Tech Analyzer


The NSA can Hack into Your iPhone Without you Knowing

Tristan Thomas January 1, 2014

An illustration picture shows the logo of the U.S. National Security Agency on the display of an iPhone in Berlin

With in the year 2013, mobile security and the efforts of the NSA to breach our protected rights have become a major focus of the technological industry. Its sad to say that now the two are closely related. Thats right, Der Spiegel interactive reports that the NSA has the ability to turn on your iPhones camera and microphone without you even knowing that they are doing so. The report listed the following tools and their descriptions as to how the NSA is tapping in on you and violating your constitutional rights:

  • GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
  • MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
  • TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
  • TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
  • PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset

The most interesting one of the group goes by the code name DROPOUTJEEP. What DROPOUTJEEP does is take all of the NSA-iPhone communication and make sure that the user of the device was largely unaware that any information was being collected from them.

Sure enough, Apple was very fast to respond to this news saying to TechCrunch:

Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.

This will surly damage the Fortune 500 movement to secure smartphone options. Read More.

Tagged with: , , ,

About Author

Tristan Thomas

Currently in school seeking a degree in Computer Science and a heart set on Law, Tristan spends his extra time taking a second look at the more interesting topics surrounding current day technology. View all posts by Tristan Thomas →

Login to your account

Can't remember your Password ?

Register for this site!