FacebookTwitterGoogle+RedditEmail

Apple’s iPhone: the Backdoor Is Already There

by

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

February 27, 2017
Anthony DiMaggio
Media Ban! Making Sense of the War Between Trump and the Press
Dave Lindorff
Resume Inflation at the NSC: Lt. General McMaster’s Silver Star Was Essentially Earned for Target Practice
Conn Hallinan
Is Trump Moderating US Foreign Policy? Hardly
Norman Pollack
Political Castration of State: Militarization of Government
Kenneth Surin
Inside Dharavi, a Mumbai Slum
Lawrence Davidson
Truth vs. Trump
Binoy Kampmark
The Extradition Saga of Kim Dotcom
Robert Fisk
Why a Victory Over ISIS in Mosul Might Spell Defeat in Deir Ezzor
David Swanson
Open Guantanamo!
Ted Rall
The Republicans May Impeach Trump
Lawrence Wittner
Why Should Trump―or Anyone―Be Able to Launch a Nuclear War?
Andrew Stewart
Down with Obamacare, Up with Single Payer!
Colin Todhunter
Message to John Beddington and the Oxford Martin Commission
David Macaray
UFOs: The Myth That Won’t Die?
Weekend Edition
February 24, 2017
Friday - Sunday
Jeffrey St. Clair
Roaming Charges: Exxon’s End Game Theory
Pierre M. Sprey - Franklin “Chuck” Spinney
Sleepwalking Into a Nuclear Arms Race with Russia
Paul Street
Liberal Hypocrisy, “Late-Shaming,” and Russia-Blaming in the Age of Trump
Ajamu Baraka
Malcolm X and Human Rights in the Time of Trumpism: Transcending the Master’s Tools
John Laforge
Did Obama Pave the Way for More Torture?
Mike Whitney
McMaster Takes Charge: Trump Relinquishes Control of Foreign Policy 
Patrick Cockburn
The Coming Decline of US and UK Power
Louisa Willcox
The Endangered Species Act: a Critical Safety Net Now Threatened by Congress and Trump
Vijay Prashad
A Foreign Policy of Cruel Populism
John Chuckman
Israel’s Terrible Problem: Two States or One?
Matthew Stevenson
The Parallax View of Donald Trump
Norman Pollack
Drumbeat of Fascism: Find, Arrest, Deport
Stan Cox
Can the Climate Survive Electoral Democracy? Maybe. Can It Survive Capitalism? No.
Ramzy Baroud
The Trump-Netanyahu Circus: Now, No One Can Save Israel from Itself
Edward Hunt
The United States of Permanent War
David Morgan
Trump and the Left: a Case of Mass Hysteria?
Pete Dolack
The Bait and Switch of Public-Private Partnerships
Mike Miller
What Kind of Movement Moment Are We In? 
Elliot Sperber
Why Resistance is Insufficient
Brian Cloughley
What are You Going to Do About Afghanistan, President Trump?
Binoy Kampmark
Warring in the Oncology Ward
Yves Engler
Remembering the Coup in Ghana
Jeremy Brecher
“Climate Kids” v. Trump: Trial of the Century Pits Trump Climate Denialism Against Right to a Climate System Capable of Sustaining Human Life”
Jonathan Taylor
Hate Trump? You Should Have Voted for Ron Paul
Franklin Lamb
Another Small Step for Syrian Refugee Children in Beirut’s “Aleppo Park”
Ron Jacobs
The Realist: Irreverence Was Their Only Sacred Cow
Andre Vltchek
Lock up England in Jail or an Insane Asylum!
Rev. William Alberts
Grandiose Marketing of Spirituality
Paul DeRienzo
Three Years Since the Kitty Litter Disaster at Waste Isolation Pilot Plant
Eric Sommer
Organize Workers Immigrant Defense Committees!
Steve Cooper
A Progressive Agenda
FacebookTwitterGoogle+RedditEmail