Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Edward Snowden, the infamous former contractor for the National Security Agency who leaked thousands of pages of previously classified NSA intelligence documents, reportedly thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather details about the user.

"Edward never utilizes an iPhone he's got a very simple telephone," said the lawyer of Snowden, Anatoly Kucherena, in an interview with the Russian media business RIA Novosti.
"The iPhone has a special application that can activate itself without the need of the owner obtaining to press a button and gather facts about him that is why on security grounds he refused to have this telephone," Kucherena added.

It is not clear if the "special software program" getting referred to in the interview is created up of common diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have discovered a way to compromise the mobile operating system developed by Apple.

Apple was amongst the very first organizations accused of participating in the PRISM data-mining project of the NSA, following the release by Snowden of the agency's classified documents. The project reportedly involved extracting video, audio, pictures, documents, emails and connection logs from devices, permitting analysts to track the movement of the device's user and the communications that they are getting or sending out. At the time the accusations were quickly denied by Apple, stating that the organization is not involved in the PRISM project and that it does not grant government agencies direct access to any Apple's servers.

Succeeding leaks showed that the NSA developed spyware that would target iPhones, allowing intelligence agencies to access messages, live microphone feeds, data contained in the devices and location information.

Apple stated that the firm has under no circumstances been involved with the NSA in the creation of backdoor software for any of the company's items. In addition, Apple mentioned that it is not conscious of any alleged programs by the NSA to target the company's merchandise such as the iPhone, as the firm values the security and privacy of its users.

Union Gazette

 

 

« Industrial Internet of Things: Big Opportunities and Challenges
Kaspersky Lab Presents a Forecast for 2045 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.