The National Security Agency (NSA) has apparently able to hack the iPhone since 2008, according to a Der Spiegel interactive report that looks at the NSA’s various tools used for spying purposes. One particularly interesting tool, codenamed “DROPOUTJEEP,” is an implant that was first used to compromise the first-generation iPhone and was able to send various data stored on the phone to the agency, including text messages, address book contacts, geolocation and voicemail. Furthermore, the software could activate the microphone of the iPhone, turn on the camera and take pictures and retrieve cell tower location.
All NSA-iPhone communications would be “covert and encrypted,” meaning that the target would likely be unaware of what’s going on. According to the document obtained by Der Spiegel, “command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.” Furthermore, the initial DROPOUTJEEP would “focus on installing the implant via close access methods” with remote installations to be “pursued for a future release.” The documents presented by the publication do not specify whether following iPhone models were similarly hacked by the agency.
However, the leaked materials show that the NSA had various other mobile-related spying “products” that worked with other smart devices:
- GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
- MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
- TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
- TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
- PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset
This article was originally published on BGR.com