Leaked documents now show what we all suspected: the NSA can turn your iPhones microphone and camera on and off without you knowing.
According to Der Spiegels website:
The NSAs ANT division develops implants for mobile phones and SIM cards. One of these is a spyware implant called DROPOUTJEEP designed for the first generation of iPhones which was still in development in 2008, shortly after the iPhones launch. This spyware was to make it possible to remotely download or upload files to a mobile phone. It would also, according to the catalog, allow the NSA to divert text messages, browse the users address book, intercept voicemails, activate the phones microphone and camera at will, determine the current cell site and the users current location, etc. ANTs technicians also develop modified mobile phones, for use in special cases that look like normal, standard devices, but transmit various pieces of information to the NSA that can be swapped undetected with a targets own mobile phone or passed to informants and agents. In 2008, ANT had models from Eastcom and Samsung on offer, and it has likely developed additional models since.
See leaked document below:

googletag.cmd.push(function() { googletag.display('div-gpt-ad-1380545742536-0'); });
As we reported previously, ANT specialists at the NSAs department for Tailored Access Operations can remotely access, monitor, and manipulate data in electronics around the world.
According to the report, the NSA intercepts shipments that are ordered online and spyware is manually installed on their targets iPhone.
The NSA claims a 100 percent success rate when it comes to implanting iOS devices with spyware, reports The Daily Dot.
Journalist and security researcher Jacob Appelbaum asks important questions in the video below.
Is Apple helping the NSA?