Australia Knew the NSA was Hacking iPhones

Australia Knew the NSA was Hacking iPhones

This post is also available in: heעברית (Hebrew)

Australian intelligence agencies may have had knowledge of a top secret U.S. NSA program for targeting iPhones, according to newly-released documents.

12257346_s featureSlides released recently by security researcher Jacob Appelbaum suggest there were plans to develop software called DropoutJeep to allow the NSA to remotely access text messages, photos, voice mail and live calls on the Apple devices. The slides say to install the software physical access to the phones would be needed, but flag the possibility of remote access in the future: “A remote installation capability will be pursued for future use.”

According to the Guardian the documents, which date to 2008, are classified as top secret but are cleared for release to “FVEY” – shorthand for the Five Eyes agreement to share intelligence between the U.S., Australian, New Zealand, Canadian and British governments.

The classification of the documents means that intelligence organisations such as the Australian Signals Directorate, which maintains a close relationship with the NSA, could have knowledge of the program.

iHLS – Israel Homeland Security

The Attorney-General’s Department said: “The Australian government doesn’t comment on intelligence matters. However our intelligence agencies operate under a strong legal and oversight framework to protect Australia. We work with the intelligence agencies of our closest partners because we are facing common threats, such as terrorism. We are committed to maintaining these relationships.”

Apple has denied it had any knowledge of the tool, and said: “Apple has never worked with the NSA to create a back door in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security.”

Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.”