Select Page

 

The FBI rapidly gained access to the phone of Thomas Matthew Crooks, who attempted to assassinate former President Donald Trump at a rally in Pennsylvania. This quick access highlights the increasing effectiveness of phone-hacking tools available to law enforcement agencies.

Many police departments use MDTFs like Cellebrite, an Israeli company that provides tools for extracting data from phones. A 2020 investigation found that over 2,000 law enforcement agencies across the US have access to such tools. These range from more common devices like Cellebrite to advanced and expensive options like GrayKey.

The article contrasts this quick access with previous high-profile cases where the FBI struggled to access encrypted phones. Notable examples include:

1. The 2015 San Bernardino shooting case, where Apple refused to help the FBI break into the shooter’s iPhone, citing concerns about creating a backdoor in their encryption. The FBI eventually gained access through a third party, reportedly spending around $1 million.

2. The 2019 Pensacola Naval Air Station shooting, where Apple again refused to unlock the shooter’s phones, leading to criticism from the FBI and then-Attorney General William Barr.

These cases highlight the ongoing tension between law enforcement’s need to access evidence and tech companies’ commitment to user privacy and security. While Apple has consistently refused to create backdoors in their encryption, the increasing sophistication of third-party MDTFs appears to be providing law enforcement with alternative means of access.

The article also touches on the potential risks associated with these tools, noting that they could be misused by undemocratic governments to violate human rights. Security experts quoted in the article explain that these tools often work by exploiting software vulnerabilities or using brute force methods to guess passwords.

Overall, the piece underscores the evolving landscape of digital privacy, encryption, and law enforcement capabilities in accessing locked devices.

Original article appears here.

Summary by Claude.Ai