8 Comments

The NSA developed a tool 6 years ago to let it attack the then-new iPhone, according to documents from that time, revealed on Monday by journalist Jacob Appelbaum and Der Spiegel. The tool, DROPOUTJEEP, gave the agency “the ability to remotely push/pull files from the device, SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc.” Other documents also published on Monday describe software implants for extracting phonebook, SMS, call log and geolocation information from SIM cards, as well as for targeting the now-defunct Windows Mobile OS. Der Spiegel said in September that the NSA could hack into iPhones, as well as Android and BlackBerry devices.

  1. Bobby Broderick Tuesday, December 31, 2013

    What is “pwned”? Doesn’t anyone proofread these things?

    Share
    1. You’ve never seen/heard “pwned” before? The term’s been around for years. Sometimes spelled “pwn’d” also.

      Share
  2. I really don’t understand why this is news. It says in the original documents that physical access of the phone is required. Do you think the NSA has less capability than the jail breakers? Heck, they could be just renaming the jailbreak utility to DROPOUTJEEP.

    Share
    1. Remote installation was the next step six years ago. The NSA subsequently claimed a 100 percent success rate.

      Share
      1. “Pwned” means “to be controlled against your will”, or “to be defeated by a superior power”. You might also hear the expression, “pwnage”, which is the noun version of “being pwned”.

        This “pwn” expression originated in the 1980’s from the word “owned”. It was used to describe when a hacker would take remote control of a server or another computer. The use of “p” to replace “o” was simply a misspelling at first, but the spelling stuck as a stylistic point.

        Share
        1. Bobby Broderick Wednesday, January 1, 2014

          Thank you for your definition & explanation. I’m not so ignorant anymore.

          Share
  3. The elephant is the room is that mobile carrier can download, modify and read the files on your SIM card. This information is not only limited to phone contacts, recently called numbers, received calls, SMS messages. They can also download java me files to your card and other applications called wiblets that can control what networks you latch onto.

    This functionality is all controlled through a central server and the updates are sent to the cards “over the air” the whole system is purchased from the bigger SIM card producers and are justified as a value added benefit. Anyone with a good password guessing program can access these servers.

    Share
  4. An un-named third party has confirmed that the NSA now has silent flying jetpacks that are used by its people to fly over your office, where they use their mind control rays to make you do what ever they want.

    The first use of the mind control ray was by the janitor who used it on the head of the NSA and made him do all kinds of stupid things. Now you know the rest of the story.

    Now you know why the country is in such bad shape.

    PS, everything above is true except for the falsehoods. Honest. :-)

    Share

Comments have been disabled for this post