[cryptome] Re: How the NSA Could Bug Your Powered-Off iPhone, and How to Stop Them

  • From: Neal Lamb <nl1816a@xxxxxxxxxxxxx>
  • To: "cryptome@xxxxxxxxxxxxx" <cryptome@xxxxxxxxxxxxx>
  • Date: Tue, 10 Jun 2014 08:07:29 -0700 (PDT)


On Tuesday, June 10, 2014 9:25 AM, Shaun O'Connor <capricorn8159@xxxxxxxxx> 

that is a deliberate design policy form the get go. obviously on advice from 
people wanting easy access to private conversations without the knowledge or 
consent of the end user. have you noticed how products with obviously intrusive 
potential are marketed as "cool" gadgets?
I believe Samsung developed a "smart" TV with a built in camera and
    listening capability which enabled advertisers to send targeted
    material based on ambient environmental input from the tv.
Now here is the twist, by  manufacturers marketing products in this
    way the NSA have a neat response they can argue that the user
    consented to the intrusive capability by purchasing said items. of
    course what the unwary buyer didnt know was the NSA most likely
    inserted backdoors into the TV sets so they could literally be
    sharing your living room space albeit remotely. 
nice trick no intercept warrant required.

now turning attention to the BBC that paragon of impartiality(
    cough, splutter, choke). ever wondered why they do not file a patent
    for their  TV  detection technology?
Apparently the law abiding licence paying public are not entitled to
    know how this little piece of wizardly works.
what's the betting that Aunty Beeb is  an arm of the GCHQ trawling

of course I am being speculative but..the BBC do seem to be
    secretive about their MO when it comes to licence enforcement.

On 10/06/2014 14:27, Joe Products wrote:

Btw. did you noticed that you cannot remove battery in the new phones? Phone 
can play dead and pretty easily sucks battery. 
>Magic. Happening.
>In your pocket.
>---------- Původní zpráva ----------
>Od: Jeremy Compton <j.compton@xxxxxxxxxxx>
>Komu: cryptome@xxxxxxxxxxxxx <cryptome@xxxxxxxxxxxxx>
>Datum: 10. 6. 2014 15:10:28
>Předmět: [cryptome] How the NSA Could Bug Your Powered-Off
          iPhone, and How to Stop Them
>How the NSA Could Bug Your Powered-Off iPhone, and How to Stop Them
>>Whilst we are talking about this and Snowden talked about
              it. He basically said that if this same organisation
              wanted to they could have your phone. Or words to that
              effect. Not my words. I think the old advice was pull the
              battery and the sim card.
>>      * By Andy Greenberg  
>>      * 06.03.14  |  
>>      * 6:30 am  |  
>>      * Permalink
>>      * 
Just because you turned off your phone doesn’t mean the NSA isn’t using it to 
spy on you.
>>Edward Snowden’s latest revelation about the NSA’s
              snooping inspired an extra dose of shock and disbelief
              when he said the agency’s hackers can use a mobile phone
              as a bug even after it’s been turned off. The
              whistleblower made that eye-opening claim when Brian
              Williams of NBC Nightly News, holding his iPhone aloft
              during last Wednesday’s interview, asked, “What can the NSA do 
with this device if they want to get into my life? Can anyone turn it on 
remotely if it’s off? Can they turn on apps?
>>“They can absolutely turn them on with the power turned
              off to the device,” Snowden replied.
>>Snowden didn’t offer any details on this seemingly magical
              feat. But a
              group of particularly cunning iPhone hackers say it’s
              possible. They also say you can totally and completely
              turn off your iPhone so no one—not even the NSA—can use it
              to spy on you.
>>Your Phone Is Playing Dead
Like any magic trick, the most plausible method of eavesdropping through a 
switched-off phone starts with an illusion. Security researchers posit that if 
an attacker has a chance to install malware before you shut down your phone, 
that software could make the phone look like it’s shutting down—complete with a 
fake “slide to power off” screen. Instead of powering down, it enters a 
low-power mode that leaves its baseband chip—which controls communication with 
the carrier—on.
>>This “playing dead” state would allow the phone to receive
              commands, including one to activate its microphone, says
              Eric McDonald, a hardware
              engineer in Los Angeles. McDonald is also a member of the
              Evad3rs, a team of iPhone hackers who created jailbreaks
              for the two previous iPhone operating systems. If the NSA
              used an exploit like those McDonald’s worked on to infect
              phone with malware that fakes a shutdown,
              “the screen would look black and nothing would happen if
              you pressed buttons,” he says. “But it’s conceivable that
              the baseband is still on, or turns on periodically. And it
              would be very difficult to know whether
              the phone has been compromised.” (Excerpt)


Other related posts: