Mirror Daily

Sunday, February 28, 2021
Log in
  • Home
  • National & Global News
  • Business & Economy
  • Tech & Science
  • Health
  • About Mirror Daily
    • Our Team
    • Contact Us
    • Terms of Use
    • Privacy Policy GDPR
  • Latest News
    • The Geological Features of Pluto Have Just Gotten Dark Names Inspired from the Underworld
    • The Abuse of Imodium
    • McDonald’s Salads are worse than their Burgers
    • US Family Sues Hospital Over Botched Tonsillectomy
    • Should We Go Back to The Moon?
    • Photo of Gay Military Men Kissing Goes Viral

Pages

  • About Mirror Daily
  • Contact Us
  • Fossil Reveals That Dinosaurs Suffered from Arthritis
  • Our Team
  • Privacy Policy GDPR
  • Terms of Use
  • World Breastfeeding Week: Advantages and Disadvantages

Recent Posts

  • Canadian Teen Killed by Toxic Shock Syndrome on School Trip June 29, 2018
  • Donut Fries Coming to Dunkin’ Donuts Nationwide June 28, 2018
  • Kohl’s Hiring Workers for Holiday Season amid Labor Shortage June 28, 2018
  • This is How You’re Sabotaging Your Skin Safety June 27, 2018
  • SF Woman Calls Cops on Little Girl for Selling Water on Street June 26, 2018
  • Sarah Sanders Misused Official Twitter Account to Complain about Restaurant June 25, 2018
  • Man Arrested for Placing 10-Ft-Long Heroin Spoon Outside Drug Maker HQ June 25, 2018

CIA Has Been Prying into Apple’s Security System, According to Documents Provided by Snowden

March 10, 2015 By John Birks Leave a Comment

iSpy

Since before the release of the first iPhone in 2007, security researchers have been holding secret annual meetings called “Jamborees”, in order to exchange new ideas about the possibilities of manipulating commercial electronics and household gadgets to extract protected information. The documents about these gatherings have been provided for The Intercept by NSA famous whistleblower Edward Snowden.

The current conference, called the Trusted Computing Base Jamboree, sponsored by the CIA’s Information Operations Center, is focused on bypassing and exploiting new security features of electronic devices. Held in a Lockheed Martin unit (Lockheed Martin is one of the largest defense contractors, considered by Arms and Security Project Director William Hartung, from the Center for International Policy, to be a good “candidate for Big Brother”), this conference is part of a larger project dedicated to the discovery of ways to crack private companies’ security systems. According to documents dating from 2010-2012, security experts have been mainly interested in extracting encryption keys that protect data stored on Apple devices. In 2011, some security researchers claimed to have discovered a “noninvasive” way to extract encryption keys, while others focused on the possibilities of physically extracting the key from Apple’s hardware. At the consecutive year’s Jamboree, other experts presented a way to control Xcode (a free piece of software upon which most Apple app-developers base their work) for creating malware which extracts private data from users.

The CIA attempts to tackle Apple private security settings are more of a concern in a context like the current one, with IT giants struggling to resist pressure from the U. S. and U. K. governments to weaker the security of their products. Law enforcement agencies want the government to be allowed to circumvent the security tools built into wireless devices. Apple’s CEO, Tim Cook, has vocally defended privacy as a core value of his company and reproved law enforcement agencies and secret services for their attempt at interfering.

Steven Bellovin, former chief technologist for the U. S. Federal Trade Commission (currently a professor at Columbia University), expressed his lack of surprise at the news odf CIA’s research into Apple technologies: “Spies gonna spy”, he said. “Their attitude is basically amoral”. While he conceded that it’s reasonable to seek information about dangerous people, Bellovin restated the risks of an inappropriate use of such intelligence technologies: mass surveillance, targeting Americans without a warrant, or spying on allies.

image source: The Intercept

Filed Under: IT & Diversified Sector, National & Global News Tagged With: Apple security features, CIA, CIA spying into Apple, hacking into Apple, security agency Jamborees

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Recent Articles

Albert Einstein in group photo

Einstein’s Travel Diaries Reveal His Lesser Known Racist Side

June 14, 2018 By John Birks

Baobab tree in Tanzania

Southern Africa’s Iconic Baobab Trees Facing Massive Die-Off

June 11, 2018 By John Birks

UFO 'Self Parking' Sign

Researcher Accuses NASA of Massive Alien Cover-Up

March 5, 2018 By John Birks

Elon Musk's flying Tesla roadster

NASA Warns Elon Musk’s Flying Tesla Roadster May Contaminate Mars

February 28, 2018 By John Birks

Windows 10 home screen

Microsoft Working on Making Windows Password-Free

February 12, 2018 By John Birks

Ice Cubes

Scientists Discover Fourth State of Water: Superionic Ice

February 10, 2018 By John Birks

Head of a northern gannet

Forever Alone Nigel the Gannet Found Dead near Fake Partner

February 3, 2018 By John Birks

Globular Star Cluster

Scientists Find Surprise Black Hole in Globular Star Cluster

January 20, 2018 By John Birks

The Amazon Echo Dot

America’s Smart Speaker Market Jumps to 39 Million Users

January 15, 2018 By John Birks

Pink plasma ball

CES 2018: Intel Presents Out-of-This-World Quantum Computer

January 10, 2018 By John Birks

Teen using her iPad

Major Apple Investors Urge Company to Do More About iPhone Addiction

January 8, 2018 By John Birks

Russian spacecraft

Out-of-Control Chinese Space Station Hurling Toward Earth

January 5, 2018 By John Birks

wanning moon seen on the evening sky in between trees

Scientists Thrilled about Trump’s Initiative to Send Explorers Back to the Moon

December 31, 2017 By John Birks

Two iPhone 7 models on table

Apple Confirms Slower-iPhone Conspiracy Theory

December 22, 2017 By John Birks

Categories

  • Business & Economy
  • Capital & Retail Sector
  • Health
  • IT & Diversified Sector
  • National & Global News
  • Tech & Science

Copyright © 2021 MirrorDaily.com

About · Privacy Policy · Terms of Use · Contact

This website uses cookies to ensure you get the best experience on our website. Learn more.