Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jesus Malverde

(10,274 posts)
Mon Dec 30, 2013, 05:48 PM Dec 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency's 50 page catalog of "backdoor penetration techniques", today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."


4 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) (Original Post) Jesus Malverde Dec 2013 OP
I understood almost nothing of what he was saying. zeemike Dec 2013 #1
Consider that all of this is used for "Parallel Construction" bobduca Dec 2013 #2
+10000000 woo me with science Dec 2013 #3
Corporate fascism. nt woo me with science Dec 2013 #4


(18,998 posts)
1. I understood almost nothing of what he was saying.
Mon Dec 30, 2013, 09:27 PM
Dec 2013

Except the effects of all of this crap....it is total information awareness, just like they told us.
And they have been doing it for 15 years now.
No doubt in my mind they have all the dirt on all the politicians in the world and own everyone of them.
I can't believe I watched the whole thing with my very limited knowledge of computers but I was transfixed by what he was telling us...
Thanks for posting this and K&R.


(1,763 posts)
2. Consider that all of this is used for "Parallel Construction"
Mon Dec 30, 2013, 10:24 PM
Dec 2013

NSA has created an automated target system to carry out mass exploits at scale.

... which means this information is also shared at-scale with Law enforcement under something known as "Parallel Construction"


"Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept."

A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.

"It's just like laundering money - you work it backwards to make it clean," said Finn Selander, a DEA agent from 1991 to 2008 and now a member of a group called Law Enforcement Against Prohibition, which advocates legalizing and regulating narcotics.

Some defense lawyers and former prosecutors said that using "parallel construction" may be legal to establish probable cause for an arrest. But they said employing the practice as a means of disguising how an investigation began may violate pretrial discovery rules by burying evidence that could prove useful to criminal defendants.

Latest Discussions»General Discussion»How The NSA Hacks Your iP...