You know, the same thing happens to me every time the FBI takes my phones.

  • @wavebeam
    link
    912 months ago

    I really hate to defend this guy because he clearly sucks. But honestly: smart move. Your phone password and much of the contents of your phone should be considered speech and you shouldn’t be compelled to testify against yourself. That said, if this phone was government property then he shouldn’t have been the only one capable of unlocking it, which is a policy failure.

    • growsomethinggood ()
      link
      fedilink
      522 months ago

      He’s a cop, of course he knows how law enforcement will go through and find something incriminating

    • @thrawn
      link
      212 months ago

      Recorded speech about engaging in crimes is often acceptable evidence. It’s probably the same with written messages.

      I guess it’s up to the accused to prevent law enforcement from acquiring what they said, whether it be preventing recording, preventing police from sifting through mail or unsecure communications, or preventing police from acquiring the accused’s copy of potentially illegal communications. Which he is currently attempting.

      I don’t blame him for trying, and would agree on a lesser extent that he is right to prevent self incriminating now. But copied communication as acceptable evidence is pretty settled in law by now.

    • @[email protected]OP
      link
      fedilink
      62 months ago

      I work in IT. Five bucks says their government-issued phones can be unlocked by an MDM (Mobile Device Management) profile.

  • @[email protected]OP
    link
    fedilink
    772 months ago

    “Adams claimed that after he learned about the investigation into his conduct, he changed the password,” and he “increased the complexity of his password from four digits to six,” the document reads. Adams said he did this to stop members of his staff “from inadvertently or intentionally deleting the contents of his phone because, according to Adams, he wished to preserve the contents of his phone due to the investigation.”

    Sure thing, bud.

    • Jay
      link
      fedilink
      English
      192 months ago

      Wow… I could dream up more realistic excuses in middle school.

    • masterofn001
      link
      fedilink
      122 months ago

      6 digits is brute force hackable in about 1 second.

      Also, isn’t lying to the FBI another crime?

        • masterofn001
          link
          fedilink
          17
          edit-2
          2 months ago

          Clone.

          Repeat.

          Also, cellebrite.

          Edit: if people think forensics uses the actual device that would severely hinder any investigation.

          That would risk tampering, or destroying evidence.

          Copies are made.

          Technology exists.

          • @TrickDacy
            link
            42 months ago

            And the cloning can happen thousands of times in one second?

            • @stardom8048
              link
              English
              82 months ago

              According to reporting, they have actually done this before.

              Most of the discussion I’ve read about this is along the lines of: clone the drive on the phone and then brute force the clones (circumventing the lockout issue: if you get locked out just keep trying on a new clone).

              In a relatively famous case, the FBI cracked the password on the San Bernardino shooter’s phone, but did not explain how they did it: https://www.vox.com/2016/3/29/11325134/apple-iphone-fbi-san-bernardino-case-ends

              Here is a company selling a brute force module for iPhones, although they don’t explain how they get around the lockout issue: https://belkasoft.com/unlocking-ios-devices-with-brute-force

              Here is another article about a company that claims to be able to brute force iPhone passcodes: https://www.vice.com/en/article/how-to-brute-force-iphones-graykey/

              • @disguy_ovahea
                link
                4
                edit-2
                2 months ago

                The FBI didn’t crack it. It was done by Cellebrite. I worked for Apple during the San Bernardino case. The suspect had an iPhone 5c, a model that did not have a Secure Enclave, and was vulnerable to brute force hacking through the Lightning Port. The Secure Enclave was released with the iPhone 5s, along with Touch ID, preventing peripheral access through the Lightning Port after the iPhone has been restarted.

  • @[email protected]
    link
    fedilink
    English
    262 months ago

    I wouldn’t be surprised if at some point, Eric Adams said something a long the lines “If you didn’t do anything illegal, you have nothing to hide”.

  • @Myxomatosis
    link
    25
    edit-2
    2 months ago

    Damn, he must be in some deep shit because he’s pulling out Trumpian excuses.

    • themeatbridge
      link
      352 months ago

      I mean, this is an obvious lie.

      But it’s a smarter lie than Trump usually tells. Giving up your passcode is self incriminating, but a court can still compel you to do it. If you claim to have forgotten it, the court can’t compel you to remember.

      A Trumpian lie would be like “I never had a phone, and people said it was the best phone, better than Nokeeya, better than Obamaphone, nobody had ever seen a phone like it, people would come up to me and say, I’ve never seen a better phone. A perfect phone, they’d tell me, I don’t know. The password, I shouldn’t even tell you this, but it’s so good, it’s the name of a hooker I used to know in Atlantic City. She was, well, she was young and looked a lot like my daughter Ivanka, very smart woman, super smart, and sexy, smart though. Ivanka was smart, not Brandy, but she was very good too. She said I had the biggest hands of anybody, any hands, she’d ever seen. Brandy, not Ivanka said that, although Ivanka also says I have big hands. But no, to answer the question, I never touched Brandy, never even met her, she’s not really my type, if you know what I mean. She’s not a very good person, at least that’s what they tell me, because I don’t know, I never met her, bad person, bad.”

      • @[email protected]
        link
        fedilink
        11
        edit-2
        2 months ago

        Its a mess, but largely, courts cannot compel you to give up your phone password, because of the 5th amendment. They can force you to unlock a phone secured with biometrics, as that isn’t compelled speech.

        • themeatbridge
          link
          62 months ago

          Sort of, but also it hasn’t gone to the SCOTUS yet. Plus:

          There is a difference between communicating a passcode to police and physically providing an unlocked phone to police, the court said. Though these two acts “may be functionally equivalent in many respects, this functional equivalency is not dispositive under current Fifth Amendment jurisprudence,” the court said. “We conclude that the act-of-production analytical framework makes sense only where law enforcement compels someone to perform an act to unlock an electronic device.”

          The Utah case was an officer demanding to know the passcode. A court in New York might decide that the defendant can be compelled to enter his password and hand over an unlocked phone.

          But if he’s forgotten the password, then the phone is simply locked until somebody hacks into it.

  • @DBT
    link
    252 months ago

    If anyone ever takes my phone and asks for the password, I forgot it. Guilty or innocent, doesn’t matter.

    • El Barto
      link
      42 months ago

      You’re right. But it’s not his phone. It’s his employer’s phone.

      • @DBT
        link
        62 months ago

        Then they shouldn’t need the password…

        • El Barto
          link
          12 months ago

          I can’t disagree with that. Which makes it worse - tampering with evidence.

  • @Nunar
    link
    212 months ago

    Everyone should do this!!! No one who wants your phone code is your friend! Police, feds, spouses/partners. If anyone wants to unlock your phone, they’re looking to incriminate.

    • @[email protected]OP
      link
      fedilink
      92 months ago

      He’s an elected public servant. Regardless of whether or not we want to protect ourselves from prosecution, he’s supposed to be accountable for his actions and he’s deliberately spoiling the investigation.

    • El Barto
      link
      82 months ago

      No, not everyone. If I’m a public servant, I should be using work phones for work stuff. And I should expect any government-sanctioned investigation office to have access to it.

      It would be a different thing if it was his personal phone. In that case, I could agree with you.

  • Th4tGuyII
    link
    fedilink
    192 months ago

    From a pro-privacy standpoint changing your passwords to something you can’t remember is absolutely the right thing to do to prevent yourself from being compelled to give up any passwords…

    But in light of him being a government official tampering with his government issued phone to “accidentally” prevent it being used to investigate official wrongdoing, that act becomes highly suspicious, and (in the FBI’s shoes) would only give more incentive to hack into his phone.

  • @MegaUltraChicken
    link
    142 months ago

    If it was turned on, they’ve likely already gotten it unlocked. If he had time to turn it off he might buy himself some time but I seriously doubt they would even charge him without having all the receipts already anyways.

    In short, this dude is FUCKED.

  • @[email protected]
    link
    fedilink
    52 months ago

    I have not forgotten their training on how to put a knee on someone’s neck. Should I subdue the suspect?

  • Beacon
    link
    fedilink
    32 months ago

    Does Apple/Android have a 2-factor authentication system to reset a phone’s passcode?

    • @[email protected]OP
      link
      fedilink
      32 months ago

      Apple has a feature to restrict changing the passcode when not in a typical geolocation. This is to prevent thieves from shoulder-surfing your passcode in a bar and then snatching the phone and changing the code. If you’re at home or at work (where the phone recognizes your typical behavior / location), it shouldn’t activate. In a random location, it would. I don’t know how well that works. It’s a relatively recent feature (within a year or so, I think).