How the NSA Can Get Onto Your iPhone

/
May 21, 2014
/
by Evan Wexler

Photo by: Arno Burgi/picture-alliance/dpa/AP Images

The Snowden leaks have given security experts a look into the NSA’s techniques in a way they could only have previously dreamed about.

But it’s often difficult to understand, from their jargon-filled technical specifications pages exactly what the agency is capable of.

We asked security expert Ashkan Soltani to break down the leaked document about the NSA’s DROPOUTJEEP program, which describes the agency’s ability to infiltrate the Apple iPhone.

According to the leaked documents, which were first revealed by Der Spiegel, this program was in development as of 2007 and would allow the NSA to remotely take over any iPhone it chose to target.

It’s unclear whether the program exists in the same form or whether it’s been updated or even abandoned. Apple says it was unaware of the program.

In order to foster a civil and literate discussion that respects all participants, FRONTLINE has the following guidelines for commentary. By submitting comments here, you are consenting to these rules:

Readers' comments that include profanity, obscenity, personal attacks, harassment, or are defamatory, sexist, racist, violate a third party's right to privacy, or are otherwise inappropriate, will be removed. Entries that are unsigned or are "signed" by someone other than the actual author will be removed. We reserve the right to not post comments that are more than 400 words. We will take steps to block users who repeatedly violate our commenting rules, terms of use, or privacy policies. You are fully responsible for your comments.

blog comments powered by Disqus
Support Provided By