Olduvaiblog: Musings on the coming collapse

Home » Posts tagged 'DROPOUTJEEP'

Tag Archives: DROPOUTJEEP

Activist Post: It’s not just your phone calls – it’s YOU they are listening to

Activist Post: It’s not just your phone calls – it’s YOU they are listening to.

You, like most Americans, are friendly and like to mind your own business. You have 2.3 kids, a mortgage, and a loving spouse.

But, this is the 21st Century. A grand era of technology. Buck Rogers and H.G. Wells would be so proud of our technological advancements.

But so would Stalin, Mao and Hitler. The NSA’s recently leaked shopping catalog is chilling and would “harsh the mellow” of any regular Joe.

Let’s start with you.

You have a phone that you call home with. The NSA can listen in to your phone using PICASSO. It knows your phone book, your recent calls, where you’ve been, your PIN numbers that you’ve used, and can block your calls. Like if you’re being chased by black SUVs and you want to call 911 – tough luck, they’ve shut down your phone.

But the REAL interesting part of the PICASSO – it can collect LIVE AUDIO from the phone. Are you carrying on a great conversation about how much you think Obamacare is a scam? Your political dissent can now be recorded in real time and documented.
MONKEYCALENDAR can remotely send your previous locations via text message to the NSA.

The Apple iPhone isn’t even safe. DROPOUTJEEP is a software implant that can pull files, photos, address book, listen in on your conversations, capture images with the camera, and tell them your exact location – all being sent covertly through the SMS system.

CANDYGRAM should be called FAKEOUT because it mimics a cell tower. At 40,000 bucks a unit, it has been designed to be remotely erased in case it cannot be recovered.

How about your computer? We all know of PRISM and the other anagrams. Even your old computer isn’t safe.

SWAP and DEITYBOUNCE can be uploaded to Windows, LINUX, FreeBSD, or Solaris systems by the ARKSTREAM system to re-flash your computer’s BIOS to upload software via TWISTEDKILT to drop a payload. In other words, they can put files on your computer that you didn’t put on there, like child porn.

IRATEMONK alters your hard drive firmware and gains control of the Master Boot Record.

And the big guys aren’t immune from the NSA keyhole-peeking approach. Products such HEADWATERand HALLUXWATER are actually designed to defeatHuawei Eudeomon firewall servers and give the NSA a backdoor to many European and Asian companies. Don’t worry Cisco firewall owners, the JETPLOW can probably be found on your units.

TOTEGHOSTLY is designed for Windows Mobile PDA’s to do the same function as PICASSO and DROPOUTJEEP, including listening to conversations and taking photos.

Even old computers aren’t safe. The Windows XP system has been compromised bySOMBERKNAVE, that helps VALIDATOR “calls home” and deliver the data to the NSA agent.

And this is nothing more than Tyranny, aided by the very manufacturers that expect you to trust them. Dell, Microsoft, and so many others have been in cahoots with the NSA since day one.

There is no room for individualism in this world. The government is everywhere, they see and hear everything and they control everything that isn’t human. They observe and report your actions, your thoughts, your feelings and emotions . You might think you and your family are succeeding in a small rebellion for a short while, but eventually it catches up with you. You realize they knew all along, they are already working against you and at the end of the day, they will kill every subversive thought you may or will have. There is not a chance to be an individual in this dictatorship. They will get you. They always get you. And eventually, they get to you.

This article first appeared at Prepper Podcast Radio Network. 

James is a father of four and grandfather to four. He and his wife of almost 30 years have been prepping since 2003. They live in a small town, with neighbors as close as 10 feet away and have raised chickens for 2 years covertly on less than 1/5 of an acre. He is a former corrections officer, insurance fraud investigator, and he served in the Navy for 6 years. He currently works for a corporation dealing with the disabled population and their benefits. He is the host of The Covert Prepper show and the Prepper Podcast Radio Network News, both heard on Blogtalk Radio.

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) | Zero Hedge

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) | Zero Hedge.

Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques“, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: “DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

What is perhaps just as disturbing is the following rhetorical sequence from Applebaum:

“Do you think Apple helped them build that? I don’t know. I hope Apple will clarify that. Here’s the problem: I don’t really believe that Apple didn’t help them, I can’t really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I’d like to believe that since Apple didn’t join the PRISM program until after Steve Jobs died, that maybe it’s just that they write shitty software. We know that’s true.”

Or, Apple’s software is hardly “shitty” even if it seems like that to the vast majority of experts (kinda like the Fed’s various programs), and in fact it achieves precisely what it is meant to achieve.

Either way, now everyone knows that their iPhone is nothing but a gateway for the NSA to peruse everyone’s “private” data at will. Which, incidentally, is not news, and was revealed when we showed how the “NSA Mocks Apple’s “Zombie” Customers; Asks “Your Target Is Using A BlackBerry? Now What?

How ironic would it be if Blackberry, left for dead by virtually everyone, began marketing its products as the only smartphone that does not allow the NSA access to one’s data (and did so accordingly). Since pretty much everything else it has tried has failed, we don’t see the downside to this hail mary attempt to strike back at Big Brother and maybe make some money, by doing the right thing for once.

We urge readers to watch the full one hour speech by Jacob Applebaum to realize just how massive Big Brother truly is, but those who want to just listen to the section on Apple can do so beginning 44 minutes 30 seconds in the presentation below.

 

%d bloggers like this: