Sean Gallup/Getty Images
Industryweek 8391 Iphone

CIA Worked to Break Apple Encryption

March 10, 2015
The research is consistent with a broader U.S. government program to analyze secure communications and break encryption, using a "black budget," as outlined in earlier documents leaked by Edward Snowden.

WASHINGTON - The Central Intelligence Agency has been working for years to break encryption on Apple (IW 500/4) devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

Investigative news site The Intercept, citing leaked secret documents, said the effort began in 2006 as Apple was preparing to launch its first iPhone.

The report said the researchers were based at Sandia National Laboratories and presented their findings at a secret CIA conference, according to documents leaked by former National Security Agency contractor Edward Snowden.

The research is consistent with a broader U.S. government program to analyze secure communications and break encryption, using a "black budget," as outlined in earlier documents leaked by Snowden.

The report would mean U.S. intelligence services may be able to tap into what has been believed to be secure communications using Apple mobile devices.

Neither Apple not the CIA responded to an AFP request for comment.

Apple and Google both announced last year they were hardening their encryption on devices powered by their mobile software, which would not even give the companies access. That would prevent the government from gaining access even with a legal warrant.

According to The Intercept, the security researchers sought access to the keys used to encrypt data stored on Apple's devices. They aimed to get into the built-in "firmware" to gain secret access, according to the report.

The documents did not reveal how successful the spy efforts were but they suggest a long effort to thwart encryption to keep data private.

The report said NSA personnel also participated in the 2012 conference where findings were presented.

U.S. officials have in the past said intelligence efforts are aimed at thwarting terror plots, and that privacy safeguards are in place for U.S. nationals.

Copyright Agence France-Presse, 2015

Popular Sponsored Recommendations

Secure end-to-end traceability and digitalization. Ensuring security with a specific data model.

July 11, 2023
A secure end-to-end traceability answers key questions. Is the device genuine or counterfeit? Are the designs intact and untampered? How to track origins and destinations? Explore...

7 Crucial Steps to Improve Your OT Security

Oct. 23, 2023
Enhance OT security in manufacturing and production. Uncover the crucial steps to safeguard your operational technology. Protect against evolving threats and bridge the IT-OT ...

Why DataOps may be the key to unlocking the full potential of digital transformation

Nov. 3, 2023
Read the 2023 market survey conducted by IndustryWeek

Gain a competitive edge with real-world lessons on private 5G networks

Nov. 16, 2023
The use of private networks in manufacturing applications is rapidly growing. In this paper, we present valuable insights and lessons learned from the field with the goal of enhancing...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!