So the usual view is that the capabilities we hear of the NSA having (keeping phone on even when it appears to be off, using GPS etc to locate the phone, transmitting microphone in the background, etc) is enabled in the baseband, when it receives coded requests from the network.<p>It'd be interesting if reverse engineering of the baseband could find those capabilities and see what's really possible and how it works.