FacebookTwitterRedditEmail

Apple’s iPhone: the Backdoor Is Already There

shutterstock_217604671 (1)

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Tim Cook protests that Apple is being asked to create “a new version of the iPhone operating system.” This glib talking point distracts attention from the reality that there’s essentially a backdoor on every new iPhone that ships around the world: the ability to load and execute modified firmware without user intervention.

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Update features, it would seem, are a bullseye for spies. And rightly so because they represent a novel way to quietly execute malicious software. This past September the Washington Post published a leaked memo from the White House which proposed that intelligence agencies leverage “provider-enabled remote access to encrypted devices through current update procedures.” Yep, the same update procedures that are marketed as helping to keep users safe. And it would appear that the spies are making progress. There’s news from Bloomberg of a secret memo that tasked spymasters with estimating the budgetary requirements needed to develop “encryption workarounds.”

And, finally, please notice throughout this whole ordeal how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage. After all, the NSA is well versed in the art of firmware-level manipulation. Experts have opined that for a few million (a drop in the bucket for a spy outfit like the NSA or CIA) this capability could be implemented. NSA whistleblower William Binney tends to agree. When asked what users could do to protect themselves from the Deep State’s prying eyes Binney replied:

“Use smoke signals! With NSA’s budget of over $10bill a year, they have more resources to acquire your data than you can ever hope to defend against.

This has to be addressed in law and legislation. Call your local governmental representative and complain, otherwise, if you sit and do nothing… you are fucked!!!”

So while Apple manufactures the perception that it’s fighting for user privacy, keep in mind that the media’s Manichean narrative of “good vs. evil” doesn’t necessarily explain what’s transpiring. Despite cheerleading by Ed Snowden and others Apple is not the company that it would have us believe it is. Apple has a long history of helping the government crack iPhones and security researchers have already unearthed any number of hidden services lurking below the iPhones surface.

The public record over the past several decades informs that ersatz public opposition often conceals private collusion. And Apple, dear reader, is no stranger when it comes to clandestine government programs. The sad truth is that government spies and corporate data hoarders assemble in the corridors of the American Deep State protected by a veil of official secrecy and sophisticated propaganda.

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

bernie-the-sandernistas-cover-344x550
Weekend Edition
August 23, 2019
Friday - Sunday
Paul Street
Notes on Inauthenticity in a Creeping Fascist Nuthouse
Andrew Levine
Recession Now, Please
Rob Urie
Mr. Trump Goes to Kensington
Jeffrey St. Clair
Deep Time and the Green River, Floating
Robert Hunziker
Earth 4C Hotter
Kenneth Good
Congo’s Patrice Lumumba: The Winds of Reaction in Africa
Pete Dolack
The Realism and Unrealism of the Green New Deals
David Rosen
The White-Nationalist Great Fear
Kenn Orphan
The War on Indigenous People is a War on the Biosphere Itself
L. Michael Hager
What Netanyahu’s Travel Ban Has Revealed
Ramzy Baroud
Jewish Settlers Rule the Roost in Israel, But at What Price?
Evaggelos Vallianatos
Is Environmental Protection Possible?
Josue De Luna Navarro
What It’s Like to Grow Up Hunted
Ralph Nader
They Don’t Make Republicans Like the Great Paul Findley Anymore!
Gary Olson
Whither the Resistance to our Capitalist Overlords?
Dean Baker
On Those Downward Jobs Revisions
Rev. William Alberts
Beware of the Gun-Lover-in-Chief
Helder F. do Vale
Brazil: From Global Leader to U.S. Lapdog
Laura Finley
Educators Actually Do “Work” in the Summer
Jim Goodman
Farmers Need a Bill of Rights
Tom Clifford
What China’s Leadership is Really Worried About: Rising Debt
Daphne Wysham
Saving the Planet Means Fighting Bipartisan Corruption
Tierra Curry
Amazon Fires Put the Planet at Risk
Nyla Ali Khan
Kashmir: Decentralize Power and Revive Regional Political Institutions
John W. Whitehead
American Apocalypse
George Wuerthner
How Agriculture and Ranching Subvert the Re-Wilding of America
Daniel Murphy
Capital in the 21st Century
Jessicah Pierre
400 Years After Slavery’s Start, No More Band-Aids
Kim C. Domenico
Finding the Comrades: Maintaining Precarious Sanity In Insane Times
Gary Leupp
“Based on the Fact She Won’t Sell Me Greenland, I’m Staying Home”
John Kendall Hawkins
The Chicago 8 Trial, Revisited
Rivera Sun
Tapping into People Power
Ted Rall
As Long as Enemies of the State Keep Dying Before Trial, No One Should Trust the State
Jesse Jackson
The Significance of the “1619 Project”
Thomas Knapp
“Nuance” in Politics and Public Policy? No Thanks
Christopher Brauchli
Trump and Endangered Species, Wildlife and Human
Mel Gurtov
China’s Hong Kong Nightmare, and the US Response
Ron Forthofer
Sick of Being a Guinea Pig
Nicky Reid
Why I Stopped Being White (and You Should Too)
Jill Richardson
As the School Year Starts, I’m Grateful for the ADA
Seth Sandronsky
Rethinking the GDR
Adolf Alzuphar
Tears / Ayizan Velekete
Stephen Cooper
General Jah Mikey: “I Just Love That Microphone, Man”
Louis Proyect
Slaves to the Clock
David Yearsley
Moral Cantatas
FacebookTwitterRedditEmail