Oh, OK. That makes more sense. As I said to other commenter, I'm not doing enough research to figure out how they're hacking it directly. There's so many published hacks of hardware and firmware that were designed for secure operation that it would be a miracle if they didn't have something on iPhones. It's more a "insecure-by-default" if it doesn't address what's on my list of attack vectors. I know it doesn't because it wouldn't be compatible with legacy ARM or iOS code without modifications. ;)
Far as parallel construction, let me see if I can quickly Google something. Here's you a few on it early on with FBI and DEA's stronger cooperation.
https://www.techdirt.com/articles/20150427/11042430811/nsas-...
http://www.reuters.com/article/us-dea-sod-idUSBRE97409R20130...
Further, they'll actually let a criminal go just to prevent either the public or courts learning the details of defense-related techniques. The Stingrays are a perfect example:
http://arstechnica.com/tech-policy/2015/04/fbi-would-rather-...