Alwaght | News & Analysis Website

Editor's Choice

News

Most Viewed

Day Week Month

In Focus

Ansarullah

Ansarullah

A Zaidi Shiite movement operating in Yemen. It seeks to establish a democratic government in Yemen.
Shiite

Shiite

represents the second largest denomination of Islam. Shiites believe Ali (peace be upon him) to be prophet"s successor in the Caliphate.
Resistance

Resistance

Axis of Resistances refers to countries and movements with common political goal, i.e., resisting against Zionist regime, America and other western powers. Iran, Syria, Hezbollah in Lebanon, and Hamas in Palestine are considered as the Axis of Resistance.
Persian Gulf Cooperation Council

Persian Gulf Cooperation Council

A regional political u n i o n consisting of Arab states of the Persian Gulf, except for Iraq.
Taliban

Taliban

Taliban is a Sunni fundamentalist movement in Afghanistan. It was founded by Mohammed Omar in 1994.
  Wahhabism & Extremism

Wahhabism & Extremism

Wahhabism is an extremist pseudo-Sunni movement, which labels non-Wahhabi Muslims as apostates thus paving the way for their bloodshed.
Kurds

Kurds

Kurds are an ethnic group in the Middle East, mostly inhabiting a region, which spans adjacent parts of Iran, Iraq, Syria, and Turkey. They are an Iranian people and speak the Kurdish languages, which form a subgroup of the Northwestern Iranian branch of Iranian languages.
NATO

NATO

The North Atlantic Treaty Organization is an intergovernmental military alliance based on the North Atlantic Treaty which was signed on 4 April 1949.
Islamic Awakening

Islamic Awakening

Refers to a revival of the Islam throughout the world, that began in 1979 by Iranian Revolution that established an Islamic republic.
Al-Qaeda

Al-Qaeda

A militant Sunni organization founded by Osama bin Laden at some point between 1988 and 1989
New node

New node

Map of  Latest Battlefield Developments in Syria and Iraq on
alwaght.net
News

CIA Hacks, Controls iPhones: WikiLeaks

Friday 24 March 2017
CIA Hacks, Controls iPhones: WikiLeaks

Alwaght- US Central Intelligence Agency, CIA, has the ability to infiltrate and control iPhones, WikiLeaks has revealed.

According to whistleblower website’s latest Vault 7 release named ‘Dark Matter’, CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.

NightSkies works in the background and grants “full remote command and control,” to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.

In the press release regarding the latest ‘Vault 7’ leak, WikiLeaks says that NightSkies “is expressly designed to be physically installed onto factory fresh iPhones.”

According to the documents, hackers working for the US government could breach iPhones and install malicious software on the devices’ “firmware”, which is its permanent software. If true, it means a targeted iPhone owner would never be able to remove the hacking software. Even a “factory reset”, in which all data is deleted and the operating system is reinstalled, could not remove the firmware hack. The documents discussing NightSkies date to 2008, soon after the first iPhone was released.

Nightskies is made up of three components: an implant, a Listening Post (LP) and a post-processing program.

The implant runs undetected on the phone once it has been physically installed.

The CIA monitors the phone for activity, including its browser history file, YouTube video cache or mail metadata. Once it is used for the first time, NightSkies kicks in and sends information to a preconfigured LP.

LPs are used to monitor devices, such as computers and phones, which have been hacked with the CIA’s malware implants. They can be physical or virtual and stored on a CIA computer server.

The revelation that the CIA is physically infiltrating factory fresh phones suggests it has accessed the organization's supply chain, meaning they may be accessing phones as they are shipped to targets, with CIA agents or assets physically tampering with suspects’ phones before they even receive them. 

Tags :

iPhone CIA Hack WikiLeaks NightSkies

Comments
Name :
Email :
* Text :
Send

Gallery

Photo

Film

Courages Individiuals like Sinvar are on the Rise

Courages Individiuals like Sinvar are on the Rise