FacebookTwitterGoogle+RedditEmail

Apple’s iPhone: the Backdoor Is Already There

by

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

March 28, 2017
Mike Whitney
Ending Syria’s Nightmare will Take Pressure From Below 
Mark Kernan
Memory Against Forgetting: the Resonance of Bloody Sunday
John McMurtry
Fake News: the Unravelling of US Empire From Within
Ron Jacobs
Mad Dog, Meet Eris, Queen of Strife
Michael J. Sainato
State Dept. Condemns Attacks on Russian Peaceful Protests, Ignores Those in America
Ted Rall
Five Things the Democrats Could Do to Save Their Party (But Probably Won’t)
Linn Washington Jr.
Judge Neil Gorsuch’s Hiring Practices: Privilege or Prejudice?
Philippe Marlière
Benoît Hamon, the Socialist Presidential Hopeful, is Good News for the French Left
Norman Pollack
Political Cannibalism: Eating America’s Vitals
Bruce Mastron
Obamacare? Trumpcare? Why not Cubacare?
David Macaray
Hollywood Screen and TV Writers Call for Strike Vote
Christian Sorensen
We’ve Let Capitalism Kill the Planet
Rodolfo Acuna
What We Don’t Want to Know
Binoy Kampmark
The Futility of the Electronics Ban
Andrew Moss
Why ICE Raids Imperil Us All
March 27, 2017
Robert Hunziker
A Record-Setting Climate Going Bonkers
Frank Stricker
Why $15 an Hour Should be the Absolute Minimum Minimum Wage
Melvin Goodman
The Disappearance of Bipartisanship on the Intelligence Committees
Patrick Cockburn
ISIS’s Losses in Syria and Iraq Will Make It Difficult to Recruit
Russell Mokhiber
Single-Payer Bernie Morphs Into Public Option Dean
Gregory Barrett
Can Democracy Save Us?
Dave Lindorff
Budget Goes Military
John Heid
Disappeared on the Border: “Chase and Scatter” — to Death
Mark Weisbrot
The Troubling Financial Activities of an Ecuadorian Presidential Candidate
Robert Fisk
As ISIS’s Caliphate Shrinks, Syrian Anger Grows
Michael J. Sainato
Democratic Party Continues Shunning Popular Sanders Surrogates
Paul Bentley
Nazi Heritage: the Strange Saga of Chrystia Freeland’s Ukrainian Grandfather
Christopher Ketcham
Buddhism in the Storm
Thomas Barker
Platitudes in the Wake of London’s Terror Attack
Mike Hastie
Insane Truths: a Vietnam Vet on “Apocalypse Now, Redux”
Binoy Kampmark
Cyclone Watch in Australia
Weekend Edition
March 24, 2017
Friday - Sunday
Michael Hudson
Trump is Obama’s Legacy: Will this Break up the Democratic Party?
Eric Draitser
Donald Trump and the Triumph of White Identity Politics
Jeffrey St. Clair
Roaming Charges: Nothing Was Delivered
Andrew Levine
Ryan’s Choice
Joshua Frank
Global Coal in Freefall, Tar Sands Development Drying Up (Bad News for Keystone XL)
Anthony DiMaggio
Ditching the “Deep State”: The Rise of a New Conspiracy Theory in American Politics
Rob Urie
Boris and Natasha Visit Fantasy Island
John Wight
London and the Dreary Ritual of Terrorist Attacks
Paul Buhle
The CIA and the Intellectuals…Again
David Rosen
Why Did Trump Target Transgender Youth?
Vijay Prashad
Inventing Enemies
Ben Debney
Outrage From the Imperial Playbook
M. Shadee Malaklou
An Open Letter to Duke University’s Class of 2007, About Your Open Letter to Stephen Miller
Michael J. Sainato
Bernie Sanders’ Economic Advisor Shreds Trumponomics
FacebookTwitterGoogle+RedditEmail