Federal investigators are analyzing device’s content, although it is unclear how agency gained access

The FBI has gained access to the phone of the suspected gunman who opened fire on Donald Trump’s rally and is analyzing the device’s contents, the agency stated in a press release on Monday afternoon. The shooting, which killed one audience member and left Trump bleeding from one ear, is being investigated as an assassination attempt.

Authorities have been working to determine the motive behind the attack at Trump’s campaign rally on Saturday, but no clear picture has yet emerged. The gunman, identified as 20-year-old Thomas Matthew Crooks by the FBI, was shot and killed in the incident.

Federal investigators announced on Sunday that they had obtained Crooks’s cellphone, but had issues with bypassing its password protections to access the data within. FBI investigators then shipped the phone to a lab in Virginia, where agents successfully gained access, per the bureau’s press release.

  • Maeve
    862 months ago
    link
    fedilink

    Something sus about how quickly they can unlock phones when it’s attempted murderer killed dead and murder victims killed dead.

    • TeddE
      912 months ago
      link
      fedilink

      Cracking a phone is pretty doable. Cracking phones in a way that will hold up in a court trial, much more formal.

    • Negligent_EmbassyEnglish
      302 months ago
      edit-2
      2 months ago
      link
      fedilink

      look into celebrite

      I think there’s videos on youtube.

      they can plug in most phones and have access to everything through an easy gui

      • MegaUltraChicken
        72 months ago
        link
        fedilink

        I would definitely not call Cellebrite an “easy GUI and they definitely don’t get into most devices. Ive seen devices take months to unlock, if ever.

        • FuglyDuckEnglish
          42 months ago
          link
          fedilink

          Pretty sure we found the gentoo user.

          “Naw that’s simple bro

      • Blaster MEnglish
        62 months ago
        link
        fedilink

        Cellebrite machines were used to copy contacts and messages and call logs from one phone to another, back in the day before Android and iPhone. There was little to no security on dumb phones back then and you still needed the customer to put the PIN in and unlock their phone before using the Cellebrite. They came with a million different kinds of USB -> phone proprietary adapters, because mini and microUSB hadn’t bee adopted yet as a standard.

        Source: I used to do this sort of thing on a Cellebrite.

    • SpacePirate
      232 months ago
      link
      fedilink

      Most phones are locked with a four digit numerical PIN. The current technique is taking an image of the flash memory, and reflashing the memory after every few attempts.

      It still takes a bit longer than straight brute force without a temporal lockout, but it’s still pretty trivial.

      • saltesc
        152 months ago
        link
        fedilink

        If it was biometric login, even easier. Would’ve gotten in before thebody even got cold.

      • Magister
        142 months ago
        link
        fedilink

        15 years ago, yes, nowadays especially on iPhone this does not work at all

        • SpacePirate
          222 months ago
          edit-2
          2 months ago
          link
          fedilink

          It does when you have physical access to the RAM and storage, and a disassembly lab expressly configured for this purpose.

          This is the backbone for a number of forensic services offered to law enforcement, and an entire cottage industry. I know with certainty it was still feasible as of the iPhone 12, which is well inside of 15 years. I don’t believe the architecture in the 13 or 14 has changed significantly to make this impossible.

          With slightly earlier phones, tethered jailbreaks are often good enough, though law enforcement would more likely outsource to a firm leveraging Cellebrite or Axiom as the first step.

          • Negligent_EmbassyEnglish
            52 months ago
            edit-2
            2 months ago
            link
            fedilink

            How does this work with for example the Titan-M in pixels with graphene?

            I believe newer iphones have something similar (?)

          • OutsizedWalrus
            32 months ago
            link
            fedilink

            No, it doesn’t. This is what the Secure Enclave is for.

            You’re not storing these counters in system memory. You’re sending attempts to an isolated chip.

            • stetech
              112 months ago
              edit-2
              2 months ago
              link
              fedilink

              Yes, it does, if they have full access to the disassembled hardware and assuming research time & resources they could do practically anything. Such as emulating the Secure Enclave chip with a “fraudulent” version, changing all firmware running on any semiconductors in the phone, isolating storage, I don’t know the details, but let your imagination loose.

              Physical, uninterrupted access is unlikely, yet bad news for anyone’s threat model.

              • experbia
                42 months ago
                link
                fedilink

                not only physical access, but the authority to get any information necessary from the manufacturers of every component in the device. there is no question to them how any component operates, from silicon to software.

    • WindyRebel
      142 months ago
      link
      fedilink

      If it used face unlock, just have the dead body and prop the eyes open and you’re in?

      • Warl0k3
        32 months ago
        link
        fedilink

        If I remember right, samsung/iphone face unlock won’t work on a corpse since it relies (at least in part) on infrared constellations that incorporate patterns formed by subdermal capillary networks and death obviously disrupts those.

        • Skydancer
          42 months ago
          edit-2
          2 months ago
          link
          fedilink

          At the nation-state level with an ex-president target, pumping heated liquid through the arteries of a dead body isn’t much of an obstacle.

          Probably not actually what they did, but seriously people - a single biometric security factor is not going to secure anything when a government has the body and actually cares about getting in.

        • WindyRebel
          12 months ago
          link
          fedilink

          That’s very interesting if true! I didn’t realize it could be that advanced.

      • Maeve
        22 months ago
        link
        fedilink

        I shouldn’t have, but I smiled.

        I should clarify: I meant that if they’re law enforcement does the killing, cracking the phone takes much less time than it does when the phone belongs to the murder victim.

    • Fugtig Fisk
      72 months ago
      link
      fedilink

      Dude my niece can unlock my phone while i sleep by putting my finger on the sensor.

      I wouldn’t be surprised if it would recognize my face while sleeping too

    • PsychedSy
      22 months ago
      link
      fedilink

      Hopefully they don’t keep it classified. Maybe one of his friends got a “shooter likes this” message?

  • Jimmybander
    412 months ago
    link

    I wonder if they stuck his thumb on there. He is dead after all.

    • tiredofsametab
      182 months ago
      link
      fedilink

      I get the feeling I’m the only person who doesn’t use fingerprint readers (due to this and just some bad experiences with them not working right in their earlier days on phones).

      • catloafEnglish
        62 months ago
        link
        fedilink

        I also don’t, but I’m also not planning on committing crime.

      • PsychedSy
        22 months ago
        link
        fedilink

        I use them but know I can restart my phone to force a full login. Usually throwing it does the job.

    • catloafEnglish
      132 months ago
      link
      fedilink

      It says they had to send the phone to a lab in Virginia, so obviously not.

      • piecat
        352 months ago
        link
        fedilink

        So you cut off the thumb and ship it

        Or make a casting

        There’s a million ways they could do it

        • RvTV95XBeo
          312 months ago
          link
          fedilink

          Or you load the whole body into your passenger seat and drive it over there. Bonus points that this approach lets you use the carpool lane.

          • uhmbah
            22 months ago
            link
            fedilink

            “We could call the cops, Richard, but you know where we’d be spending our weekend. In some goddamned hot police station answering questions we don’t know the answers to.

        • andrew_bidlaw
          92 months ago
          link
          fedilink

          Fuck, Fuck, FUCK!

          Screams the agent as heating up a frozen finger with a lighter put it on fire.

        • absquatulate
          82 months ago
          link
          fedilink

          Walter:
          You want a toe? I can get you a toe, believe me. There are ways, Dude. You don’t wanna know about it, believe me.

          The Dude:
          Yeah, but Walter

          Walter:
          Hell, I can get you a toe by 3 o’clock this afternoon with nail polish.

    • JakJak98
      22 months ago
      link
      fedilink

      Do you mean like an eye tracking system for headsets in wt? I’ve always just used vr if I wanted that capability.

    • KanzarEnglish
      12 months ago
      link
      fedilink

      Yeah FRP unlock for a while was definitely bypassable on several phones, I unlocked a few that way. Not sure if it is still possible now, haven’t bothered tinkering. 😅

  • BaroqueInMind
    302 months ago
    edit-2
    2 months ago
    link
    fedilink

    Anyone know what kind of phone they reported they cracked? This should bring fear to anyone who cares even a little about privacy.

    Otherwise, it will become normal to question why you take a shit with the door closed (what are you hiding in there?) slippery slopes and what-not.

    • PriorityMotif
      362 months ago
      link
      fedilink

      There’s devices sold to law enforcement that will allow them access to most phones by plugging them in. Believe it or not, Israel is the biggest exporter of exploits and hacks.

      • BaroqueInMind
        02 months ago
        link
        fedilink

        Unless you please provide sources, I don’t fucking believe a word anyone says on the internet, and assume you are full of shit. Apologies if I sound rude, but I hate how people say shit like what you say and we all simply must take your word for it.

        • Negligent_EmbassyEnglish
          282 months ago
          edit-2
          2 months ago
          link
          fedilink

          He’s referring to cellebrite but others exist. It’s 100% real.

          look it up on youtube if you want

        • Killing_Spark
          252 months ago
          link
          fedilink

          Look Up NSO group for an example of an Israeli based company making their money with exploits. Their most famous product is Pegasus. It’s a zero click remote trojan for iPhones and android devices. It’s probably different from what was used here but I wouldn’t be surprised if other technology in this sector comes from the same region.

        • PrettyFlyForAFatGuy
          212 months ago
          link
          fedilink

          This was big news not that long ago. Pegasus spyware created by the Israeli NSO group.

          They discover or buy zero day exploits and rather than telling the manufacturer about them they incorporate them into their software and sell to governments around the world

          Pegasus was mainly about remote code execution but you can bet your bottom dollar they also have shit for opening phones in their posession

        • njm1314
          82 months ago
          link
          fedilink

          You sound rude cause you’re trying to. There were plenty of ways to write that without sounding like a dick.

        • PriorityMotif
          72 months ago
          link
          fedilink

          There’s a fun podcast called darknet diaries that covers this kind of thing.

          • aStonedSanta
            12 months ago
            link
            fedilink

            I need to start listening to that podcast. Seems right up my alley.

        • ipkpjersi
          12 months ago
          link
          fedilink

          People posted multiple sources so now you really just sound like a dick, even if you weren’t intending to, unless you were intending to.

    • dependencyinjection
      172 months ago
      link
      fedilink

      It doesn’t matter. If a nation state is a wants access, they’re gaining access.

      It’s probably an exploit from that Israeli cyber company that I forget the name of.

    • homura1650
      92 months ago
      link
      fedilink

      On the scale of privacy concerns, anything that starts with “they took physical possession of my device” ranks pretty low on my list.

    • Redredme
      72 months ago
      link
      fedilink

      Any (western designed) phone. It doesn’t matter. All your data belongs to us. Them.

    • Jimmybander
      32 months ago
      link

      I more curious for the android iphone debate. What the more popular phone amongst presidential assassins?

  • brbpostingEnglish
    282 months ago
    link
    fedilink

    Investigators couldn’t get in with 1234, so they shipped it to their lab to try 5678

    Wonder if this was one of the latest flagships or something older

  • QaspR
    152 months ago
    link
    fedilink

    Bro forgot to turn off his phone before they shot him.

    • tacosplease
      142 months ago
      link
      fedilink

      If he had fingerprint unlock it would be pretty easy to get in considering they have access to his fingers. Facial recognition less successful in this case.

      • ImADifferentBirdEnglish
        102 months ago
        link
        fedilink

        Most phones actually require pin/password on boot, and only let you use fingerprint/face unlock to unlock later in the session, as a security feature. So if he turned his phone off, even that wouldn’t work.

        • lost_faith
          12 months ago
          link
          fedilink

          My pixel 6 will randomly require me to put in the pin, even if its been on for weeks

      • PsychedSy
        32 months ago
        link
        fedilink

        Gotta turn the phone off so it makes you actually log in.

        • EatATacoEnglish
          42 months ago
          link
          fedilink

          On my pixel the pin required lock is up vol and power > lockdown.

          • PsychedSy
            22 months ago
            link
            fedilink

            Lmao. I don’t restart enough to have realized that’s an option. My failsafe was to chuck it so it restarts

            I do have my Nexus One hanging out somewhere in storage. Had to know all the tricks back then.

            • EatATacoEnglish
              22 months ago
              link
              fedilink

              This comes up every so often and it was something I learned during the same conversation, so I always just pass it along.

              For me the fingerprint unlock is just too convenient to not use, but it’s nice to know I can lock down my phone quickly if I need to.

              • PsychedSy
                12 months ago
                link
                fedilink

                Yeah. Ty. The toss metod isn’t as guaranteed as it once was.

  • Flying Squid
    142 months ago
    link
    fedilink

    I hate when that happens. Now they’ll have to take it to one of those repair places.

    • PunnyName
      52 months ago
      link
      fedilink

      Look, we have a bastardized version of right to self repair, so they should just give it back to the owner. He might have problems fixing it, but still.

  • FireTower
    122 months ago
    link
    fedilink

    Crooks, who left behind no immediately available manifesto or record of the attack, unlike many other modern assassination plots or mass shootings. He was registered as a Republican voter and donated $15 to a Democratic-allied organization but did not maintain a large online presence.

    Well this is thoroughly unhelpful.

    • Numenor
      102 months ago
      link
      fedilink

      Someone with the same name made the donation. At this point, we do not know if it was the assassin who made the donation, or an 80 year old with the same name.

      • MonkRomeEnglish
        152 months ago
        link
        fedilink

        IIRC the donation had his address on it, they do in fact know it was him.

        • FuglyDuckEnglish
          72 months ago
          link
          fedilink

          Or GrandPa Crooks.

          In any case, I’m still trying to figure out how closely-related the organization was. “Democrat allied” or whatever could be almost anything.

          • evidences
            72 months ago
            link
            fedilink

            The organization was ActBlue.

            ActBlue Charities Inc. is an American political action committee and fundraising platform established for serving left-leaning and Democratic nonprofits and politicians.

      • kromemEnglish
        52 months ago
        link
        fedilink

        It literally has the address of his house on it.

    • imPastaSyndrome
      22 months ago
      link
      fedilink

      It’s the same info we knew 2 days ago, so and nothing was added, from the phone

  • serenissi
    42 months ago
    link
    fedilink

    unless brute force was done, it might be a cold boot, usb exploit or bootloader exploit by physically accessing the storage.