Click amount to donate direct to CounterPunch
  • $25
  • $50
  • $100
  • $500
  • $other
  • use PayPal
Keep CounterPunch ad free. Support our annual fund drive today!

Apple’s iPhone: the Backdoor Is Already There


shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

2016 Fund Drive
Smart. Fierce. Uncompromised. Support CounterPunch Now!

  • cp-store
  • donate paypal

CounterPunch Magazine


Weekend Edition
October 21, 2016
Friday - Sunday
John Wight
Hillary Clinton and the Brutal Murder of Gaddafi
Diana Johnstone
Hillary Clinton’s Strategic Ambition in a Nutshell
Jeffrey St. Clair
Roaming Charges: Trump’s Naked and Hillary’s Dead
John W. Whitehead
American Psycho: Sex, Lies and Politics Add Up to a Terrifying Election Season
Stephen Cooper
Hell on Earth in Alabama: Inside Holman Prison
Patrick Cockburn
13 Years of War: Mosul’s Frightening and Uncertain Future
Rob Urie
Name the Dangerous Candidate
Pepe Escobar
The Aleppo / Mosul Riddle
David Rosen
The War on Drugs is a Racket
Sami Siegelbaum
Once More, the Value of the Humanities
Cathy Breen
“Today Is One of the Heaviest Days of My Life”
Neve Gordon
Israel’s Boycott Hypocrisy
Mark Hand
Of Pipelines and Protest Pens: When the Press Loses Its Shield
Victor Wallis
On the Stealing of U.S. Elections
Michael Hudson
The Return of the Repressed Critique of Rentiers: Veblen in the 21st century Rentier Capitalism
Brian Cloughley
Drumbeats of Anti-Russia Confrontation From Washington to London
Howard Lisnoff
Still Licking Our Wounds and Hoping for Change
Brian Gruber
Iraq: There Is No State
Peter Lee
Trump: We Wish the Problem Was Fascism
Stanley L. Cohen
Equality and Justice for All, It Seems, But Palestinians
Steve Early
In Bay Area Refinery Town: Berniecrats & Clintonites Clash Over Rent Control
Kristine Mattis
All Solutions are Inadequate: Why It Doesn’t Matter If Politicians Mention Climate Change
Peter Linebaugh
Ron Suny and the Marxist Commune: a Note
Andre Vltchek
Sudan, Africa and the Mosaic of Horrors
Keith Binkly
The Russians Have Been Hacking Us For Years, Why Is It a Crisis Now?
Jonathan Cook
Adam Curtis: Another Manager of Perceptions
Ted Dace
The Fall
Sheldon Richman
Come and See the Anarchy Inherent in the System
Susana Hurlich
Hurricane Matthew: an Overview of the Damages in Cuba
Dave Lindorff
Screwing With and Screwing the Elderly and Disabled
Chandra Muzaffar
Cuba: Rejecting Sanctions, Sending a Message
Dennis Kucinich
War or Peace?
Joseph Natoli
Seething Anger in the Post-2016 Election Season
Jack Rasmus
Behind The 3rd US Presidential Debate—What’s Coming in 2017
Ron Jacobs
A Theory of Despair?
Gilbert Mercier
Globalist Clinton: Clear and Present Danger to World Peace
James A Haught
Many Struggles Won Religious Freedom
Kollibri terre Sonnenblume
Dear Fellow Gen Xers: Let’s Step Aside for the Millennials
Uri Avnery
The Peres Funeral Ruckus
Tom Clifford
Duterte’s Gambit: the Philippines’s Pivot to China
Reyes Mata III
Scaling Camelot’s Walls: an Essay Regarding Donald Trump
Raouf Halaby
Away from the Fray: From Election Frenzy to an Interlude in Paradise
James McEnteer
Art of the Feel
David Yearsley
Trump and Hitchcock in the Age of Conspiracies
Charles R. Larson
Review: Sjón’s “Moonstone: the Boy Who Never Was”