Mirror Daily

Sunday, January 17, 2021
Log in
  • Home
  • National & Global News
  • Business & Economy
  • Tech & Science
  • Health
  • About Mirror Daily
    • Our Team
    • Contact Us
    • Terms of Use
    • Privacy Policy GDPR
  • Latest News
    • The Geological Features of Pluto Have Just Gotten Dark Names Inspired from the Underworld
    • The Abuse of Imodium
    • McDonald’s Salads are worse than their Burgers
    • US Family Sues Hospital Over Botched Tonsillectomy
    • Should We Go Back to The Moon?
    • Photo of Gay Military Men Kissing Goes Viral

Pages

  • About Mirror Daily
  • Contact Us
  • Fossil Reveals That Dinosaurs Suffered from Arthritis
  • Our Team
  • Privacy Policy GDPR
  • Terms of Use
  • World Breastfeeding Week: Advantages and Disadvantages

Recent Posts

  • Using Tinder Intended for Hooking Up July 6, 2020
  • An Unbiased Enjoy of Argentine Mail Buy Brides July 1, 2020
  • Positives and negatives Of Going out with Thai Women of all ages June 27, 2020
  • Living, Death and Asian Females Looking For Guy June 27, 2020
  • The Unexposed Top secret of Japanese people Brides June 25, 2020
  • East European And Slavic Birdes-to-be ᐈ Locate Top Females For Marriage Here! June 24, 2020
  • Women Dating For the First Time June 23, 2020

CIA Has Been Prying into Apple’s Security System, According to Documents Provided by Snowden

March 10, 2015 By John Birks Leave a Comment

iSpy

Since before the release of the first iPhone in 2007, security researchers have been holding secret annual meetings called “Jamborees”, in order to exchange new ideas about the possibilities of manipulating commercial electronics and household gadgets to extract protected information. The documents about these gatherings have been provided for The Intercept by NSA famous whistleblower Edward Snowden.

The current conference, called the Trusted Computing Base Jamboree, sponsored by the CIA’s Information Operations Center, is focused on bypassing and exploiting new security features of electronic devices. Held in a Lockheed Martin unit (Lockheed Martin is one of the largest defense contractors, considered by Arms and Security Project Director William Hartung, from the Center for International Policy, to be a good “candidate for Big Brother”), this conference is part of a larger project dedicated to the discovery of ways to crack private companies’ security systems. According to documents dating from 2010-2012, security experts have been mainly interested in extracting encryption keys that protect data stored on Apple devices. In 2011, some security researchers claimed to have discovered a “noninvasive” way to extract encryption keys, while others focused on the possibilities of physically extracting the key from Apple’s hardware. At the consecutive year’s Jamboree, other experts presented a way to control Xcode (a free piece of software upon which most Apple app-developers base their work) for creating malware which extracts private data from users.

The CIA attempts to tackle Apple private security settings are more of a concern in a context like the current one, with IT giants struggling to resist pressure from the U. S. and U. K. governments to weaker the security of their products. Law enforcement agencies want the government to be allowed to circumvent the security tools built into wireless devices. Apple’s CEO, Tim Cook, has vocally defended privacy as a core value of his company and reproved law enforcement agencies and secret services for their attempt at interfering.

Steven Bellovin, former chief technologist for the U. S. Federal Trade Commission (currently a professor at Columbia University), expressed his lack of surprise at the news odf CIA’s research into Apple technologies: “Spies gonna spy”, he said. “Their attitude is basically amoral”. While he conceded that it’s reasonable to seek information about dangerous people, Bellovin restated the risks of an inappropriate use of such intelligence technologies: mass surveillance, targeting Americans without a warrant, or spying on allies.

image source: The Intercept

The following two tabs change content below.
  • Bio
  • Latest Posts

John Birks

John holds a diploma in journalism from the S.I. Newhouse School of Public Communications at Syracuse University. He covers the technology, social media, green business, eco-travel, politics, arts culture.

Latest posts by John Birks (see all)

  • Canadian Teen Killed by Toxic Shock Syndrome on School Trip - June 29, 2018
  • Donut Fries Coming to Dunkin’ Donuts Nationwide - June 28, 2018
  • Kohl’s Hiring Workers for Holiday Season amid Labor Shortage - June 28, 2018

Share this:

  • Tweet
  • Share on Tumblr

Filed Under: IT & Diversified Sector, National & Global News Tagged With: Apple security features, CIA, CIA spying into Apple, hacking into Apple, security agency Jamborees

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Recent Articles

Albert Einstein in group photo

Einstein’s Travel Diaries Reveal His Lesser Known Racist Side

June 14, 2018 By John Birks

Baobab tree in Tanzania

Southern Africa’s Iconic Baobab Trees Facing Massive Die-Off

June 11, 2018 By John Birks

UFO 'Self Parking' Sign

Researcher Accuses NASA of Massive Alien Cover-Up

March 5, 2018 By John Birks

Elon Musk's flying Tesla roadster

NASA Warns Elon Musk’s Flying Tesla Roadster May Contaminate Mars

February 28, 2018 By John Birks

Windows 10 home screen

Microsoft Working on Making Windows Password-Free

February 12, 2018 By John Birks

Ice Cubes

Scientists Discover Fourth State of Water: Superionic Ice

February 10, 2018 By John Birks

Head of a northern gannet

Forever Alone Nigel the Gannet Found Dead near Fake Partner

February 3, 2018 By John Birks

Globular Star Cluster

Scientists Find Surprise Black Hole in Globular Star Cluster

January 20, 2018 By John Birks

The Amazon Echo Dot

America’s Smart Speaker Market Jumps to 39 Million Users

January 15, 2018 By John Birks

Pink plasma ball

CES 2018: Intel Presents Out-of-This-World Quantum Computer

January 10, 2018 By John Birks

Teen using her iPad

Major Apple Investors Urge Company to Do More About iPhone Addiction

January 8, 2018 By John Birks

Russian spacecraft

Out-of-Control Chinese Space Station Hurling Toward Earth

January 5, 2018 By John Birks

wanning moon seen on the evening sky in between trees

Scientists Thrilled about Trump’s Initiative to Send Explorers Back to the Moon

December 31, 2017 By John Birks

Two iPhone 7 models on table

Apple Confirms Slower-iPhone Conspiracy Theory

December 22, 2017 By John Birks

Related Articles

  • White House press secretary Sarah Huckabee Sanders

    Sarah Sanders Misused Official Twitter Account to Complain about Restaurant

    Jun 25, 2018
  • Pedobear wallpaper

    Online Predator Convicted after Trying to Lure Undercover Cop into Having Sex

    Jun 20, 2018
  • Illegal immigrant Pablo Villavicencio

    NYC Pizza Deliveryman Busted by ICE while Making Delivery

    Jun 7, 2018
  • Indian actress Sridevi Kapoor

    Bollywood’s First Female Superstar Accidentally Drowns in Hotel Bathtub

    Mar 1, 2018
  • Kenyan elephants

    Expert who Exposed illegal Ivory Trade Killed in His Nairobi Home

    Feb 6, 2018
  • Homeless people sleeping on park benches

    LA’s Homelessness Rates Jumped 75% in Last Six Years

    Feb 4, 2018
  • Planned Parenthood head Cecile Richards

    Planned Parenthood Pres Scolds White Women at Women’s March

    Jan 23, 2018
  • Spy camera on file labeled To Secret

    China-Born Ex-CIA Agent Arrested for Crippling Agency’s Op in China

    Jan 18, 2018
  • Man relaxing on Florida beach

    Trump Administration Takes Florida Off the Offshore Drilling Table

    Jan 13, 2018
  • America's Toughest Sheriff Joe Arpaio

    Ex-Sheriff Arpaio Challenges Validity of Obama’s Birth Certificate

    Jan 12, 2018

Categories

  • Business & Economy
  • Capital & Retail Sector
  • Health
  • IT & Diversified Sector
  • National & Global News
  • Tech & Science

Copyright © 2021 MirrorDaily.com

About · Privacy Policy · Terms of Use · Contact

This website uses cookies to ensure you get the best experience on our website. Learn more.