In an email to Infosecurity, F-Secure security advisor Sean Sullivan said that he suspected that law enforcement agencies were targeting phones more than 10 years ago, so no doubt intelligence agencies did as well. "In presentations I've often been asked about iPhone security and the answer was always 'it's safe from crimeware, but it can be hacked'. All you needed for evidence was to look at the latest jailbreak.
"Given that the CIA does HUMINT, I think that the CIA was seeking a persistent backdoor (Mac & iOS). Given the underlining design of the OSs, it shouldn't have been difficult to develop. With physical access to the device, many things are possible."
Paul Calatayud, CTO of FireMon, said: “The validity of the dumps from my 18 years of experience in cyber, including eight years within the army cyber teams, would lead me to state these claims have basis and are worth taking real consideration over. The tools are very noteworthy yet to be expected if you understand the space.
"We have seen issues with suppliers and manufacturers in the computer world installing or not being aware of rootkits and low level firmware key loggers being installed, examples being Lenovo. The question moves away from technology capability towards intent and success. This is where I would disagree with others. I suspect this program was able to weaponize malware at low levels of Apple phones. I disagree that the program had large scale reach or that they were able to distribute it with Apple support or with any success. In other words, just because the malware was designed, does not mean it is present in all phones.
"Looking at the fight between the FBI and Apple over backdoor and encryption further leads me to believe these capabilities and the malware is not readily deployed in the wild. I suspect there was far greater success of surveillance programs within the wireless networks vs. what's on the device. Just think, what data that lives on your phone is not somehow being transmitted over wireless protocols and internet services; text messages, phone calls, email messages, etc.”