FBI Accesses Thomas Matthew's Phone After Attempted Assassination of Trump

The FBI announced Monday that it has gained access to the phone of Thomas Matthew Crooks, the suspect in the failed assassination attempt against former President Donald Trump. The agency continues to investigate the motives behind the attack.

๐ŸŒ Research in Progress

The FBI indicated that the investigation into Saturday's attack is being treated as an attempted murder and a possible act of terrorism. It is still in the initial stages.

"Our technicians have gained access to Thomas Matthew Crooks' phone and are analyzing his electronic devices," the FBI said in a statement. "The search of his home and vehicle has been completed."

donald trump rally

Additionally, the agency has conducted nearly 100 interviews with law enforcement officers, event attendees and other witnesses.

At a news conference, FBI officials reported that they have not yet been able to identify an ideology or find clear evidence of a motive behind the shooting. The AR-556 rifle used in the attack was purchased legally by Crooks' father.

There is no indication of mental health issues in the suspect, and a preliminary review of his recent calls and messages has revealed no relevant information about his motivation.

Attack Details

During the attack at a rally in Butler, Pennsylvania, a bullet grazed Trump's right ear. In the incident, one supporter was killed and two others were injured before Secret Service agents shot Crooks, 20, to death.

The Secret Service has promised to review its security protocols after the attack on Trump, who was injured in an event that shook the country just months before the November elections.

Techniques Used to Access the Telephone

The FBI used Israeli software Cellebrite to access Crooks' phone. This program is known for its ability to overcome security measures on smartphones, both Android and Apple.

Cellebrite It is commonly used in espionage and national security operations. Although the cost of this software is not openly published, it is estimated that the monthly license is around $100,000. In the United States, the FBI and other judicial agencies use this software to obtain information from devices.

๐Ÿ’ก Other Advanced Techniques

The FBI used several sophisticated techniques to access Thomas Matthew's phone:

Collaboration with Ethical Hackers

The FBI often collaborates with ethical hackers and technology companies that have the necessary infrastructure for these procedures. Although these collaborations may be controversial, they are essential to the success of the research.

matthew crooks donald trump

Digital Forensic Analysis

Digital forensics involves the investigation of digital evidence. An exact copy of the device storage is created for examination without altering the original, preserving the integrity of the information.

Hardware Reverse Engineering

This technique involves physically disassembling the device to examine its internal components. Experts can remove the memory chip and directly access the data, bypassing the software's security measures.

Brute Force Attack

As a last resort, the FBI can use a brute force attack, trying all possible password combinations until they find the right one. Although it is a basic and laborious technique, it can be effective on less secure devices.

๐Ÿ”’ Phone Hack Results

Crooks' phone was recovered from his body and unlocked to understand his motives, which remain unclear. Although the analysis provided some clues, it did not reveal incriminating information or connections to criminal plots.

Online Interests

Research suggests that Thomas Matthew Crooks had common interests online, such as coding and video games. Additionally, a second device was found at his residence, suggesting he may have used two phones.

matthew crooks fbi donal trump

Access to Crooks' phone was a significant technical achievement and provided crucial information to prevent future violence.

We hope that this guide has been useful to you in understanding the process and techniques used by the FBI in national security cases.

React:

 Like  Love  Haha  Angry  Sad  Wow

Loading comments...