How the NSA Can Get Onto Your iPhone

Share:
ILLUSTRATION - Eine Frau telefoniert am 16.12.2013 in Dresden (Sachsen) mit ihrem Mobiltelefon und wirft dabei einen Schatten auf eine Wand. In einer Pressekonferenz wurde der 16. Tätigkeitsbericht für den öffentlichen und nicht-öffentlichen Bereich vorgestellt.

Photo by: Arno Burgi/picture-alliance/dpa/AP Images

May 21, 2014

The Snowden leaks have given security experts a look into the NSA’s techniques in a way they could only have previously dreamed about.

But it’s often difficult to understand, from their jargon-filled technical specifications pages exactly what the agency is capable of.

We asked security expert Ashkan Soltani to break down the leaked document about the NSA’s DROPOUTJEEP program, which describes the agency’s ability to infiltrate the Apple iPhone.

According to the leaked documents, which were first revealed by Der Spiegel, this program was in development as of 2007 and would allow the NSA to remotely take over any iPhone it chose to target.

It’s unclear whether the program exists in the same form or whether it’s been updated or even abandoned. Apple says it was unaware of the program.


More Stories

Exclusive: Iran Won't Allow Nuclear Inspections if Sanctions Are Reimposed, Says Iran’s Chief Nuclear Negotiator
In an exclusive interview with FRONTLINE, Iran’s chief nuclear negotiator said the country will end its participation in international weapons inspections if sanctions are reimposed.
September 26, 2025
9/11, More Than 20 Years Later: 20 Essential Documentaries to Watch
These films, selected from more than two decades of extensive FRONTLINE reporting, probe that fateful day and its lasting impacts on America and the world.
September 5, 2025
Watch FRONTLINE’s 5 Most-Streamed Documentaries of 2025 (So Far)
Looking for some documentaries to watch as summer continues? We’ve got you covered.
August 6, 2025