetener a powerful pesticide; scientists shocked as fruit flies die in less than a week from eating GMO-derived erythritol
Senator who attacked Doctor Oz over dietary supplements received over $146,000 in campaign contributions from Big Pharma mega-retailer and Monsanto
Global warming data FAKED by government to fit climate change fictions
HOAX confirmed: Michelle Obama 'GMOs for children' campaign a parody of modern agricultural politics
U.S. treating meat with ammonia, bleach and antibiotics to kill the '24-hour sickness'
Ben and Jerry's switches to non-GMO, Fair Trade ice cream ingredients
Battle for humanity nearly lost: global food supply deliberately engineered to end life, not nourish it
Russia taking McDonald's to court, threatens countrywide shutdown
Diet soda, aspartame linked to premature deaths in women
Cannabis kicks Lyme disease to the curb
Elliot Rodger, like nearly all young killers, was taking psychiatric drugs (Xanax)
Harvard research links fluoridated water to ADHD, mental disorders
Delicious
(NaturalNews) It has been said that one person's conspiracy theory is another's truth, depending on your interpretation of reality. Well, thanks to the rapid advances in technology - and a post-constitutional federal government, things that were once widely thought to be beyond the scope of reason are no longer so.

Take, for instance, recent reports that a special unit of the National Security Agency, called the Tailored Access Operations unit, has "burrowed into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell," Germany's Der Spiegel has reported.

But that's not all. As the magazine has further reported, the NSA is also capable of hacking your iPhone and other communication devices.

'Dropout Jeep'

The way in which the NSA accomplishes this little spy technique is through software called "Dropout Jeep," which the agency describes thusly: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."

The manner in which the NSA gets to "own" your iPhone is described in a chart republished by ZeroHedge here.

Jason Applebaum, who spoke of these new revelations recently at the 30th Chaos Communications Congress, also made some ominous observations about the NSA capabilities:

Do you think Apple helped them build that? I don't know. I hope Apple will clarify that. Here's the problem: I don't really believe that Apple didn't help them, I can't really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I'd like to believe that since Apple didn't join the PRISM program until after Steve Jobs died, that maybe it's just that they write s--tty software. We know that's true.

As to the NSA's special TAO unit, Spiegel describes how it can penetrate "erected" walls, using the NSA's ANT division's 50-page catalog of "backdoor penetration" techniques:

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.


What about a company built on privacy?

And, of course, as taxpayers, you are funding this constant constitutional usurpation of your privacy. Worse, it appears that some American companies might actually be involved as well.

The damage that has been done already is irreversible, but as ZeroHedge suggests, perhaps there is a company - maybe Blackberry, which has been "left for dead" - which could re-capture the market by touting absolute privacy:

How ironic would it be if Blackberry, left for dead by virtually everyone, began marketing its products as the only smartphone that does not allow the NSA access to one's data (and did so accordingly). Since pretty much everything else it has tried has failed, we don't see the downside to this hail mary attempt to strike back at Big Brother and maybe make some money, by doing the right thing for once.

It's a nice thought. We'll see how it plays out. In the meantime, be careful what you say and who you talk to, especially online.

Sources:

http://www.spiegel.de

http://www.zerohedge.com

http://youtube.com

Join over four million monthly readers. Your privacy is protected. Unsubscribe at any time.
comments powered by Disqus
Take Action: Support NaturalNews.com by linking back to this article from your website

Permalink to this article:

Embed article link: (copy HTML code below):

Reprinting this article:
Non-commercial use OK, cite NaturalNews.com with clickable link.

Follow Natural News on Facebook, Twitter, Google Plus, and Pinterest

Colloidal Silver

Advertise with NaturalNews...

Support NaturalNews Sponsors:

Advertise with NaturalNews...

GET SHOW DETAILS
+ a FREE GIFT

Sign up for the FREE Natural News Email Newsletter

Receive breaking news on GMOs, vaccines, fluoride, radiation protection, natural cures, food safety alerts and interviews with the world's top experts on natural health and more.

Join over 7 million monthly readers of NaturalNews.com, the internet's No. 1 natural health news site. (Source: Alexa.com)

Your email address *

Please enter the code you see above*

No Thanks

Already have it and love it!

Natural News supports and helps fund these organizations:

* Required. Once you click submit, we will send you an email asking you to confirm your free registration. Your privacy is assured and your information is kept confidential. You may unsubscribe at anytime.