FacebookTwitterGoogle+RedditEmail

Apple’s iPhone: the Backdoor Is Already There

by

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

Weekend Edition
August 26, 2016
Friday - Sunday
Paul Buhle
In the Shadow of the CIA: Liberalism’s Big Embarrassing Moment
Andrew Levine
How Donald Trump Can Still be a Hero: Force the Guardians of the Duopoly to Open Up the Debates
Rob Urie
Crisis and Opportunity
Louisa Willcox
The Unbearable Killing of Yellowstone’s Grizzlies: 2015 Shatters Records for Bear Deaths
Charles Pierson
Wedding Crashers Who Kill
Richard Moser
What is the Inside/Outside Strategy?
Dirk Bezemer – Michael Hudson
Finance is Not the Economy
Jeffrey St. Clair
Roaming Charges: Bernie’s Used Cars
Margaret Kimberley
Hillary and Colin: the War Criminal Charade
Patrick Cockburn
Turkey’s Foray into Syria: a Gamble in a Very Dangerous Game
Ishmael Reed
Birther Tries to Flim Flam Blacks  
Brian Terrell
What Makes a Hate Group?
Howard Lisnoff
Trouble in Political Paradise
Terry Tempest Williams
Will Our National Parks Survive the Next 100 Years?
Ben Debney
The Swimsuit that Overthrew the State
Ashley Smith
Anti-imperialism and the Syrian Revolution
Andrew Stewart
Did Gore Throw the 2000 Election?
Vincent Navarro
Is the Nation State and Its Welfare State Dead? a Critique of Varoufakis
John Wight
Syria’s Kurds and the Wages of Treachery
Lawrence Davidson
The New Anti-Semitism: the Case of Joy Karega
Mateo Pimentel
The Affordable Care Act: A Litmus Test for American Capitalism?
Roger Annis
In Northern Syria, Turkey Opens New Front in its War Against the Kurds
David Swanson
ABC Shifts Blame from US Wars to Doctors Without Borders
Norman Pollack
American Exceptionalism: A Pernicious Doctrine
Ralph Nader
Readers Think, Thinkers Read
Julia Morris
The Mythologies of the Nauruan Refugee Nation
George Wuerthner
Caving to Ranchers: the Misguided Decision to Kill the Profanity Wolf Pack
Ann Garrison
Unworthy Victims: Houthis and Hutus
Julian Vigo
Britain’s Slavery Legacy
John Stanton
Brzezinski Vision for a Power Sharing World Stymied by Ignorant Americans Leaders, Citizens
Philip Doe
Colorado: 300 Days of Sunshine Annually, Yet There’s No Sunny Side of the Street
Joseph White
Homage to EP Thompson
Dan Bacher
The Big Corporate Money Behind Jerry Brown
Kollibri terre Sonnenblume
DNC Playing Dirty Tricks on WikiLeaks
Ron Jacobs
Education for Liberation
Jim Smith
Socialism Revived: In Spite of Bernie, Donald and Hillary
David Macaray
Organized Labor’s Inferiority Complex
David Cortright
Alternatives to Military Intervention in Syria
Binoy Kampmark
The Terrors of Free Speech: Australia’s Racial Discrimination Act
Cesar Chelala
Guantánamo’s Quagmire
Nyla Ali Khan
Hoping Against Hope in Kashmir
William Hughes
From Sam Spade to the Red Scare: Dashiell Hammett’s War Against Rightwing Creeps
Raouf Halaby
Dear Barack Obama, Please Keep it at 3 for 3
Charles R. Larson
Review: Paulina Chiziane’s “The First Wife: a Tale of Polygamy”
David Yearsley
The Widow Bach: Anna Magdalena Rediscovered
FacebookTwitterGoogle+RedditEmail