NSA New Software will have Backdoor Access to iPhones

Share This Post

The U.S. National Security Agency was developing in 2008 a software implant for Apple iPhones that allowed the agency to take almost total control of the device, including retrieving text messages and voicemail and remotely turning on its microphone and camera, according to a report by the German magazine Der Spiegel.

The implant, code-named DROPOUTJEEP, was “in development” and initially intended for “close access” installation on a phone, with remote installation being planned for a future release, according to an alleged NSA document with the date October 1, 2008, that Der Spiegel included in a graphic with its recent NSA report.

DROPOUTJEEP’s other capabilities included remotely pushing and pulling files from an iPhone, retrieving the phone’s contact list and identifying the device’s location and the location of the nearest cell tower, the document said. The implant could do all this without the phone user’s knowledge, over SMS (Short Message Service) or a GPRS (General Packet Radio Service) data connection. All the software implant’s communications would be “covert and encrypted,” the document said.

GPRS was a pre-3G mobile data technology with speeds much lower than today’s LTE networks. The first-generation iPhone was introduced in 2007, and the iPhone 3G came out in mid-2008.

Apple could not immediately be reached for comment on the report. In a statement reported by the Wall Street Journal, the company said it was unaware of the project and had never worked with the NSA and had never worked with the agency to create a backdoor to any of its products.

The alleged NSA document describing DROPOUTJEEP was included in an interactive graphic published alongside a December 30 Der Spiegel report on a special hacking unit of the agency, which reportedly intercepts deliveries of computer equipment and installs spyware on it before it’s delivered to the recipients. The report cited internal NSA documents that Der Spiegel said it had viewed. The graphic included links to numerous documents about technologies that the hacking unit developed for infiltrating servers, firewalls, routers, wireless LANs, PCs, peripherals and cellphone networks.

Stay Ahead: Join the EwtNet Insider Email Club!

Stay informed and up-to-date with EwtNet's email subscription. Join our exclusive community and receive curated news, updates, and insights tailored to your interests.

Related Posts

iPhone 15, New Apple Products to Expect at Apple Event 2023

As we near September 12, Apple lovers all over...

Roughly 1,000 Transactions Made with Apple Pay Were Logged Twice in Customer Accounts

Some Bank of America customers have been double-charged for...

How To Restart an iPhone in 2023

Often, if you encounter any technical glitches or issues...

Best Smartphone & Tablet Games for Android and iOS

Best smartphone games you can download for free. The games in our list is available for both iOS and Android devices and adaptable to any screen size.

Download Free Tribesports Training App for iOS

When London-based Tribesports — a social network for people...

iPhone App Cardiio Can Tell Your Heart Rate With Nothing But A Video

 Ming-Zher Poh, a PhD Student at MIT's Media Lab,...
- Advertisement -

Discover more from EwtNet

Subscribe now to keep reading and get access to the full archive.

Continue reading