" />

Apple doesn’t address how vulnerable its products are to CIA hacking in declaring WikiLeaks info outdated

Apple doesn’t address how vulnerable its products are to CIA hacking in declaring WikiLeaks info outdated

Apple does not address the real problem of how vulnerable its products are today after declaring that the latest CIA hacking documents release by WikiLeaks are outdated.

Apple reached out to TechCrunch on Thursday to declare that the WikiLeaks Vault 7 Dark Matter archives, which in part details how the CIA installed a tracking beacon named NightSkies in factory-fresh iPhones as far back as 2008, was outdated.

Read More: CIA physically installed NightSkies tracking beacon in factory-fresh iPhones: Assange

The burning question that is not addressed is how far has the CIA hacking methods progressed since 2008, and what capabilities does the spy agency have now?

In other words how vulnerable are Apple products to CIA infiltration today, nine years after the fact, and was Apple complicit in working with the CIA to install the NightSkies tracking beacon in its factory-fresh iPhones?

Apple’s full statement to TechCrunch reads:

We have preliminarily assessed the Wikileaks disclosures from this morning. Based on our initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released. Additionally, our preliminary assessment shows the alleged Mac vulnerabilities were previously fixed in all Macs launched after 2013.

We have not negotiated with Wikileaks for any information. We have given them instructions to submit any information they wish through our normal process under our standard terms. Thus far, we have not received any information from them that isn’t in the public domain. We are tireless defenders of our users’ security and privacy, but we do not condone theft or coordinate with those that threaten to harm our users.

How does Apple define “harm” in the above statement? How about “theft?” One can still spy one someone without stealing, and harm can have a whole range of connotations.

To give Apple the benefit of the doubt, it may have contracts with certain government agencies that do not allow the tech giant to disclose certain information as it may present a conflict of interests.

WikiLeaks reached out to major tech companies including Apple, Microsoft, Google, and Mozilla with an offer to provide information about cybersecurity vulnerabilities that could be exploited by intelligence agencies like the CIA.

Read More: Is Google’s hesitance on WikiLeaks’ cybersecurity offer due to a technicality or actual CIA involvement?

Not all of the companies responded immediately, but one WikiLeaks tweet gave the reason, “Most of these lagging companies have conflicts of interest due to their classified work for U.S. government agencies.”

On the other hand, Apple’s vague language in its statement to TechCrunch gives no mention that it is working to block CIA hacking infiltration.

According to WikiLeaks, the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

Furthermore, WikiLeaks uncovered the CIA hacking project “Sonic Screwdriver” — an infector that specifically attacked Apple’s Macintosh computers.

Sonic Screwdriver was a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled,” according to the Vault 7 Dark Matter archive.

Just because the information may be “outdated” doesn’t make it any less true. The CIA will continue to invent new ways to spy on whomever it wants and by any means it can. It is an animal all to itself that answers to nobody.

Even former President Harry Truman said the creation of the CIA was a mistake and that “those fellows in the CIA don’t just report on wars and the like, they go out and make their own, and there’s nobody to keep track of what they’re up to.”

Not all wars require bombs, troops, or guns.

The real issue that Apple hasn’t addressed is how vulnerable its products are to CIA hacking, and whether or not it has private contracts that prevent it from disclosing how close its relationship is with intelligence agencies.

Click to add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Tim Hinchliffe is a veteran journalist whose passions include writing about how technology impacts society and Artificial Intelligence. He prefers writing in-depth, interesting features that people actually want to read. Previously, he worked as a reporter for the Ghanaian Chronicle in West Africa, and Colombia Reports in South America. tim@sociable.co

More in Technology

pc design

The PC: a long overdue design revolution

Daniel SanchezAugust 18, 2017
ai medicine

The problems of using diagnostic AI in medicine and healthcare

Ben AllenAugust 18, 2017
virtual reality gaming

What we can expect from virtual reality gaming

Sam Brake GuiaAugust 17, 2017
babylon.js nat geo

Babylon.js: the engine powering Nat Geo’s VR Genius experiment that puts you inside the mind of Einstein

Tim HinchliffeAugust 17, 2017
ai dream

Scientists help AI dream new worlds, like taking a picture of a subconscious landscape

Daniel SanchezAugust 17, 2017
cryptocurrency value bitcoin

Bitcoin value based mostly on belief, trust in people behind cryptocurrency startups

Tim HinchliffeAugust 16, 2017
social bots fake news

Social bots and fake news: A reminder to protect your online brand

Zac LavalAugust 15, 2017
smartphone doctor hospital tech

Are smartphones the future of medicine?

Daniel SanchezAugust 15, 2017
Ada Lovelace: more than the world’s first computer programmer

Ada Lovelace: more than the world’s first computer programmer

Ben AllenAugust 14, 2017