Latest Snowden Docs Reveal U.S. Govt. Obsession With Breaking Encryption

The CIA created software that may have been capable of turning millions of apps into surveillance tools.

By , an assistant editor and staff writer at Foreign Policy from 2013-2019.
175153105crop
175153105crop

It is common knowledge that the U.S. intelligence community is terrified of commercial encryption systems. FBI Director James Comey has repeatedly and publicly speculated on the consequences of being “left in the dark” as a result of encryption. What has been less known are the creative methods the intelligence community has considered using to circumvent encryption.

It is common knowledge that the U.S. intelligence community is terrified of commercial encryption systems. FBI Director James Comey has repeatedly and publicly speculated on the consequences of being “left in the dark” as a result of encryption. What has been less known are the creative methods the intelligence community has considered using to circumvent encryption.

In a fascinating, if unsatisfying, story posted Tuesday on the Intercept, new documents from NSA whistleblower Edward Snowden reveal that the CIA has developed the means to  undermine the software used to build applications for Apple devices in order to install backdoors in iPhones, iPads, and computers manufactured by the California company.

Here’s the unsatisfying part: It’s impossible to know whether U.S. spies actually carried out that plan or used any of the technology described in this article.

But as a concept, the exploit is revealing in how the U.S. intelligence community is thinking about what it clearly considers a huge challenge moving forward. (By the same measure, the government’s attention on getting around commercial encryption is also indicative of the fact that properly implemented encryption systems can be quite effective in protecting an individual user from government surveillance.)

According to a document posted by the Intercept, which previews a talk by a researcher at Sandia National Laboratories, it is possible to use a modified version of the Xcode software development kit — called Strawhorse — to inject a surveillance backdoor into a program being written. This allowed a government hacker to “create a remote backdoor on execution” and “force all iOS applications to send embedded ata to a listening post.” Strawhorse also had the ability to steal a developers private encryption keys.

To inject Strawhorse, the researcher claims to have modified Apple’s automatic software updater to install the “whacked” version of Xcode.

In short, if a user downloads an application created with the modified version of Xcode, it turns a computer, cellphone, or laptop into a CIA surveillance device. This method, if used, had the potential to infect millions of devices. Another document posted by the Intercept Tuesday describes the name of software used by the NSA to control the power and microphone systems on an iPhone — Dreamy Smurf and Nosey Smurf, respectively. Those programs were previously described by the Guardian.

Two other documents posted by the Intercept Tuesday reveals that the CIA also studied technology to attempt to capture the encryption keys used for an entire Apple chipset. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch, and the iPad.” A-4 refers to the processor used in those products.

The Snowden revelations have made it painfully clear to tech companies that they lie squarely in the crosshairs of U.S. spies, and as a result several major players in the industry have moved to encrypt to user data. In September, Apple rolled out new measures to do exactly that.

But the technology being described here may now be obsolete. They were described at so-called “Jamborees” — top secret conferences for U.S. intelligence officials between 2010 and 2012. Since then, one can only guess how spytech has evolved to keep up with encryption’s increasing popularity.

STRINGER/AFP/Getty Images

Elias Groll was an assistant editor and staff writer at Foreign Policy from 2013-2019.
Twitter: @eliasgroll

More from Foreign Policy

Palestinians start to return to their homes amid destruction after Israel’s withdrawal in Khan Younis, Gaza.
Palestinians start to return to their homes amid destruction after Israel’s withdrawal in Khan Younis, Gaza.

Israel Is Facing an Iraq-like Quagmire

Six months in, there’s still no plan for after the war, U.S. officials say.

Instructors from the Norwegian Home Guard 12th District Company “Hegra” participate in a blank-fire exercise, together with Ukrainian soldiers, north of Trondheim, Norway.
Instructors from the Norwegian Home Guard 12th District Company “Hegra” participate in a blank-fire exercise, together with Ukrainian soldiers, north of Trondheim, Norway.

NATO Doesn’t Have Enough Troops

For the first time in decades, NATO has a plan to fight Russia. Now it just needs the forces to do it.

Australian Prime Minister Anthony Albanese, U.S. President Joe Biden, and British Prime Minister Rishi Sunak hold a press conference after a trilateral meeting during an AUKUS summit in San Diego.
Australian Prime Minister Anthony Albanese, U.S. President Joe Biden, and British Prime Minister Rishi Sunak hold a press conference after a trilateral meeting during an AUKUS summit in San Diego.

Biden’s ‘Coalitions of the Willing’ Foreign-Policy Doctrine

The latest flurry of U.S. diplomacy shows how the president is all about “minilateralism.”

A photo illustration shows a crowd of people filling the face of India's Prime Minister Narendra Modi.
A photo illustration shows a crowd of people filling the face of India's Prime Minister Narendra Modi.

The New Idea of India

Narendra Modi’s reign is producing a less liberal but more assured nation.