FBI unlocks Trump shooter’s phone in just 40 minutes with assistance from external sources

Published:

spot_img

FBI Unlocks Phone of Trump Shooter with Help from Israeli Cyber Intel Firm

The FBI has successfully unlocked the cell phone of the man who attempted to assassinate former President Donald Trump at a campaign rally last weekend. With the help of an Israeli cyber intel firm, the FBI gained access to the shooter’s phone in just 40 minutes after multiple failed attempts.

The shooter, Thomas Matthew Crooks, was shot dead by Secret Service snipers after firing at Trump from a rooftop at the Pennsylvania rally. The FBI seized Crook’s phone and other electronic devices in the aftermath of the shooting, hoping to uncover clues about his motivation.

After struggling to unlock the phone using their own resources, the FBI turned to the Israeli digital intelligence company Cellebrite for assistance. With the help of Cellebrite’s forensic software tools, the FBI was able to access the device and extract valuable data.

The FBI’s breakthrough comes amidst controversy surrounding Israeli spyware firms like Cellebrite. These firms have faced criticism for providing powerful hacking tools to governments and bad actors around the world. Pegasus spyware, created by the NSO group, has been used to target journalists, dissidents, and government advocacy groups.

Despite the success in unlocking the shooter’s phone, the FBI and Cellebrite have not disclosed the specific methods used. However, reports suggest that images of both President Joe Biden and Trump were found on the device, raising further questions about the shooter’s motives.

spot_img

Related articles

Recent articles

Walmart Shoppers Beware: Major Scam Hits Millions

A large-scale robocall scam is targeting millions of Walmart shoppers in the U.S. by impersonating the retailer’s customer service and inventing fake high-value purchases...

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...

Researchers Find Over 30 Vulnerabilities in AI Coding Tools That Risk Data Theft and RCE Attacks

Unveiling the IDEsaster: Security Flaws in AI-Powered Coding Environments Overview of Recent Vulnerabilities A recent investigation has uncovered over 30 security vulnerabilities lurking within popular AI-powered...

XIXILI Transforms Plus-Size Lingerie in Malaysia

## A New Era for Plus Size Lingerie: Introducing XIXILI’s Collection ### Redefining Lingerie Shopping KUALA LUMPUR, MALAYSIA - In a bold move that reshapes the...