This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links
DROPOUTJEEP...nobody

Version management

Difference between version and

At line 1 added 32 lines
!!! Overview
[{$pagename}] is a software implant for the [Apple] [iPhone] that utilizes modular mission [applications] to provide specific [SIGINT] functionality.
[{$pagename}] is a [Backdoor] and includes functionality includes the ability to remotely push/pull files from the device. [SMS] retrieval, contact list retrieval, voicemail, [geolocation], hot mic, camera capture, [CELLID] [Geolocation], etc. Command, control and data exfiltration can occur over [SMS] messaging or a [GPRS] data connection. All communications with the implant will be covert and encrypted.
[{$pagename}] is a [STRAITBIZARRE] based software implant for the [Apple] [IOS] [Operating System] and uses the [CHIMNEYPOOL] [framework]. [{$pagename}] is compliant with the [FREEFLOW] project, therefore it is supported in the [TURBULENCE] [architecture].
!! Category
%%category [Government Surveillance]%%
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [NSA Spyware Allegedly Gives Backdoor Access to iPhones|https://www.cultofmac.com/260213/nsa-spyware-allegedly-gives-backdoor-access-iphones/|target='_blank'] - based on information obtained 2018-10-08-
* [#2] - [DROPOUTJEEP: NSA Exploit of the Day|https://www.schneier.com/blog/archives/2014/02/dropoutjeep_nsa.html|target='_blank'] - based on information obtained 2018-10-08-