FBI took 2 days to hack Trump rally shooter's phone. Did they find anything?
On Monday, the FBI issued a press statement revealing that it gained access to the password-protected phone of Thomas Matthew Crook, the shooter behind an assassination attempt on former president Donald Trump at the July 13 rally in Butler, Pennsylvania.
However, breaking into Crook's phone didn't come without challenges. According to the New York Times, as of Sunday, the FBI had trouble breaking into his device, prompting the law enforcement agency to send the phone to the bureau's lab in Quantico, Virginia.
Two days later, the FBI cracked the phone.
You May Also Like
What did the FBI find on the cracked phone?
Lab technicians at Quantico sifted through Crook's texts, emails, and other digital footprints, but according to the New York Times, they "did not immediately find clear evidence of a potential motive." The FBI's specialists, the publisher reports, also couldn't find any new details about the gunman's "possible connections to other people."
However, the investigation is still in the early stages. The FBI isn't just analyzing his phone, but all of his electronic devices. The law enforcement agency is also looking into Crook's social media activity and browser history.
It's unclear which phone Crook had in his possession when the FBI obtained it. Plus, how the Quantico technicians bypassed Crook's password-protected phone is nebulous, too.
According to The Verge, which cited a security researcher named Cooper Quintin, law enforcement agencies typically use Cellebrite, a mobile device extraction tool, to break into locked phones. Quintin speculated that the field office in Pennsylvania likely didn't have the advanced phone-cracking tool needed to hack Crook's device, so they sent it to Quantico.
Again, we don't know which phone Crook had, but if it was an iPhone, the FBI would have to rely on its own resources to crack the device. As The Verge pointed out, in the past, Apple has pushed back on the FBI's requests to bypass security protections. In 2015, for example, Apple refused to help the bureau break into the iPhone of the San Bernadino shooter. In the end, the FBI had to enlist the help of an Australian security firm to unlock the shooter's phone.
Mashable reached out to the law enforcement agency for comment; we will update this article once we get a response.
Kimberly Gedeon, at Mashable since 2023, is a tech explorer who enjoys doing deep dives into the most popular gadgets, from the latest iPhones to the most immersive VR headsets. She's drawn to strange, avant-garde, bizarre tech, whether it's a 3D laptop, a gaming rig that can transform into a briefcase, or smart glasses that can capture video. Her journalism career kicked off about a decade ago at MadameNoire where she covered tech and business before landing as a tech editor at Laptop Mag in 2020.