Wednesday, January 1, 2014

iPhone Monitoring - Apple wants to know anything about NSA spying - Süddeutsche.de

news on Süddeutsche.de Digital

Süddeutsche.de to set as home page Note Do not show Close

2 January 2014 07:37

With the implant called “Dropoutjeep” the NSA could intercept the communications of iPhone users. Has Apple the intelligence built a back door? The Group objects.

The electronics giant Apple has rejected allegations, after which he had the U.S. NSA helped with the spying of its customers. The news magazine Der Spiegel and activist Jacob Appelbaum had seen a corresponding NSA document.

It describes the secret a built-in module for iPhones. With the implant called “Dropoutjeep” could be intercepted communication of the user. According to the document, the NSA took it initially physical access to the device itself, but wanted to work on methods for accessing remotely.

Therefore, the suspicion stirs that Apple needs to have the secret service enables access to devices prior to their sale. Appelbaum had on Monday raised the question during the presentation of the document to the Conference Chaos Communications Congress in Hamburg, if Apple worked with the NSA.


Involuntary helper of the NSA?

“Apple has never cooperated with the NSA, in order to create a back door in any of our products, the iPhone included,” it said in a statement the group. In 2008 was the very first generation iPhone on the market. The company Apple has until now nothing has been known by a NSA program, which was specifically Apple products in their sights. Apple said in his response also, you will continue to use the company’s resources in order to protect users against “malicious hackers” – no matter who those. According to previous reports, the NSA revelation also took smartphones with Android and BlackBerry software targeted.

As the mirror further reported on the basis of Snowden documents, the software giant Microsoft had become an involuntary helpers of the NSA. There is a special unit of the secret service, called “Tailored Access Operations”, short TAO, which consists entirely of hackers. This unit is specialized to take special target persons targeted, if it were a few hundred cases per year.

The unit should include the use crash reports, get to see the Windows users in a system crash and are frequently transferred to Microsoft. TAO start from these reports and conclude on the weaknesses in the computers of the target population. In a second step, the NSA hacker could then use this knowledge to infiltrate the computer. So Microsoft finally deliver them unknowingly guide to Microsoft customers can spy. However, this technique is only one of many methods of NSA hackers troops.

 
  • sending
  • Discuss
  • feedback to editors
  • copy short URL sz.de/1.1854294 http://sz.de/1.1854294

    URL is copied to the clipboard

  • copy short URL

    Please copy the URL manually.

    sz.de/1.1854294

source and Editor: SZ from 02.01.2014/ratz

Now most read on the home page


Schumacher’s doctor in Grenoble anger in his eyes

fünffilme3012 + jetzt.de Five Movies Kung leader and the last photo

At the end there is one more time a collection of our current favorite movies from the net: a short (last) Review, a wrong and a great trailer, student despair and Alltagsvoyeurismus. By Valerie Dewitt more … jetzt.de

Congress Weighs Action Against National Security Administration ( internet monitoring NSA peeks data cable from Europe to Asia

more …

  • News
  • Policy
  • Panorama
  • culture
  • Economy
  • Sport
  • Munich
  • Bavaria
  • Digital
  • car
  • travel
  • video
  • knowledge
  • money
  • life
  • style
  • Career
  • Education
  • media
  • health
  • Privacy
  • use based online advertising
  • Media
  • Newsletter
  • Conditions
  • Contact Us

Copyright © Süddeutsche Zeitung Digital Media GmbH / Süddeutsche Zeitung GmbH

article in the Süddeutsche Zeitung licensed by DIZ München GmbH. More licensing exclusively through

No comments:

Post a Comment