Alli can say is READ THE ENTIRE LINKED ARTICLE then come here for the link to part 1 of the talk.  I am providing links to part 1 and part 2 below.

Part 1: The militarization of the Internet

part 2:  Remote Iphone Compromise

Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques”, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: “DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

NSA ROC operator

Load specified module

Send data request

iPhone accepts request

Retrieves required SIGINT data

Encrypt and send exfil data

Rinse repeat

via How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) | Zero Hedge.