Alwaght | News & Analysis Website

Editor's Choice

News

Most Viewed

Day Week Month

In Focus

Ansarullah

Ansarullah

A Zaidi Shiite movement operating in Yemen. It seeks to establish a democratic government in Yemen.
Shiite

Shiite

represents the second largest denomination of Islam. Shiites believe Ali (peace be upon him) to be prophet"s successor in the Caliphate.
Resistance

Resistance

Axis of Resistances refers to countries and movements with common political goal, i.e., resisting against Zionist regime, America and other western powers. Iran, Syria, Hezbollah in Lebanon, and Hamas in Palestine are considered as the Axis of Resistance.
Persian Gulf Cooperation Council

Persian Gulf Cooperation Council

A regional political u n i o n consisting of Arab states of the Persian Gulf, except for Iraq.
Taliban

Taliban

Taliban is a Sunni fundamentalist movement in Afghanistan. It was founded by Mohammed Omar in 1994.
  Wahhabism & Extremism

Wahhabism & Extremism

Wahhabism is an extremist pseudo-Sunni movement, which labels non-Wahhabi Muslims as apostates thus paving the way for their bloodshed.
Kurds

Kurds

Kurds are an ethnic group in the Middle East, mostly inhabiting a region, which spans adjacent parts of Iran, Iraq, Syria, and Turkey. They are an Iranian people and speak the Kurdish languages, which form a subgroup of the Northwestern Iranian branch of Iranian languages.
NATO

NATO

The North Atlantic Treaty Organization is an intergovernmental military alliance based on the North Atlantic Treaty which was signed on 4 April 1949.
Islamic Awakening

Islamic Awakening

Refers to a revival of the Islam throughout the world, that began in 1979 by Iranian Revolution that established an Islamic republic.
Al-Qaeda

Al-Qaeda

A militant Sunni organization founded by Osama bin Laden at some point between 1988 and 1989
New node

New node

Map of  Latest Battlefield Developments in Syria and Iraq on
alwaght.net
News

CIA and Apple Smart Phones

Wednesday 11 March 2015
CIA and Apple Smart Phones

Alwaght-Researchers working for the CIA were involved in a “multi-year, sustained effort” to crack security measures and undermine encryption on Apple devices, The Intercept reports, citing top-secret documents leaked by Edward Snowden, as Russia Today reported.

The documents were presented at one of clandestine annual security conferences known as the “Jamboree.”  The CIA-sponsored forums took place annually for nearly a decade, while the leak covers the period of 2006 to 2013.

Though the report does not provide the details of any successful operations waged against Apple, the documents describe several methods US intelligence officers were using to attempt to infiltrate the tech giant’s products.

One of the most egregious revelations detailed by The Intercept was an attempt to create a dummy version of Xcode — the tool used to create many of the apps sold the Apple App Store.  If successful, this could allow spies to insert surveillance “backdoors” into any app created using the compromised development software.

The docs also claim that the CIA was actively working to crack encryption keys implanted into Apple mobile devices that secured user data and communications.

The news has spurred backlash amongst security experts on Twitter and will likely prompt heighted security audits from Apple developers. The revelations are expected to strain already tense relations between the company and the US government.

A spokesperson for Apple pointed to previous statements by company CEO Tim Cook on privacy, but did not comment further on the breach.

 I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services," Cook wrote last year. "We have also never allowed access to our servers.  And we never will."

Previously Apple was said to have cooperated with the US government’s Prism program, a legal backdoor that allowed the NSA and other security agencies to obtain user information.

However, following the first batch of Snowden revelations about NSA surveillance, Apple said it ramped up its efforts to protect user privacy aiming to restore user trust.  Last fall, the company changed its encryption methods for data stored on iPhones, a move it said meant it had no longer had a way to extract user data, even if ordered to with a warrant.

Security researchers warned that the tactics would set a dangerous precedent for mobile privacy.

"Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” Matthew Green, a Johns Hopkins cryptographer, told The Intercept.  "Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages.  If you can attack Apple, then you can probably attack anyone."

US President Barack Obama as well British Prime Minister David Cameron expressed disapproval at such measures, cautioning that increased privacy for users may prevent governments from tracking extremists planning attacks.

A US intelligence official told CNBC on Tuesday that such tactics were simply standard practice for American security agencies.

"That's what we do. CIA collects information overseas, and this is focused on our adversaries, whether they be terrorists or other adversaries," the official said.  "This isn't just about Apple or Microsoft.  There is a whole world of devices out there, and that is what we are going to do.  It is what it is."

Tags :

Comments
Name :
Email :
* Text :
Send

Gallery

Photo

Film

Another epic from the Iranian people on the 46th anniversary of the Islamic Revolution

Another epic from the Iranian people on the 46th anniversary of the Islamic Revolution