The Register® — Biting the hand that feeds IT

Feeds

NSA slides reveal: iPhone users are all ZOMBIES

OK, not literally. Plus: Our favourite spooks show us how to hack an iPhone – report

Free ESG report : Seamless data management with Avere FXT

Spooks at the US National Security Agency (NSA) can't believe we're all paying for the equipment it's using to spy on us, describing Steve Jobs as Big Brother and iPhone buyers as "zombies".

That assertion comes from NSA documents leaked to Germany's Spiegel Online.

The self-promoting presentation, purportedly an internal NSA report from 2010 titled "Exploring Current Trends, Targets and Techniques", includes a number of slides presenting snapshots of grinning iPhone-brandishing customers as analogous to the "zombies" brainwashed by Big Brother – in a reference to George Orwell's Nineteen Eighty-Four.

The argument is backed up with selfies taken by a (foreign) government official (apparently on his couch at home in front of the TV) and lifted from his iPhone.

A slide from a second presentation, "Your target is using a BlackBerry? Now what?", then presents details of how best to attack the hitherto invulnerable Canadian smartphone platform.

The fact that the NSA has teams cracking mobile operating systems should surprise no one: these people are paid to spy so it would be disingenuous to attack them for it, but the details of their progress should interest anyone who has wondered just how secure our communications are should a government decide to start looking.

Almost all communications go through a server of some sort, and in the normal run of things the authorities just sequester that server. Tapping phone calls or messages is much easier at the server, and most countries have lawful intercept legislation which permits this with some from of judicial oversight. The United States' NSA has the provision to work outside national borders, however, so it might need to take a less public approach.

How to hack an iPhone

When it comes to an iPhone, the best approach, according to the documents seen by Spiegel Online, is hacking the computer to which it is connected. Synchronised data is a lot easier to attack, lacking the hardware protection available on mobile platforms, so get into their PC, lift the data and perhaps even subvert the iPhone from there.

For intercepting BlackBerry communications, where the Blackberry Enterprise Server is beyond reach, the NSA apparently had an attack which could "see and read SMS traffic" until 2009, but were then stymied by an update from RIM. That left them in the dark until the UK's GCHQ apparently came to the rescue a year later with an attack which regained access to that data, but BlackBerry email still requires "sustained" operation from the specialist "Tailored Access Operation" to break the encryption.

Many attacks seem to depend on getting users to open attachments or visit dodgy websites, vectors of attack well known in the security business. The NSA presentation calls this "Nomophobia", or "no phone phobia", as mobile users haven't yet learnt to worry about their security.

GSM and CDMA are both listed as being broken, though it's not clear if nomophobia is the mechanism of attack. Even if it isn't it's not very shocking; GSM has very strong encryption covering authentication, making it hard to spoof a call, but the session keys used to encrypt normal conversations have previously proved vulnerable.

Windows Phone users... security through obscurity

But what's really surprising is the lack of information on Android or Windows Phone, which should be of interest given the presentation asserts that Nokia is the extremists' platform of preference, with Apple coming in third and BlackBerry in ninth - almost as though the NSA was more interested in listening to foreign diplomats than terrorist cells.

That might not be it – perhaps Android is so insecure it's not worth mentioning, or the extremists are big fans of the Asha range, or perhaps that session was in the afternoon and Spiegel Online's source only attended in the morning, but either way it seems that if the NSA wants to know everything you see and hear then it probably will. ®

Supercharge your infrastructure

Whitepapers

5 ways to reduce advertising network latency
Implementing the tactics laid out in this whitepaper can help reduce your overall advertising network latency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: 4 steps to get more email to the inbox
This whitepaper lists some steps and information that will give you the best opportunity to achieve an amazing sender reputation.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.

More from The Register

next story
EU move to standardise phone chargers is bad news for Apple
Faster than a speeding glacier but still more powerful than Lightning
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
Great Britain rebuilt - in Minecraft: Intern reveals 22-BEEELLION block map
Cunning Ordnance Survey bod spent the summer bricking it
Google's boffins branded 'unacceptably ineffective' at tackling web piracy
'Not beyond wit' to block rip-offs say MPs demanding copyright safeguards
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
Michael Gove: C'mon kids, quit sexting – send love poems instead
S.W.A.L.K.: Education secretary plugs mate's app
Report says PRISM snooped on India's space, nuclear programs
New Snowden doc details extensive NSA surveillance of 'ally' India
Highways Agency tracks Brits' every move by their mobes: THE TRUTH
We better go back to just scanning everyone's number-plates, then?
The target: 25% of UK gov IT from small biz... The reality: Not even close
Proud mandarins ignoring Cabinet Office's master plan, note MPs
US House Republicans: 'End net neutrality or no debt ceiling deal' – report
Leaked document reveals a shedload of anti-Obama demands
prev story