WikiLeaks: CIA Takes Over Your Phone “Factory Fresh” Before You Receive It
March 23, 2017
Wikileaks today continued its Vault 7 leaks exposing the CIA.
It turns out that the CIA has had a tool called “NightSkies” since 2008.
NightSkies, according to the latest leak, is “expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.”
As we’ve reported previously, virtually nobody with a mobile device can keep information private now. The only way to achieve even limited privacy would be to not have a phone or use a physical Faraday barrier to block the phone’s EMF at key times.
Shutting the phone off is not a solution since the phone still emits signals in baseband, and the same goes for “airplane mode.” Using apps that encrypt your communication is also not a solution because hackers can bypass the apps by penetrating the phone’s OS itself.
However, since hackers still must depend on EMF to transmit your information back to their databases, physically blocking EMF is one way to protect yourself. The advantage of a Faraday shield is that it is scientifically proven to work and it will create a hard block against the EMF hackers depend on. Tunnel is the best shield available as it relies on copper, the same metal that agencies themselves use to guard their own data.
That said, a physical shield must be used strategically. If you are not savvy enough to use physical shielding at critical times, it’s probably not for you, in which case the other options are to either get rid of the phone or accept being monitored.
What follows is the full press release from WikiLeaks:
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB).
These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”.
The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release.
While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone.
Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
You might also like
Jake Anderson | The Anti-Media (ANTIMEDIA) It seems DARPA, the ultra-secretive military research agency, may be getting a run for its money when it comes to developing advanced and alarming forms
The essence of propaganda is not to make you believe some proposition, but to make you believe that everybody else believes that proposition. Internet denizens have alleged
by RT US sci-tech contractor Battelle has developed a revolutionary gun that can target and stop UAVs dead at a range of just 400 meters using radio signals. It expects
John Vibes | True Activist This week, a 29-year old German man was arrested at Frankfurt Airport after police noticed that he had microwaved his ID to disable the microchip
Kristen Gelineau | Courthouse News Service A powerful X-ray technique has unveiled a hidden portrait beneath a famed painting by French impressionist artist Edgar Degas, helping solve a mystery that
AUGUSTA, Maine — A victim in need of a kidney donation may not receive the aid he needs now, after if was discovered that he uses medicinal cannabis. Garry Godfrey
We are only a few hours into the release of #Vault7 and already there are scandals that may fundamentally restructure the political foundations of our nation. Among them is the
March 16, 2017 WASHINGTON, DC – Americans were alarmed to learn last week that the CIA can remotely activate the cameras and microphones on smartphones and televisions to watch them
WASHINGTON, DC | March 9, 2017 State spying used to be called a “conspiracy theory,” but after the release of Vault 7, only the most naive would continue denying its reality. The