FacebookTwitterGoogle+RedditEmail

Apple’s iPhone: the Backdoor Is Already There

by

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

Weekend Edition
January 20, 2017
Friday - Sunday
Paul Street
Divide and Rule: Class, Hate, and the 2016 Election
Andrew Levine
When Was America Great?
Jeffrey St. Clair
Roaming Charges: This Ain’t a Dream No More, It’s the Real Thing
Yoav Litvin
Making Israel Greater Again: Justice for Palestinians in the Age of Trump
Linda Pentz Gunter
Nuclear Fiddling While the Planet Burns
Ruth Fowler
Standing With Standing Rock: Of Pipelines and Protests
David Green
Why Trump Won: the 50 Percenters Have Spoken
Dave Lindorff
Imagining a Sanders Presidency Beginning on Jan. 20
Pete Dolack
Eight People Own as Much as Half the World
Roger Harris
Too Many People in the World: Names Named
Steve Horn
Under Tillerson, Exxon Maintained Ties with Saudi Arabia, Despite Dismal Human Rights Record
John Berger
The Nature of Mass Demonstrations
Stephen Zielinski
It’s the End of the World as We Know It
David Swanson
Six Things We Should Do Better As Everything Gets Worse
Alci Rengifo
Trump Rex: Ancient Rome’s Shadow Over the Oval Office
Brian Cloughley
What Money Can Buy: the Quiet British-Israeli Scandal
Mel Gurtov
Donald Trump’s Lies And Team Trump’s Headaches
Kent Paterson
Mexico’s Great Winter of Discontent
Norman Solomon
Trump, the Democrats and the Logan Act
David Macaray
Attention, Feminists
Yves Engler
Demanding More From Our Media
James A Haught
Religious Madness in Ulster
Dean Baker
The Economics of the Affordable Care Act
Patrick Bond
Tripping Up Trumpism Through Global Boycott Divestment Sanctions
Robert Fisk
How a Trump Presidency Could Have Been Avoided
Robert Fantina
Trump: What Changes and What Remains the Same
David Rosen
Globalization vs. Empire: Can Trump Contain the Growing Split?
Elliot Sperber
Dystopia
Dan Bacher
New CA Carbon Trading Legislation Answers Big Oil’s Call to Continue Business As Usual
Wayne Clark
A Reset Button for Political America
Chris Welzenbach
“The Death Ship:” An Allegory for Today’s World
Uri Avnery
Being There
Peter Lee
The Deep State and the Sex Tape: Martin Luther King, J. Edgar Hoover, and Thurgood Marshall
Patrick Hiller
Guns Against Grizzlies at Schools or Peace Education as Resistance?
Randy Shields
The Devil’s Real Estate Dictionary
Ron Jacobs
Singing the Body Electric Across Time
Ann Garrison
Fifty-five Years After Lumumba’s Assassination, Congolese See No Relief
Christopher Brauchli
Swing Low Alabama
Dr. Juan Gómez-Quiñones
La Realidad: the Realities of Anti-Mexicanism
Jon Hochschartner
The Five Least Animal-Friendly Senate Democrats
Pauline Murphy
Fighting Fascism: the Irish at the Battle of Cordoba
Susan Block
#GoBonobos in 2017: Happy Year of the Cock!
Louis Proyect
Is Our Future That of “Sense8” or “Mr. Robot”?
Charles R. Larson
Review: Robert Coover’s “Huck out West”
David Yearsley
Manchester-by-the-Sea and the Present Catastrophe
FacebookTwitterGoogle+RedditEmail