Federal investigators are analyzing device’s content, although it is unclear how agency gained access

The FBI has gained access to the phone of the suspected gunman who opened fire on Donald Trump’s rally and is analyzing the device’s contents, the agency stated in a press release on Monday afternoon. The shooting, which killed one audience member and left Trump bleeding from one ear, is being investigated as an assassination attempt.

Authorities have been working to determine the motive behind the attack at Trump’s campaign rally on Saturday, but no clear picture has yet emerged. The gunman, identified as 20-year-old Thomas Matthew Crooks by the FBI, was shot and killed in the incident.

Federal investigators announced on Sunday that they had obtained Crooks’s cellphone, but had issues with bypassing its password protections to access the data within. FBI investigators then shipped the phone to a lab in Virginia, where agents successfully gained access, per the bureau’s press release.

  • BaroqueInMind@lemmy.one
    link
    fedilink
    arrow-up
    34
    arrow-down
    4
    ·
    edit-2
    4 months ago

    Anyone know what kind of phone they reported they cracked? This should bring fear to anyone who cares even a little about privacy.

    Otherwise, it will become normal to question why you take a shit with the door closed (what are you hiding in there?) slippery slopes and what-not.

    • PriorityMotif@lemmy.world
      link
      fedilink
      arrow-up
      39
      arrow-down
      3
      ·
      4 months ago

      There’s devices sold to law enforcement that will allow them access to most phones by plugging them in. Believe it or not, Israel is the biggest exporter of exploits and hacks.

      • BaroqueInMind@lemmy.one
        link
        fedilink
        arrow-up
        23
        arrow-down
        24
        ·
        4 months ago

        Unless you please provide sources, I don’t fucking believe a word anyone says on the internet, and assume you are full of shit. Apologies if I sound rude, but I hate how people say shit like what you say and we all simply must take your word for it.

        • Killing_Spark@feddit.de
          link
          fedilink
          arrow-up
          25
          ·
          4 months ago

          Look Up NSO group for an example of an Israeli based company making their money with exploits. Their most famous product is Pegasus. It’s a zero click remote trojan for iPhones and android devices. It’s probably different from what was used here but I wouldn’t be surprised if other technology in this sector comes from the same region.

        • PrettyFlyForAFatGuy@feddit.uk
          link
          fedilink
          arrow-up
          21
          ·
          4 months ago

          This was big news not that long ago. Pegasus spyware created by the Israeli NSO group.

          They discover or buy zero day exploits and rather than telling the manufacturer about them they incorporate them into their software and sell to governments around the world

          Pegasus was mainly about remote code execution but you can bet your bottom dollar they also have shit for opening phones in their posession

        • njm1314@lemmy.world
          link
          fedilink
          arrow-up
          8
          ·
          4 months ago

          You sound rude cause you’re trying to. There were plenty of ways to write that without sounding like a dick.

        • ipkpjersi
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          4 months ago

          People posted multiple sources so now you really just sound like a dick, even if you weren’t intending to, unless you were intending to.

    • dependencyinjection@discuss.tchncs.de
      link
      fedilink
      arrow-up
      17
      ·
      4 months ago

      It doesn’t matter. If a nation state is a wants access, they’re gaining access.

      It’s probably an exploit from that Israeli cyber company that I forget the name of.

    • homura1650@lemm.ee
      link
      fedilink
      arrow-up
      10
      arrow-down
      1
      ·
      4 months ago

      On the scale of privacy concerns, anything that starts with “they took physical possession of my device” ranks pretty low on my list.

    • Redredme@lemmy.world
      link
      fedilink
      arrow-up
      10
      arrow-down
      3
      ·
      4 months ago

      Any (western designed) phone. It doesn’t matter. All your data belongs to us. Them.