Mobile devices have become a prevalent type of digital evidence in both civil and criminal cases, providing key information such as location, text messages, call logs, browser history, and more—once the device can be accessed. The ongoing struggle of federal investigators to unlock New York City Mayor Eric Adams’ cell phone for nearly a year highlights the growing complexity of mobile device encryption. Now equipped with advanced security protocols, accessing a locked device can be a significant challenge—but not always impossible.
How Often Can Devices Be Unlocked?
Passcode breaking depends on the device’s make, model, security features, and physical condition—success cannot be guaranteed. All devices are not created equal and factors like the type of encryption, complexity and length of the passcode, and the device’s operating system (OS) can make the process easier or create serious roadblocks.
The Wild Card: Modern Encryption
The FBI’s inability to unlock the mayor’s cell phone after almost a year indicates that investigators are likely dealing with high-level encryption that even advanced tools such as Cellebrite and Graykey might struggle to crack. Apple’s iOS, for example, uses military-grade encryption that protects all data on the device. The encrypted passcode is then stored on its own processor, called the Secure Enclave, this adds an extra layer of security because even if the main processor is compromised, the Secure Enclave would not be affected. Android devices offer similar protections that help to protect devices from unauthorized access.
Other Factors That Hinder Passcode Breaking
- Complex Passcodes: A strong passcode goes a long way in protecting devices. A four-digit pin can be cracked in less time and usually with a higher success rate than passcodes of six or more digits. However, this may not always be the case as some assume the longer sequence provides more security, opting for simpler, easier-to-remember 6-digit passwords that may be easier to crack.
- Timely Operating System Updates: Time is also a major factor that works against cell phone forensics experts when unlocking devices. Manufacturers may release updates that patch vulnerabilities, further hindering access to a cell phone. In Mayor Adams’ case, the decryption process could be slower if the phone was updated with the latest iOS software when it was seized.
- Broken or Damaged Devices: Hardware damage or destruction significantly impacts the tools used to unlock a phone. Most tools rely on a functioning operating system, power, or USB connection to work. Damaged ports or a broken screen can make passcode breaking virtually impossible.
- Data Wipe Settings: Most modern devices can be configured to wipe all data after a certain number of failed passcode attempts.
With passcode breaking and all cell phone forensic investigations, it is important to remember that although the goal is accessing the device and its contents, the methods used must be forensically sound to protect the integrity of the data. It is also critical that techniques used to unlock devices adhere to legal standards, aiding their admissibility in court. Whether it’s for a legal case or a personal matter, working with a cell phone forensics expert who understands the intricacies of modern encryption as well as cell phone hardware and software is essential in not only cracking the code but also ensuring that the device’s data remains uncompromised.