Tuesday, January 7, 2014

NSA can turn the iPhone into a pocket-sized spy, hacker reveals


LONDON — A well-known privacy advocate has given the public an unusually explicit peek into the intelligence world’s tool box, pulling back the curtain on the National Security Agency’s arsenal of high-tech spy gear.

Independent journalist and security expert Jacob Appelbaum this week told a hacker conference in Germany that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computers, even if they weren’t online.
Even worse than your worst nightmares
Appelbaum told hundreds of computer experts gathered at Hamburg’s Chaos Communications Conference that his revelations about the NSA’s capabilities “are even worse than your worst nightmares.”

“What I am going to show you today is wrist-slittingly depressing,” he said.
Apple responded on Tuesday to the claims, saying it never worked with the U.S. spy agency and was unaware of efforts to target its iPhones.

“Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products,” the company said in a statement.

“We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.”

Even though in the past six months there have been an unprecedented level of public scrutiny of the NSA and its methods, Appelbaum’s claims — supported by what appeared to be internal NSA slideshows — still caused a stir.

One of the slides described how the NSA can plant malicious software onto Apple Inc.’s iPhone, giving American intelligence agents the ability to turn the popular smartphone into a pocket-sized spy.
Another slide showcased a futuristic-sounding device described as a “portable continuous wave generator,” a remote-controlled device which — when paired with tiny electronic implants — can bounce invisible waves of energy off keyboards and monitors to see what is being typed, even if the target device isn’t connected to the Internet.

A third slide showcased a piece of equipment called NIGHTSTAND, which can tamper with wireless Internet connections from up to 8 miles (13 kilometres) away.

An NSA spokeswoman, Vanee Vines, said that she wasn’t aware of Appelbaum’s presentation, but that in general should would not comment on “alleged foreign intelligence activities.”

“As we’ve said before, NSA’s focus is on targeting the communications of valid foreign intelligence targets — not on collecting and exploiting a class of communications or services that would sweep up communications that are not of bona fide foreign intelligence interest to the U.S. government.”

The documents included in Appelbaum’s presentation were first published by German magazine Der Spiegel on Sunday and Monday.

Appelbaum and Der Spiegel have both played an important role in the disclosures of NSA leaker Edward Snowden, but neither has clarified whether the most recent set of slides came from Snowden.

financialpost.com 31 Dec 2013

Despite what the 'official' reports are from the world's largest I.T. companies (which include but are not limited to Apple, Dell, Google, HP, Microsoft all of which are situated on US soil)  and consequently the corporate media, they (the corporations) must be subserviant to the (corporate) policies and requests of the U.S. government, period, no questions asked.

Governments accused Chinese communictations manufacturer Huawei of concealed backdoors in their communications equipment, something that was already in place in US maunfactured Operating Systems / hardware, which has already been proven.

Special personnel within the companies are employed to covertly monitor systems and provide the information back to the government, despite what the official reports are.

Corpau is aware of the identities of several 'hardware specialists' in Australia that (secretly) report back to the authorities.

There is a deliberate push (by promoting the apparent so called 'advantages' to the consumer) for 'smart' technologies, from 'smart' meter to the portable and almost surgically attached mobile 'smart' phone, so that the masses can be monitored and later controlled at various stages of the technology.

No comments: