
German authorities managed to break the man's iPhone, and the app's health device data are used as evidence in a murder and rape investigation. Beware, the story is very bleak.
He claimed that a man named Hussein K. He raped and killed a 19-year-old woman who abandoned her body in a river. He has been on trial in Germany since September. But now, data from the original health app on Man's iPhone may appear to be the key to unraveling the issue.
Details of the trial were blurry, according to motherboard. The bulletin said that the German authorities cannot agree to the man's real name, and it is clear that his last name has been withheld, and there is a missing part of the time in analyzing digital data during the period of the crime.
But while Hussain K. Giving the police an iPhone passcode, investigators were able to bypass the lock screen by hiring a third-party company, Munic, (whose name has not been released to the public). This is very noticeable, as it will be one of the first known cases of the iPhone lock screen lock mechanism.
Investigators are said to use data from the original Health app to link K. Hussain to the crime. Specifically, the activity data that the app recorded as "stair climbing". Authorities were able to correlate the activity with the time the man had dragged his victim down to the river and climbed up again, the motherboard said.
When the investigators repeated his apparent movements at the crime scene, they found that their private health activity was closely related to the activity recorded on Hussein K.
This is not the first time that activity data has been proven to be a key element in a homicide investigation. In April, a Connecticut man was accused of killing his wife after her Fitbit activity contradicted his version of events. Indeed, digital data is increasingly becoming a common element in criminal cases.
On the other hand, this is what appears to be the first known case of iPhone 6 or later being cracked by the authorities. Local media in Germany describe the device as an iPhone 6s. This is noticeable because all iPhones newer than the iPhone 5S are installed with the Apple Secure Pocket. Many law enforcement agencies around the world are still unable to crack iPhones in their evidence rooms.
Of course, the man's iPhone 6s may have been running an old version of iOS with known vulnerabilities that the Munich company was able to exploit. There is currently no word on which iPhone program was running.
If the iPhone is properly debugged with the latest iOS version, then the case raises other uncomfortable privacy implications. Specifically, it indicates that even iPhones with the infamous Apple encryption are still vulnerable to cracking.
Comments
Post a Comment