CIA worked to break Apple encryption: report

Apple announced last year that it was hardening encryption on its devices
Apple announced last year that it was hardening encryption on its devices

The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

Investigative news site The Intercept, citing leaked secret documents, said the effort began in 2006 as Apple was preparing to launch its first iPhone.

The report said the researchers were based at Sandia National Laboratories and presented their findings at a secret CIA conference, according to documents leaked by former National Security Agency contractor Edward Snowden.

The research is consistent with a broader US government program to analyze and break encryption, using a "black budget," as outlined in earlier documents leaked by Snowden.

The report would mean US intelligence services may be able to tap into what has been believed to be secure communications using Apple mobile devices.

Neither Apple not the CIA responded to an AFP request for comment.

Apple and Google both announced last year they were hardening their encryption on devices powered by their mobile software, which would not even give the companies access. That would prevent the government from gaining access even with a legal warrant.

According to The Intercept, the security researchers sought access to the keys used to encrypt data stored on Apple's devices. They aimed to get into the built-in "firmware" to gain secret access, according to the report.

The did not reveal how successful the spy efforts were but they suggest a long effort to thwart to keep data private.

The report said NSA personnel also participated in the 2012 conference where findings were presented.

US officials have in the past said intelligence efforts are aimed at thwarting terror plots, and that privacy safeguards are in place for US nationals.

© 2015 AFP

Citation: CIA worked to break Apple encryption: report (2015, March 10) retrieved 30 May 2024 from
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

SIM maker Gemalto confirms possible spy attacks


Feedback to editors