Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple's iOS blocks gov't spying efforts, Gamma's FinSpy useless against iPhone
ZD Net ^ | August 12, 2014 -- 12:36 GMT | By Charlie Osborne

Posted on 08/13/2014 3:41:56 PM PDT by Swordmaker

While Android phones are constantly targeted by cybercriminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

As spotted by the Washington Post, a leaked document from Gamma Group, a secretive seller of surveillance tools, emerged on the Internet last week. Hosted on Netzpolitik, the document (.PDF) reveals interesting information concerning Gamma Groups' extensive range of surveillance tools, but in particular, notes that the iPhone is notoriously difficult to infiltrate -- the only exception being when a user has jailbroken their device.

A particular piece of software is called FinSpy. According to Gamma Groups' FinSpy software specifications hosted by Wikileaks, the spyware can be used to monitor Skype conversations, take screenshots and photos using a device's camera, record microphone use, emails, voice-over-IP and extract files from hard discs. FinSpy can be controlled remotely as soon as the compromised device is connected to the Internet.

Source: Wikileaks According to the latest Gamma Group document leak, while FinSpy has the capabilities to infiltrate Android, Blackberry, and older Microsoft handsets, iPhones are out of reach unless the device's core security protocols have changed through jailbreaking.

Dated April 2014, the document states that the spyware "is designed to help law enforcement and intelligence agencies to remotely monitor mobile phones and tablet devices," and get full access to calls, SMS, MMS, address books and make silent calls to remotely listen to microphones. If a user of FinSpy wishes to infiltrate a phone, the support details are as below:

An iPhone user can jailbreak their device using a number of free tools, and by doing so, they gain root access which the iOS operating system does not allow by default. Doing so allows for unsigned apps to run and heavy customisation of the OS -- something Android allows as an open-source, free ecosystem -- but if unsigned code is permitted to run, then this provides a channel for tools such as FinSpy to enter.

Last year, researchers from The Citizen Lab said the spyware had been discovered in use by 25 countries, including being linked to the monitoring of dissidents in Bahrain. While developed by Gamma Group in Munich, Germany and sold through a UK subsidiary as a law enforcement tool, it is also believed to be used to target opposition groups and activists by governments worldwide.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; ios

1 posted on 08/13/2014 3:41:56 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Major supplier of the software to do snoop on mobile devices says iOS blocks black hats and government snoopers from breaking in. . . —PING!


Apple iOS security Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 08/13/2014 3:47:28 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Sweet!


3 posted on 08/13/2014 6:57:55 PM PDT by House Atreides (ANOTHER CONSERVATIVE REPUBLICAN FOR CHILDERS 2014 .... Don't reward bad GOPe behavior.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: House Atreides
This might be to the point:

World's most secore Android Phone, the Blackphone, hacked in under five minutes

4 posted on 08/13/2014 7:13:20 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

It took a lot longer than 5 minutes and it required:
- having physical access to the phone
- connecting the phone to a computer in developer mode
- disabling several security features

You can read more about it on ArsTechnica. It was not a remote hack at all, and it would be virtually impossible to replicate without someone physically giving you their phone. (But it sounds much more catchy to run a sensational headline, not do any fact checking with either the company who makes the phone, or the man who did the hack.)

That said, I’m still glad to be an iPhone user.


5 posted on 08/13/2014 8:38:52 PM PDT by Shery
[ Post Reply | Private Reply | To 4 | View Replies]

To: Shery
It took a lot longer than 5 minutes and it required:
- having physical access to the phone
- connecting the phone to a computer in developer mode
- disabling several security features

Thanks for the more complete information. More information also claims that the security vulnerability has been closed already. Good.

6 posted on 08/14/2014 12:52:49 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker
Major supplier of the software to do snoop on mobile devices says iOS blocks black hats and government snoopers from breaking in. . .

Of course, that's what they WANT you to think.

7 posted on 08/14/2014 10:16:36 AM PDT by kevkrom (I'm not an unreasonable man... well, actually, I am. But hear me out anyway.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker; AdmSmith; AnonymousConservative; Berosus; bigheadfred; Bockscar; cardinal4; ColdOne; ...

Thanks Swordmaker.


8 posted on 08/14/2014 8:20:54 PM PDT by SunkenCiv (https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson