(Responding to both andrew's and Chris' comments above...)
The phone companies can access people's mobile phones, even when they are
(apparently) turned off, and turn on the microphone in it, at least (and,
therefore, turn them into listening devices). (Besides the fact that every
mobile phone is a tracking device, as everyone already knows.)
http://www.youtube.com/watch?v=0G1fNjK9SXg
Of this, I already knew for many years. And I've always suspected that it
must be some parallel circuits that are built into mobile phones, that bypass
the normal circuits. (And, from what I know, I've always assumed that the
phones are built in a way that lets the companies remotely read a person's
SIM card, also.)
But, from what I read now (about accessing "notes" and "data", and running
"scripts" on iPhones) it seems that they can access the drives(?) of
modern-day smartphones also(?)*. And, if that's the case, I suspect it must
have to be done with the help of some *firmware*.
And it's the latter part that I'm most interested in. Because, if that's the
case, it's a very good example of what happens when you start adding
proprietary firmware/blobs (to Linux)... It compromises the security of the
equipment.
Anyway... We'll have to wait for the details. The original source
(http://www.spiegel.de/international/world/a-920971.html) says: "Visit
SPIEGEL ONLINE International on Monday for the full article."
---
* (I've never used a smartphone, so I don't know if one can keep "notes" and
"data" on a SIM card, and run "scripts" on them(?)...)