Apple, your iMessage protocol is so busted by cryptographers and forensics folks! Er, well maybe - the latest post on the iMessage protocol bust appears in Threatpost for Oct. 18, 2013. Threatpost's Dennis Fisher reports on the potential of exploiting iMessage using an MTM or "spoof" in the article of that date. The implication is that organizations like the NSA or similar may access your "secure" iMessages through these exploits. This was not thought possible previously.
The iMessage system is secure to a point but is constantly (24/7?) kept on PUSH notice and processed by Apple's servers. It may seem sinister but is not - the technology must be there in order for these services to operate. Apple's own servers do process the "coded" texts - but Apple engineers built the protocol. That means they have all the architecture and means of coding (or de-coding) those messages. It's a matter of choice - or security and the law.
To some the truly irksome revelation may be that their sensitive iPhone data is not secured by a certificate. You may consider the Windows security message (see the link just previous) or that other message services use certificates. Even Twitter uses certificates according to Dennis's cryptographer. Hackers, low-lifes, skilled government agents and other authorities (like Customs and Border Patrol or your employer) can get around this missing level of security. The truly nefarious can fake a certificate and get around inside the layers of an iPhone.
So can forensics folks get around the exquisitely intricate architecture and layers of your iPhone. However, they must mainly seize the questionable iPhone to examine the data and assets. Jonathon Zdziarski reveals all of this in his wonderful book "iPhone Forensics". His book confirms the existence of Apple's "secure SSL tunnel" and its implementation in Apple communications. The cryptographers of Dennis's Threatpost article seemed to make light work of hacking the "stunnel". This apparent liability would seem to make it fairly easy for cryptographers, forensics experts, the NSA and all to bust into your iMessage!