Courtesy of Mish.
Today Apple denied creating backdoors on the iPhone for the NSA to exploit. First let’s review some articles that preceded the denial.
Within the last few days came numerous reports NSA Reportedly Has Total Access To The Apple iPhone.
Back in September, Der Spiegel online reported iSpy: How the NSA Accesses Smartphone Data
AppleInsider notes “New documents revealed on Monday show the U.S. National Security Agency has the capability of deploying software implants on Apple’s iPhone that grants remote access to on-board assets like SMS messages, location data and microphone audio.“
Please consider Der Spiegel article Shopping for Spy Gear: Catalog Advertises NSA Toolbox by Jacob Appelbaum, Judith Horchert and Christian Stöcker.
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.
According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is one attacker none of these products can fend off — the United States’ National Security Agency.
A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry — including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
A 50-Page Catalog
These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.
This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000….