Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

CIA Worked to Break Apple Encryption: Report

The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

Investigative news site The Intercept, citing leaked secret documents, said the effort began in 2006 as Apple was preparing to launch its first iPhone.

The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

Investigative news site The Intercept, citing leaked secret documents, said the effort began in 2006 as Apple was preparing to launch its first iPhone.

The report said the researchers were based at Sandia National Laboratories and presented their findings at a secret CIA conference, according to documents leaked by former National Security Agency contractor Edward Snowden.

The research is consistent with a broader US government program to analyze secure communications and break encryption, using a “black budget,” as outlined in earlier documents leaked by Snowden.

The report would mean US intelligence services may be able to tap into what has been believed to be secure communications using Apple mobile devices.

Neither Apple not the CIA responded to an AFP request for comment.

Apple and Google both announced last year they were hardening their encryption on devices powered by their mobile software, which would not even give the companies access. That would prevent the government from gaining access even with a legal warrant.

According to The Intercept, the security researchers sought access to the keys used to encrypt data stored on Apple’s devices. They aimed to get into the built-in “firmware” to gain secret access, according to the report.

Advertisement. Scroll to continue reading.

The documents did not reveal how successful the spy efforts were but they suggest a long effort to thwart encryption to keep data private.

The report said NSA personnel also participated in the 2012 conference where findings were presented.

US officials have in the past said intelligence efforts are aimed at thwarting terror plots, and that privacy safeguards are in place for US nationals.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.