The NSA can Hack into Your iPhone Without you Knowing

With in the year 2013, mobile security and the efforts of the NSA to breach our protected rights have become a major focus of the technological industry. It’s sad to say that now the two are closely related. That’s right, Der Spiegel interactive reports that the NSA has the ability to turn on your iPhone’s camera and microphone without you even knowing that they are doing so. The report listed the following tools and their descriptions as to how the NSA is tapping in on you and violating your constitutional rights:

  • GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
  • MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
  • TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
  • TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
  • PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset

The most interesting one of the group goes by the code name ‘DROPOUTJEEP’. What DROPOUTJEEP does is take all of the NSA-iPhone communication and make sure that the user of the device was largely unaware that any information was being collected from them.

Sure enough, Apple was very fast to respond to this news saying to TechCrunch:

Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.

This will surly damage the Fortune 500 movement to secure smartphone options. Read More.

About the author

Tristan Thomas

Currently studying Information Technology at Georgia Southern University, Tristan uses Tech Analyzer as a venting outlet for how he interprets the technological world around him.

Leave a Comment