{"id":165784,"date":"2024-07-16T00:19:34","date_gmt":"2024-07-16T00:19:34","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165784"},"modified":"2024-07-16T00:19:37","modified_gmt":"2024-07-16T00:19:37","slug":"fbi-gained-access-phone-suspect-assassination-attempt-on-donald-trump","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165784\/mobile-2\/fbi-gained-access-phone-suspect-assassination-attempt-on-donald-trump.html","title":{"rendered":"FBI unlocked the phone of the suspect in the assassination attempt on Donald Trump"},"content":{"rendered":"
<\/div>\n

The FBI gained access to the password-protected phone of the suspect in the assassination attempt on Donald Trump.<\/h2>\n\n\n\n

The independent website 404 Media first reported<\/a><\/strong> that the FBI had successfully accessed the password-protected phone of Thomas Matthew Crooks<\/a>, the deceased suspect in the assassination attempt on Donald Trump.<\/p>\n\n\n\n

\u201cFBI technical specialists successfully gained access to Thomas Matthew Crooks\u2019 phone, and they continue to analyze his electronic devices,\u201d reads a statement issued by the FBI press office.<\/em><\/gwmw><\/p>\n\n\n\n

It is unclear how the feds unlocked the phone, however, this case demonstrates the progresses of law enforcement in bypassing security measures implemented to protect mobile devices. <\/gwmw><\/p>\n\n\n\n

“Some specifics such as how exactly the FBI bypassed the phone\u2019s protections remain unclear, but the news signals that the reality of sourcing evidence from password-locked devices in high-profile cases is greatly different to what it was nearly ten years ago, when the U.S. Department of Justice tried to force Apple to undermine the iPhone\u2019s security mechanisms to access data on the phone belonging to the San Bernardino<\/a> shooter.” states 404 Media<\/a>.<\/p>\n\n\n\n

Immediately after the assassination attempt, the FBI officials in Pennsylvania failed in attempting to access Crooks\u2019 device. Then the authorities shipped the phone to Quantico, Virginia, where the FBI experts analyzed the device.<\/p>\n\n\n\n

In March 2023, the DOJ released<\/a> a brief filing that threatened to force Apple to hand over the iOS source code if it would not help the FBI in unlocking the San Bernardino shooter\u2019s iPhone.<\/p>\n\n\n\n

Apple CEO Tim Cook<\/a> declared<\/a> that the company will refuse to help the FBI to protect its users. The idea of introducing a backdoor<\/a> into its system is not feasible because opens the users to many other threat actors.<\/p>\n\n\n\n

Later, the FBI dropped the case after the government contractor Azimuth Security successfully unlocked<\/a> the device.<\/p>\n\n\n\n

Since then, multiple forensics firms have developed tools to unlock iPhones for data extraction, including:<\/p>\n\n\n\n

    \n
  1. GrayKey <\/strong>– A hardware device developed by GrayShift that can bypass iPhone passcodes and extract data. Several media reported that law enforcement agencies used it.<\/li>\n\n\n\n
  2. UFED<\/strong> – A forensic tool created by Cellebrite that can unlock iPhones and extract data. It is used by law enforcement and intelligence agencies.<\/li>\n\n\n\n
  3. Elcomsoft iOS Forensic Toolkit<\/strong> – A software tool that can extract data from locked iOS devices. <\/li>\n\n\n\n
  4. MSAB XRY<\/strong> – A forensic suite that allows to unlock and extract data from iOS devices.<\/gwmw><\/gwmw><\/li>\n<\/ol>\n\n\n\n

    Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

    Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

    (<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, Donald Trump)<\/strong><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

    The FBI gained access to the password-protected phone of the suspect in the assassination attempt on Donald Trump. The independent website 404 Media first reported that the FBI had successfully accessed the password-protected phone of Thomas Matthew Crooks, the deceased suspect in the assassination attempt on Donald Trump. \u201cFBI technical specialists successfully gained access to […]<\/p>\n","protected":false},"author":1,"featured_media":33970,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,3,2624,55],"tags":[4579,6820,4112,9508,9506,10918,9916,687,841,1533],"class_list":["post-165784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-cyber-crime","category-mobile-2","category-security","tag-donald-trump","tag-forensics","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-phone","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司