{"id":6420,"date":"2015-03-11T06:10:24","date_gmt":"2015-03-11T11:10:24","guid":{"rendered":"http:\/\/olduvai.ca\/?p=6420"},"modified":"2015-03-11T06:10:24","modified_gmt":"2015-03-11T11:10:24","slug":"the-cia-campaign-to-steal-apples-secrets","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=6420","title":{"rendered":"THE CIA CAMPAIGN TO STEAL APPLE\u2019S SECRETS"},"content":{"rendered":"<h3 class=\"title\"><a href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\" target=\"_blank\">THE CIA CAMPAIGN TO STEAL APPLE\u2019S SECRETS<\/a><\/h3>\n<p><strong><span class=\"dropcap\">R<\/span>ESEARCHERS WORKING<\/strong>\u00a0with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple\u2019s iPhones and iPads, according to\u00a0<a href=\"https:\/\/firstlook.org\/theintercept\/document\/2015\/03\/10\/tcb-jamboree-2012-invitation\/\">top-secret documents<\/a>\u00a0obtained by<em>The Intercept<\/em>.<\/p>\n<p>The security researchers presented their latest tactics and achievements at a secret annual gathering, called the \u201cJamboree,\u201d where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.<\/p>\n<p>By targeting essential security keys used to encrypt data stored on Apple\u2019s devices, the researchers have sought to thwart the company\u2019s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both \u201cphysical\u201d and \u201cnon-invasive\u201d techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple\u2019s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.<\/p>\n<p>The CIA declined to comment for this story.<\/p>\n<p>The security researchers also claimed they had created a modified version of Apple\u2019s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple\u2019s App Store.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8230;click on the above link to read the rest of the article&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>THE CIA CAMPAIGN TO STEAL APPLE\u2019S SECRETS RESEARCHERS WORKING\u00a0with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple\u2019s iPhones and iPads, according to\u00a0top-secret documents\u00a0obtained byThe Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the \u201cJamboree,\u201d where attendees discussed strategies for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[29,4102,135,3974,261,3608,710,746,765],"class_list":["post-6420","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-apple","tag-central-intelligence-agency","tag-cia","tag-decryption","tag-encryption","tag-firmware","tag-secrecy","tag-spying","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/6420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6420"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/6420\/revisions"}],"predecessor-version":[{"id":6421,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/6420\/revisions\/6421"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}