The FBI has enlisted Israeli tech firm Cellebrite to assist in its investigation into Thomas Matthew Crooks, the 20-year-old Pennsylvania man who attempted to assassinate former US President Donald Trump at a rally on July 13, according to Fox news.
Crooks’s actions, which tragically resulted in the death of a supporter and left two others critically injured, have led to a complex inquiry into his motives and connections.
Cellebrite, renowned for its ability to access data from smartphones across various operating systems and tech platforms, was hired to help decode Crooks’s phone. Within 24 hours of the attack, the firm successfully accessed the device, although it remains uninvolved in the investigation’s broader findings, according to a source close to the case, reported Fox news.
The FBI has not confirmed or denied Cellebrite’s involvement, stating it does not comment on the specifics of its investigative tools or techniques. The investigation extends beyond merely accessing Crooks’s phone; it includes seeking information from providers of encrypted messaging services, and the bureau is still awaiting responses from these entities.
During the attack, Crooks managed to strike Trump in the ear, causing negligible physical harm to the former president but critically wounding David Dutch, 57, and James Copenhaver, 74. Crooks also fatally injured 50-year-old Corey Comperatore with a stray bullet.
FBI Deputy Director Paul Abbate, during a hearing on Capitol Hill, revealed that some of Crooks’s online applications were encrypted, complicating efforts to extract information. “I think we’ve experienced a range of returns because some of the applications that he was using online were encrypted in nature,” Abbate said in response to questions from South Carolina Republican Senator Lindsey Graham, as per Fox news.
David Gee, chief marketer at Cellebrite, explained that their tools are designed to help access encrypted apps and hidden data once legal authorisation is obtained. Most modern smartphone applications use encryption to protect data, which can be stored outside the US. “Whether that application was created in the US, in Europe, in Asia, the chances are that they have some encryption built into them to ensure that the data is transferred backwards and forwards, and stored on the device, generally encrypted,” Gee said.
The investigation has encountered difficulties due to Crooks’s use of encrypted apps and overseas data storage. Despite these hurdles, Abbate claimed that there was no confirmed information linking Crooks to any co-conspirators, either foreign or domestic.
The FBI has managed to access some of Crooks’s emails, but encrypted communications remain inaccessible. Authorities are also awaiting responses to legal requests from the companies behind the encrypted apps.
Trump has announced plans to return to Butler for another rally to honour Corey Comperatore, the bystander killed in the attack. The rally will serve as a tribute to the victim and a symbol of resilience in the face of violence.
As the investigation progresses, federal authorities continue to examine social media activity and other information related to the attack, seeking to uncover any additional links or motives behind Crooks’s assassination attempt.
Crooks’s actions, which tragically resulted in the death of a supporter and left two others critically injured, have led to a complex inquiry into his motives and connections.
Cellebrite, renowned for its ability to access data from smartphones across various operating systems and tech platforms, was hired to help decode Crooks’s phone. Within 24 hours of the attack, the firm successfully accessed the device, although it remains uninvolved in the investigation’s broader findings, according to a source close to the case, reported Fox news.
The FBI has not confirmed or denied Cellebrite’s involvement, stating it does not comment on the specifics of its investigative tools or techniques. The investigation extends beyond merely accessing Crooks’s phone; it includes seeking information from providers of encrypted messaging services, and the bureau is still awaiting responses from these entities.
During the attack, Crooks managed to strike Trump in the ear, causing negligible physical harm to the former president but critically wounding David Dutch, 57, and James Copenhaver, 74. Crooks also fatally injured 50-year-old Corey Comperatore with a stray bullet.
FBI Deputy Director Paul Abbate, during a hearing on Capitol Hill, revealed that some of Crooks’s online applications were encrypted, complicating efforts to extract information. “I think we’ve experienced a range of returns because some of the applications that he was using online were encrypted in nature,” Abbate said in response to questions from South Carolina Republican Senator Lindsey Graham, as per Fox news.
David Gee, chief marketer at Cellebrite, explained that their tools are designed to help access encrypted apps and hidden data once legal authorisation is obtained. Most modern smartphone applications use encryption to protect data, which can be stored outside the US. “Whether that application was created in the US, in Europe, in Asia, the chances are that they have some encryption built into them to ensure that the data is transferred backwards and forwards, and stored on the device, generally encrypted,” Gee said.
The investigation has encountered difficulties due to Crooks’s use of encrypted apps and overseas data storage. Despite these hurdles, Abbate claimed that there was no confirmed information linking Crooks to any co-conspirators, either foreign or domestic.
The FBI has managed to access some of Crooks’s emails, but encrypted communications remain inaccessible. Authorities are also awaiting responses to legal requests from the companies behind the encrypted apps.
Trump has announced plans to return to Butler for another rally to honour Corey Comperatore, the bystander killed in the attack. The rally will serve as a tribute to the victim and a symbol of resilience in the face of violence.
As the investigation progresses, federal authorities continue to examine social media activity and other information related to the attack, seeking to uncover any additional links or motives behind Crooks’s assassination attempt.
Source : Times of India