Apple iPhone Backdoor DROPOUTJEEP

As we all know the NSA has many different tools that they use to spy on us. This covers everything from the TURMOIL, TURBINE, and QFIRE systems (as I covered in my NSA Surveillance post) to COTTONMOUTH-I which is a USB hardware implant (I will cover this in a later post). In this post I will be talking about the NSA’s backdoor DROPOUTJEEP which is a backdoor for Apple’s iPhone.


What It Is
The DROPOUTJEEP backdoor is a backdoor for Apple’s iPhones (as I said above) which enables the NSA to spy on you at the application layer. Now if you are using an iPhone they don’t have to use the TURMOIL system to capture all of your traffic at the network level. They simply install this backdoor and your phone turns into a botnet basically for them. With the DROPOUTJEEP backdoor the NSA can remotely push/pull files from your device, receive SMS messages, receive contact list, receive voicemail, get geolocation data, get cell tower location, and turn on your mic & camera at any time. The only slightly good part about this backdoor is that the NSA has to have physical access to your phone to install the implant BUT with future versions of DROPOUTJEEP the NSA might be able to install this implant remotely which means they do not have to have physical access to your phone.


What We Can Do
We need to stop using cell phones for all of the stuff that we do or start using open source phone OS’s. What I mean by stop using cell phones for all of the stuff that we do is go out and buy a very basic cell phone that can only make calls and only give the phone power when you are using it (remove the battery and any other power sources when you are not using it). The other alternative is to look into open source software projects like Android but you will need to root the phone’s OS before it is going to do you any good because you are going to have to modify the OS in a way where you make the NSA’s job a lot harder for them to get into the phone. For example have a firewall installed on the phone and set it up where only traffic can be routed through the Tor network. Then have something like a software based intrusion detection system (IDS) that runs on the phone and when it detects that there might have been a breach have it send out the log file to someone and then self-destruct so that way it minimizes what the NSA is able to get.


Thank you all for taking the time to read this post and as always God bless!

The NSA’s original documentation on DROPOUTJEEP


The following two tabs change content below.
Preston Hood
Hello, my name is Preston Hood. I am the owner of PJHoodsCo, an Information Technology Service Provider (ITSP). I am also a freelance writer and information security researcher.
Preston Hood

Latest posts by Preston Hood (see all)

Categories: Information Technology, IT Security, and Preston Hood.


  1. Anonymous

    The Apple company Provided has stayed ahead on the mobile technological know-how performance ever before ever since usually the release from the Apple iPhone. The Apple iPhone cell became a single from the most brought up consumer goods ever previously. Take the wise decision before you purchase smartphones.

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>