Snowden: iPhones Have Secret Spyware That Lets Govt’s Monitor Unsuspecting Users
The NSA whistleblower’s lawyer says the secret software can be remotely activated to watch the user.
Jan 21, 2015 – The iPhone has secret spyware that lets governments watch users without their knowledge, according to Edward Snowden.
The NSA whistleblower doesn’t use a phone because of the secret software, which Snowden’s lawyer says can be remotely activated to watch the user.
“Edward never uses an iPhone, he’s got a simple phone,” Anatoly Kucherena told Russian news agency RIA Novosti. “The iPhone has special software that can activate itself without the owner having to press a button and gather information about him, that’s why on security grounds he refused to have this phone.”
Apple has been active in making the iPhone harder for security services to spy on, and the company said that iOS 8 made it impossible for law enforcement to extract users’ personal data, even if they have a warrant. The company has also been active in campaigning for privacy reform after the Snowden revelations,joining with Facebook and Google to call for changes to the law.
But recently published files from the NSA showed that British agency GCHQ used the phones UDIDs — the unique identifier that each iPhone has — to track users. While there doesn’t seem to be any mention of such spying software in any of the revelations so far, a range of documents are thought to be still unpublished.
Snowden opts not to use the phone for professional reasons, but Kucherena said that whether or not to use one was a personal choice, Sputnik News reported.
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
- Managing AI Risks in an Era of Rapid Progress
- The Traits That Make Us Human
- The AI Conundrum: The Peace Movement’s Next Big Challenge