Apple Is Playing Spygames With Fedguv

Fascinating battles are playing out behind the scenes:

We’ve known for roughly two years the US government has programs devoted to intercepting computer hardware mid-shipment. These programs are used to insert backdoors or spyware deep into a system’s firmware before it even arrives at its destination. A new report claims Apple is looking into building its own servers as a way to thwart this type of insertion…

Apple has long suspected that servers it ordered from the traditional supply chain were intercepted during shipping, with additional chips and firmware added to them by unknown third parties in order to make them vulnerable to infiltration, according to a person familiar with the matter. At one point, Apple even assigned people to take photographs of motherboards and annotate the function of each chip, explaining why it was supposed to be there. Building its own servers with motherboards it designed would be the most surefire way for Apple to prevent unauthorized snooping via extra chips… Google publicly announced it would begin encrypting all data that travels through its data centers after information leaked that the NSA had tapped undersea cables to spy on Google’s data centers from the inside, where data was once unencrypted.

Very few understand…

This is chilling. There was a time long ago, back when a government agency couldn’t penetrate the private sphere of a private sector entity, unless there was probable cause that a crime had been committed. Even then, they had to present that cause to a judge and get a warrant before they could do anything. That desire to limit domestic government action was the entire reason our overseas intelligence agencies were barred from operating on American soil and targeting American citizens. It was thought that a no-holds-barred free-for-all between the government and the private sector, outside of the bounds of the law, would be a bad thing for the nation. Trust in government would erode, and the citizenry would begin to view government as an enemy rather than an ally in the struggle to make America great. Even worse, the government would begin to view the citizenry as an enemy.

Now, those days of limited government action are gone. Now, the manufacturers suppliers are penetrated, the manufacturer is penetrated, the wholesaler is penetrated, the shipper is penetrated, your own company is penetrated, and your customers are penetrated, all in a myriad of ways, from technically to in-person, by a government with limitless resources, and it is all done without any of those targets having been involved in any crime at all. It is done preemptively, “just in case.” Even worse, now you have a government which views law abiding citizens who want to lead their own private lives in peace as enemies of the state, and every secret as it’s own personal domain.

There is an ominous air about it, because it feels like what we see now is merely the beginning of a trend, which has some ways to go before it reaches the final destination where it will settle. Already the rules are gone. Now we will find out just how gone they can be. What will happen then? Nobody knows.

Moreover, the guys who serve in the military and join LE would seem the types who would tend to not condone this type of governmental attitude in their nation. That raises the questions of where it is coming from, who it is at the top who is ordering it, and what they see coming which is driving them to pursue it so relentlessly.

Even better, just when you thought the future couldn’t appear any more ominous, the Apocalypse approaches. What an Apocalypse would look like, if the government dissolves and all of this machine is turned loose in the private sector absent the last vestiges of government oversight, is something I don’t even want to imagine. The chaos might be the least problematic aspect of a collapse.

All of your secrets are now the property of somebody – and as of now, nobody even knows who.

This entry was posted in Conspiracy, Intel, Surveillance. Bookmark the permalink.
0 0 votes
Article Rating
Subscribe
Notify of
guest

7 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
8 years ago

[…] Apple Is Playing Spygames With Fedguv […]

everlastingphelps
everlastingphelps
8 years ago

Moreover, the guys who serve in the military and join LE would seem the types who would tend to not condone this type of governmental attitude in their nation. That raises the questions of where it is coming from, who it is at the top who is ordering it, and what they see coming which is driving them to pursue it so relentlessly.

That’s an element that has occurred to me. It would lead me to believe that it’s actually done selectively when possible (specifically the hardware modifications) and the stuff that is done broadly (like the google taps) actually aren’t scanned broadly, but only for specific things, on a West Point style honor system.

Unfortunately, that doesn’t make them any more immune to the ever present temptation to succumb to the “ticking time bomb” mentality and start going broad.

davecydell
8 years ago

“Even worse, the government would begin to view the citizenry as an enemy.” In Brussels yesterday the government arm labeled police broke up a protest labeled rioters. The government arms labeled police, politicians and media eventually labeled the rioters fascists. Fascism is merely derived from the description of people who want to protect their nation or race from outsiders who wish to destroy same. The manner for which they choose protection may be ill conceived or even eventually infiltrated. Your r/K theory of how an Apocalypse can be brought about is well constructed. What is not clear is the extent of the Apocalypse. Apocalypses have occurred many times in the recorded history of this planet, but have always been localized and were truly apocalyptic only to those specifically affected. How extent do you propose?
[In my mind I see it as history simply repeating itself, only, as always, very slowly.]

Robert What?
Robert What?
8 years ago

Apparently, if I’m reading it right, the government no longer needs Apple to break into “just this one iPhone” as they did it by other unrevealed means. If true, the government already has the capability to break into iPhones but were just playing dumb because they didn’t want to tip their hand to the public. As for Google, I wouldn’t believe anything they said about protecting users’ data from the government. I’d just assume that any thing entered into a Google search or sent by gmail is being hand delivered to the government by Google.

Wayne Earl
8 years ago

This doesnt seem terribly credible to me. Mostly, because it is at the wrong level that data would be sniffed. No one is buying Apple Servers, because of their cost. And again, most of “Apple”s infrastructure isnt actually Apple.

He who owns the ssl keys owns everything. And who owns the ssl keys? Riddle me this: what one company is 20% of the total worldwide Internet traffic? Negative points if you answered google, cause they aint it.

Your security articles are bunk, but I have to violate NDA’s to prove so. This doesnt bode well for a realistic viewq of the actual threat landscape.