Here we go again: another mass shooting, another killer’s iPhone that police can’t get into, and potentially another legal battle over Apple’s encryption.
Earlier in the month, the FBI announced it couldn’t break into the iPhone of Devin Patrick Kelley, the shooter in the mass murder of 26 people in a church in Sutherland Springs, Texas.
Now, court records seen by the San Antonio Express-News show that two days after the FBI’s announcement – and its bemoaning of the way Apple’s encryption hampers law enforcement – a Texas Ranger obtained search warrants for data belonging to the Sutherland Springs killer.
One warrant, issued on 9 November, is for files stored on an iPhone SE found near Kelley’s body and on a second LG phone. Another warrant seeks files stored in Kelley’s iCloud account – specifically, phone
Read more at: https://nakedsecurity.sophos.com/2017/11/22/apple-served-with-warrant-for-texas-mass-killers-icloud-data/
Will Apple again find itself at odds with authorities in a high-profile case involving unlocking a gunman’s iPhone?
The gunman in the mass shooting in Sutherland Springs, Texas earlier this month was found with an iPhone, and Texas authorities have served Apple with a warrant seeking access to his information.
This might bring to mind another infamous mass shooting that thrust Apple and an iPhone into the spotlight — the 2015 San Bernardino attack in which Apple refused the FBI’s request to fashion a “back door” to unlock one of the shooters’ iPhones. The Silicon Valley giant’s reason: It did not want to compromise other iPhone users’ privacy and security.
Get tech news in your inbox weekday mornings. Sign up for the free Good Morning Silicon Valley newsletter.
In this case, though, Apple says it offered help to the
Read more at: http://www.siliconbeat.com/2017/11/20/133219/