FacebookTwitterGoogle+RedditEmail

Apple’s iPhone: the Backdoor Is Already There

by

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

Weekend Edition
December 02, 2016
Friday - Sunday
John Pilger
The Coming War on China
Jeffrey St. Clair
Roaming Charges: The CIA’s Plots to Kill Castro
Paul Street
The Iron Heel at Home: Force Matters
Pam Martens - Russ Martens
Timberg’s Tale: Washington Post Reporter Spreads Blacklist of Independent Journalist Sites
Andrew Levine
Must We Now Rethink the Hillary Question? Absolutely, Not
Joshua Frank
CounterPunch as Russian Propagandists: the Washington Post’s Shallow Smear
David Rosen
The Return of HUAC?
Rob Urie
Race and Class in Trump’s America
Patrick Cockburn
Why Everything You’ve Read About Syria and Iraq Could be Wrong
Caroline Hurley
Anatomy of a Nationalist
Ayesha Khan
A Muslim Woman’s Reflections on Trump’s Misogyny
Michael Hudson – Steve Keen
Rebel Economists on the Historical Path to a Global Recovery
Russell Mokhiber
Sanders Single Payer and Death by Democrat
Roger Harris
The Triumph of Trump and the Specter of Fascism
Steve Horn
Donald Trump’s Swamp: Meet Ten Potential Energy and Climate Cabinet Picks and the Pickers
Louis Proyect
Deepening Contradictions: Identity Politics and Steelworkers
Ralph Nader
Trump and His Betraying Makeover
Stephen Kimber
The Media’s Abysmal Coverage of Castro’s Death
Dan Bacher
WSPA: The West’s Most Powerful Corporate Lobbying Group
Nile Bowie
Will Trump backpedal on the Trans-Pacific Partnership?
Ron Ridenour
Fidel’s Death Brings Forth Great and Sad Memories
Missy Comley Beattie
By Invitation Only
Fred Gardner
Sword of Damocles: Pot Partisans Fear Trump’s DOJ
Renee Parsons
Obama and Propornot
Dean Baker
Cash and Carrier: Trump and Pence Put on a Show
Jack Rasmus
Taming Trump: From Faux Left to Faux Right Populism
Ron Jacobs
Selling Racism—A Lesson From Pretoria
Julian Vigo
The Hijos of Buenos Aires:  When Identity is Political
Subcomandante Insurgente Galeano
By Way of Prologue: On How We Arrived at the Watchtower and What We Saw from There
Dave Lindorff
Is Trump’s Idea To Fix the ‘Rigged System’ by Appointing Crooks Who’ve Played It?
Aidan O'Brien
Fidel and Spain: A Tale of Right and Wrong
Carol Dansereau
Stop Groveling! How to Thwart Trump and Save the World
Kim Nicolini
Moonlight, The Movie
Evan Jones
Behind GE’s Takeover of Alstom Energy
James A Haught
White Evangelicals are Fading, Powerful, Baffling
Barbara Moroncini
Protests and Their Others
Joseph Natoli
The Winds at Their Backs
Cesar Chelala
Poverty is Not Only an Ignored Word
David Swanson
75 Years of Pearl Harbor Lies
Alex Jensen
The Great Deceleration
Nyla Ali Khan
When Faith is the Legacy of One’s Upbringing
Gilbert Mercier
Trump Win: Paradigm Shift or Status Quo?
Stephen Martin
From ‘Too Big to Fail’ to ‘Too Big to Lie’: the End Game of Corporatist Globalization.
Charles R. Larson
Review: Emma Jane Kirby’s “The Optician of Lampedusa”
David Yearsley
Haydn Seek With Hsu
FacebookTwitterGoogle+RedditEmail