Skip to main content
USA Network
NEW SEASON THIS OCTOBER
  • EPISODES
  • VIDEOS
  • BOOK
  • Articles
  • PHOTOS
  • CAST & INFO
  • Extras
  • Email
  • SHOP
  • Whoismrrobot
#MrRobot

Prosecutors Think They Can Extract Data from Phones Seized During Inauguration Day Protests

Featured From The Verge
By Nick Statt
Originally posted on March 22, 2017
Tags: The Verge

Share

Court papers filed today indicate that prosecutors are trying to break into locked smartphones seized during arrests made on Inauguration Day. According to a report from BuzzFeed, there are more than 100 phones involved, some belonging to individuals who have not been indicted. These devices were seized by law enforcement on January 20th when 214 people were arrested on felony rioting charges related to demonstrations held in protest of President Donald Trump.

It’s unclear how prosecutors intend to break into the phones, and whether they have the means to do so given the fact that some of the devices may be running up-to-date versions of iOS, making them virtually impenetrable, even to Apple itself. Nonetheless, the court papers indicate that officials are attempting to break in.

“The government is in the process of extracting data from the Rioter Cell Phones pursuant to lawfully issued search warrants, and expects to be in a position to produce all of the data from the searched Rioter Cell Phones in the next several weeks. (All of the Rioter Cell Phones were locked, which requires more time-sensitive efforts to try to obtain the data),” the papers read.

Extracting data from a locked iOS device is near impossible

“Time-sensitive efforts” is understandably vague, yet it seems farfetched that smartphone encryption could be broken in just a matter of weeks, especially following the FBI’s public spat with Apple last year over access to the San Bernardino shooter’s iPhone. It took the FBI months to find a working solution to bypass Apple’s built-in security measures. That was only after the organization reportedly paid more than $1 million for a very specific and narrow exploit to access an iPhone 5c. In the process, the FBI created a massive rift between the government and Silicon Valley over consumer privacy rights and the reach and power of federal agencies.

There is the remote but unlikely possibility that the phones involved with the Inauguration Day arrests are all running Android, making them easier to break into. The court papers could also be leaving out key contextual information, like whether the devices in question are locked using biometric authentication. It’s far easier to bypass something like Touch ID than a passcode. Law enforcement could use a warrant to compel someone to unlock the phone, or an advanced 3D-printed mold made using available fingerprint data from a government database.

Still, it’s notable that device security is finding its way to the heart of this particular situation. We’ll start to get a better idea of whether the devices have been broken into — and what methods might have been used — next month when follow-up hearings begin and evidence potentially gathered from the phones is presented in court.

Previous post Next post

Latest Articles

  • Dojo Is Another Oddly Shaped Solution to Securing Your Home Network
  • Bikers Stole 150 Jeeps with Hacked Keys
  • Windows XP Computers Were Mostly Immune to WannaCry
  • Chipotle Says ‘Most’ of Its Restaurants Were Infected with Credit Card Stealing Malware
  • Disney CEO Reports That Hackers Did Not Steal Pirates of the Caribbean 5
  • Hacker Breaks into Harvard Student Paper to Troll Mark Zuckerberg
  • Wikimedia’s Lawsuit Against the NSA Is Back
  • Hacker Beats Galaxy S8 Iris Scanner Using an IR Image and a Contact Lens
  • Microsoft Says this Chinese ‘Gaming Service’ Company Is Hacking Xbox Accounts
  • Russian Hackers Targeted Pentagon Workers with Malware-Laced Twitter Messages
View all Articles

Related content

  • Featured From The Verge
    Dojo Is Another Oddly Shaped Solution to Securing Your Home Network
  • Featured From The Verge
    Bikers Stole 150 Jeeps with Hacked Keys
  • Featured From The Verge
    Windows XP Computers Were Mostly Immune to WannaCry
  • Featured From The Verge
    Chipotle Says ‘Most’ of Its Restaurants Were Infected with Credit Card Stealing Malware
  • Featured From The Verge
    Disney CEO Reports That Hackers Did Not Steal Pirates of the Caribbean 5
  • You may also like
    Falling Water
    About the show
    An intersection between reality and unconscious thought, FALLING WATER is the story of three unrelated people, who slowly realize that they are dreaming separate parts of a single common dream. Each is on a quest for something that can only be found in their subconscious. However, the more they begin to use the dream world as a tool to advance their hidden agendas they realize that their visions are trying to tell them something more, and that their very real lives are at stake.
    An intersection between reality and unconscious thought, FALLING WATER is the story of three unrelated people, who slowly realize that they are dreaming separate parts of a single common dream. Each is on a quest for something that can only be found in their subconscious. However, the more they begin to use the dream world as a tool to advance their hidden agendas they realize that their visions are trying to tell them something more, and that their very real lives are at stake.
    See more
Load more
  • Independent Programming Report
  • NBCU Research Panel
  • Terms of Service
  • Privacy Policy
  • Closed Captioning
  • Accessibility
  • Help
  • AdChoices
©2017 NBCUniversal, Inc. All Rights Reserved. A Division of NBC Universal