Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

After Some Trial and Error, FBI Cracks Trump Shooter's Samsung Phone

The FBI used tech from Cellebrite, which had to provide the agency with unreleased software. Had the shooter used a newer iPhone, the feds may have been out of luck, leaked documents suggest.

July 18, 2024
A Cellebrite device hacking a smartphone A Cellebrite device hacking a smartphone (Credit: Jack Guez/AFP via Getty Images)

The FBI unlocked the phone belonging to the man who tried to assassinate former President Donald Trump using technology from Cellebrite, an Israeli digital forensics firm. But internal documents suggest that the effectiveness of the company's technology varies and may not work with iPhones running the newest versions of iOS.

As Bloomberg reports, the shooter owned a "newer Samsung model that runs Android’s operating system." But while the Pittsburgh FBI bureau had a Cellebrite license, they couldn't crack the shooter's passcode. Cellebrite responded by providing the FBI with unreleased software, which allowed the feds to get into the smartphone in about 40 minutes.

As 404 Media notes, the incident "highlights the constant cat and mouse game between hardware and operating manufacturers like Apple and Google, and the hacking companies looking for vulnerabilities to exploit."

Leakers recently provided 404 Media with private Cellebrite documents that the company usually only shows to customers; one for iOS and one for Android. They show that Cellebrite technology may have difficulty cracking iPhones running iOS 17.4 and up.

Cellebrite's Supersonic Brute Force feature only works on iPhone XR and 11 models running iOS 17.1 through 17.3. On the iOS doc, support for those OSes is listed as "coming soon" to the iPhone 12, 13, and 14 and "In Research" for the iPhone 15. On iOS 17.4 and above, it's listed as "In Research" for all models. So if you're an agency trying to unlock a suspect's iPhone, you better hope they haven't upgraded in awhile.

It's not clear which Samsung phone the shooter had. The Android doc provided to 404 Media says Cellebrite is "fully supported" on the Galaxy S24, S24+, S24 Ultra, A05, A15, and A25. But your mileage may vary depending on which version of Android the phone is running and what you want to do, according to another chart in the doc.

According to Cellebrite's website, over 6,900 public safety agencies and enterprises use its tech in over 100 countries. That includes all 50 US states and over 100 federal agencies. In 2019, for example, US Immigration and Customs Enforcement (ICE) said it would spend at least $30 million to buy smartphone-hacking technology from Cellebrite.

Tech companies have tangled publicly with the feds over their requests to help them get into suspects' phones. Most notably, Apple declined to create an iOS backdoor so that the FBI could access a phone that belonged to one of the shooters in a December 2015 terrorist attack that killed 14 people in San Bernardino, California.

"We have no more information about this phone," CEO Tim Cook said at the time. "The only way to get information…would be to write a piece of software that we view as sort of the software equivalent of cancer."

Cellebrite was rumored to be helping the FBI unlock that iPhone, but it was later revealed that the FBI used technology from Australia-based Azimuth Security to crack the smartphone, The Washington Post reported in 2021.

Like What You're Reading?

Sign up for Fully Mobilized newsletter to get our top mobile tech stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

About Joe Hindy

Contributor

Hello, my name is Joe and I am a tech blogger. My first real experience with tech came at the tender age of 6 when I started playing Final Fantasy IV (II on the SNES) on the family's living room console. As a teenager, I cobbled together my first PC build using old parts from several ancient PCs, and really started getting into things in my 20s. I served in the US Army as a broadcast journalist. Afterward, I served as a news writer for XDA-Developers before I spent 11 years as an Editor, and eventually Senior Editor, of Android Authority. I specialize in gaming, mobile tech, and PC hardware, but I enjoy pretty much anything that has electricity running through it.

Read Joe's full bio

Read the latest from Joe Hindy