Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Elusive Passcode: The FBI's Struggle to Access Eric Adams' Cellphone


The FBI's struggle to access New York City Mayor Eric Adams' cellphone has raised questions about the effectiveness of password protection and the limits of investigative power.

  • The FBI is struggling to access New York City Mayor Eric Adams' password-protected cellphone.
  • Adams initially handed over two phones, but not his personal device, and claimed he changed the password a day before turning it in.
  • The Fifth Amendment right against self-incrimination may be protecting Adams from revealing his phone's passcode.
  • The FBI faces significant challenges in breaking into Adams' phone due to its advanced security features.
  • The case highlights the complexities of investigating cellphone data and the reliance on conventional methods over cutting-edge technology.



  • The saga surrounding New York City Mayor Eric Adams' cellphone has taken a peculiar turn, with federal prosecutors still grappling with the password-protected device. Despite changing the passcode just two days prior to handing it over to investigators, the FBI remains unable to access the contents of the phone.

    According to charging documents, Adams initially handed over two phones to investigators but did not have his personal device on him at the time. It was only after he turned in his cellphone that he claimed to have changed the password a day prior, following learning about the investigation, and couldn't remember it. This revelation has raised eyebrows among experts, who argue that Adams' excuse may not be entirely credible.

    The Fifth Amendment right against self-incrimination plays a crucial role in this situation, with several courts having ruled that investigators cannot compel a suspect to reveal their phone password. Phone passcodes are often considered a form of "testimonial" evidence, as they require a person to reveal their thoughts and intentions. However, the presence of Face or Touch ID on Adams' device would have potentially allowed the FBI to unlock his phone using biometric authentication.

    The FBI's inability to access Adams' cellphone has been likened to a "significant wild card," with experts warning that breaking into the device could be "monumentally difficult." Despite this, agents at the FBI's Pittsburgh field office were able to crack the phone of the Trump rally shooter in under an hour. However, the same success may not be guaranteed for Adams' device.

    The use of an unreleased tool from the Israeli mobile forensics company Cellebrite reportedly helped investigators unlock the Trump shooter's phone. While this technology has proven effective in similar situations, its application to Adams' case is still uncertain. The fact that experts believe breaking into his phone could be a "monumentally difficult" task suggests that the FBI will have to rely on more conventional methods to access the contents of the device.

    The investigation into Adams' activities is ongoing, with charges including fraud, bribery, and soliciting donations from foreign nationals. As the case unfolds, it remains to be seen how much information will be uncovered from his cellphone. One thing is certain, however: the elusive passcode has become a central point of contention in the trial.



    Related Information:

  • https://www.theverge.com/2024/10/2/24260626/fbi-eric-adams-locked-phone-forgotten-changed-password

  • https://nypost.com/2024/09/28/us-news/experts-warn-that-feds-will-face-difficulty-unlocking-adams-encrypted-cell-phone/


  • Published: Fri Oct 4 10:37:43 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us