In 2005, Apple allowed two US government contractors to work in its offices to develop a secret customized version of the iPod, but what exactly the iPod could do was a mystery and still is today, and what made us talk about this today is because of the story that the engineer told. David Shayer An engineer who previously worked for Apple for 18 years, and below we will tell the story that the engineer disclosed in detail.
The story as stated by its owner:
Engineer David Shayer says: At the end of 2005, one day I was sitting in my office writing some codes related to the iPod. Suddenly, without knocking the door, the iPod program manager, who is my boss, came in and closed the door behind him, and told me the following: “I have a special mission for you and your boss doesn't know that. "The mission is that you will help two engineers from the US Department of Energy in modifying a special iPod."
Indeed, the next day the receptionist called me to tell me that two men were waiting in the hallway, so I went downstairs to meet Paul and Matthew, the engineers who would design this custom iPod and I was hoping to say, “They wear dark glasses and long coats and peek at the reflections of the windows to make sure. Of not revealing them to anyone, ”but they were very normal men of thirty years of age, and I actually greeted them and we went to the meeting room to talk.
The engineers' work cards were indicating that they did not actually work for the Department of Energy but rather worked for a division of Bechtel, a large US defense contracting company affiliated with the Department of Energy, and they wanted to add some dedicated devices to an iPod and record data from this dedicated device to the iPod in a way that could not be detected. Easily, but they stipulated that it must look and function like a normal iPod and not show any signs of spying, and they made it clear that they would do everything and my only job is to provide any help they need from Apple.
Later, I learned that an official in the Ministry of Energy had contacted Apple's first vice president for devices asking him to help the company in making customized modified iPods. Indeed, the first vice president passed the request to the vice president of the iPod department who delegated him to the iPod program manager who came to see me and told me the details as well. I mentioned, it is worth noting that my manager has been told that I am working on a private project and should not ask questions.
The beginning to work on the secret iPod:
Engineer David Shayer says: I requested an empty office for both Paul and Matthew in our IS&T building, which is the Apple IT department building, and in this office the engineers were only connecting to the public internet outside Apple's firewall preventing them from accessing Apple's internal network, because if you use WiFi then you are Need a VPN To bypass Apple's firewall.
Of course, this was not a collaboration with Bechtel through a contract and payment. Rather, Apple was presenting a favor under the table to the Department of Energy. It is worth noting that Paul and Matthew were not allowed to directly access the iPod source code server, so instead I gave them a copy of the code. The current source is on DVD and eventually they were allowed to keep the modified version of the iPod OS they built.
And for reference, Apple did not provide them with any hardware or software tools, only I gave them the specifications for the computers they need with ARM Compiler and JTAG Corrector, and they are the ones who bought computers and iPods to work on, and they have already bought at least several dozen and maybe many more.
As is the case with all Apple buildings, everyone had to present an Apple badge to the badge reader to open the door and enter the iPod building, and only employees who were allowed into the building were allowed to enter the building, besides that on each floor there was another closed door and a badge reader, and thus Every day Paul and Matthew would call me from the hallway because they didn't have the apple badges, but later I arranged a few things to get the seller badges as if they were selling coffee or whatever so I didn't have to enter them daily.
Important moments:
The engineer says: Paul and Matthew were very smart and with a little help they were working very quickly and with obvious effort, I just showed them how to set up the development tools and build a copy of the operating system from the source and upload it to the iPod. I also showed them how to use the JTAG debugger which was somewhat difficult. They understood the way the system works. They clarified what they want to do, as they added special devices to the iPod, which led to the generation of data that they wanted to record secretly. It is worth noting that they were careful to make sure that I had never seen the devices and actually I could not see them.
Then we discussed the best way to hide the data that they had recorded, and I suggested that they create another partition on the disk to store their data, and this way even if someone connects the modified iPod to a Mac or PC, iTunes will treat it as a normal iPod and they really liked this idea a lot and they started in Implemented.
Finally, after a few months of repetitive work, Paul and Matthew finished integrating their custom devices into the iPod, finished the project, moved the computers and patches to the Bechtel office, and then returned me the most recent DVD with the Apple source code along with the Apple seller badges that I had. I gave it to them and since then I haven't seen them again.
What were they doing exactly?
The engineer says at the end of his speech: I think Paul and Matthew were building something that U.S. Department of Energy agents could use without hiding it surreptitiously, something that seemed harmless because it plays music and works just like a regular iPod while at the same time being used to communicate and record evidence of radioactivity while scanning for uranium or evidence. I had to develop a bomb program without any possibility of the press knowing what was being done, which assured me that whenever I asked them what they were building they changed the subject and started arguing about where to go to lunch.
It is also worth noting that only four people at Apple knew about this secret project, and they are me, the director of the iPod program, the vice president of the iPod department and the first vice president of devices, and currently none of us is still working at Apple, and of course there was no trace of sophistication as all the communications were face to face Indeed, if you ask Apple about the secret custom iPod project, you will not find any comment, and the public relations staff will tell you that the company does not have a record of any such project, but the deputy of the iPod team confirmed the authenticity of the story in his account on Twitter.
Source:
Thank you for the effort  
Wow, thanks Von Islam ♥
I hope that all dictatorships in the Arab and Islamic world will follow the example of developed countries in using technology to spy on their people.
Rather, it is from using torture methods to extract information from opponents
Indeed an interesting topic and it is no secret to anyone that if they wanted to spy on everyone, they would spy!
By the way, I own an 80 gigabyte version of the iPod 1
I made the analysis ball by us
It is assumed that the author of the article gives us his analysis of what he quoted, and then asks for our opinion of that
We trust you to analyze it 😊
🤣
An interesting and excellent topic, which indicates digital intelligence and the capabilities of software engineers. I expect modified devices that were donated to people who wanted to spy on them and collect information on their way.
A very nice topic except that the engineers in this sentence: (In this office the engineers used to call only) you should have written the engineers; For being a name it was.
My analysis is that the iPod was used to spy on the Iranian nuclear program.
An interesting topic ... I personally am a fan of this version of the iPod, unfortunately I had to sell it some time ago, and currently I am seriously thinking about buying another one
The subject confirms without a doubt that the United States of America can, if it wishes, easily hack into our mobile phones as individuals or governments for espionage purposes by broadcasting or sending specific programs to these devices, especially the devices of senior state officials, rulers, ministers, senior officers, and others.
The subject is not new, but rather when America sells advanced aircraft to the Middle Eastern countries in general, it provides them with less advanced or lower-tech devices or adds some additions through which it can, via communication via satellite, monitor, disable or jam the advanced navigational devices of fighter planes, such as laser bomb and missile guidance devices, whenever it wants. Of course, the Arab countries do not have enough knowledge to detect and disable these added devices and software.
Best regards, Mustafa - Jeddah
شكرا لكم
Interesting topic
Thank you for this nice topic
Thank you effort