All Apple devices, including iPhones and Macs, are CIA spy devices embedded with spyware from the factory

Friday, March 24, 2017
By Paul Martin

by: Thomas Dishaw
NaturalNews.com
Friday, March 24, 2017

Wikileaks has released their latest Vault 7 data dump, and the new documents are shining a light on how the CIA can hack Apple devices before they even end up in the hands of consumers. The sad reality is, most Apple users already suspected this type of activity was taking place, but the new information shows us just how it works.

“Dark Matter,” which is the title of the most recent leak, claims that not only has the CIA hacked iPhones, they’ve been doing so since at least 2008, one year after the product was introduced to the market. Wikileaks posted the following statement on their website:

~Today, March 23rd, 2017, WikiLeaks releases Vault 7 “Dark Matter,” which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by the CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones, and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software, for example, from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

~Also included in this release is the manual for the CIA’s “NightSkies 1.2” [which is] a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones, i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

NightSkies, according to Wikileaks, was actually operational in 2007, the year that Apple launched the iPhone. In a document describing the NightSkies malware for an iPhone 3G running iOS 2.1, which was the second series release for the phone, the CIA stated that they granted the agency full control over an infected device: “The tool operates in the background providing upload, download and execution capability on the device. NS is installed via physical access to the device and will wait for user activity before beaconing. When user activity is detected, NS will attempt to beacon to a preconfigured LP [listening post] to retrieve tasking, execute the instructions, and reply with the responses in one session.” So basically, as soon as a user activates their phone, it would send a signal to the CIA, giving them access to everywhere you go, everything you say, and everything you do. Considering that over 100 million iPhones are in use in the United States alone, that is a lot of access for the agency to have.

MacBooks were also listed as a primary target for the CIA. This time they used an implant called “DarkSeaSkies.” According to the Wikileaks statement:

The Rest…HERE

Leave a Reply

Join the revolution in 2018. Revolution Radio is 100% volunteer ran. Any contributions are greatly appreciated. God bless!

Follow us on Twitter