bothernews

Posts Tagged ‘NSA reforms

Lest We Forget: The NSA already has backdoor access to your iPhone

leave a comment »

Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using  DROPOUT JEEP:

From 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

 

Advertisements

A List of What We Know (so far) of the NSA’s 4th Amendment Violations:

leave a comment »

 

The Fourth Amendment to the US Constitution:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

 

A list of what the NSA can actually do:

[BN: Full list edited to only those used against Americans]

  • It can track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can set up fake internet cafes. (More)
  • It can tap underwater fiber-optic cables. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)

 

The NSA and their contractors are using our tax dollars to violate our freedoms while our elected representatives repeatedly fail to actually represent us.

America, as The New Atlantis?  One question.  Is The New New Atlantis taking applications?

 

See the Full Original List here:  Obama Speech on NSA Reforms a Sad Joke, 4th Amendment Destruction Now Sealed With Presidential Approval | The Daily Sheeple