Alli can say is READ THE ENTIRE LINKED ARTICLE then come here for the link to part 1 of the talk. I am providing links to part 1 and part 2 below.
Part 1: The militarization of the Internet
part 2: Remote Iphone Compromise
Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques”, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: “DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”
The flowchart of how the NSA makes your iPhone its iPhone is presented below:
NSA ROC operator
Load specified module
Send data request
iPhone accepts request
Retrieves required SIGINT data
Encrypt and send exfil data
via How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) | Zero Hedge.