Recently Identified Back Doors on iPhones and iPads May Pose Security Risks
Mr. Zdziarski speculates these forensic products may already use these services. These products are sold to law enforcement agencies which use them to obtain data from iOS devices, among other mobile devices. Law Enforcement agencies use these products mostly on phones in their possession but are thought on occasion to pair phones in other circumstances using USB remote protocols where phones of targets do not have USB pairing turned off or even during traffic stops or other custodial situations. Zdziarski also asserts that Apple iOS has a built in packet sniffer and considers that such a sniffer should only be mounted on iOS developer platforms if it is for developer purposes. If not for developer purposes, he questions what other valid use might it serve. Otherwise, Zdziarski credits iOS as being reasonably secure against attacks by routine hacking and criminals.
Zdziarski also notes that these back door services have been in iOS for years and were intentionally programmed by Apple and while he is not asserting any “grand conspiracy” between Apple and any government or security agency, he does believe these services “may” have been used by the NSA to collect data on “potential” targets. The NSA is known to have used iOS security vulnerabilities in the past. In December 2013, security researcher Jacob Applebaum revealed that an NSA program named DROPOUT JEEP reportedly gave NSA almost complete access to the iPhone.
Defined as “software implant” for iphones to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, voicemail, etc.
 Androids and even blackberry have been crashed though perhaps not so thoroughly.