Menu

The function “Find my iPhone” helped the perpetrator to conceal evidence

14.11.2018 - Apps for iOS
The function “Find my iPhone” helped the perpetrator to conceal evidence

In the winter of 2015 in the California town of San Bernardino there was a mass murder in total claimed the lives of 16 people. Someone named Syed Rizwan Farooq attacked with weapons on the center for persons with disabilities, but during the firefight he was killed and left behind the iPhone 5c, which was useful in the investigation of the crime. This event is considered the official beginning of practice on the use of smartphones and the data from their memory as evidence.

Usually, the smartphone is removed from a suspect to view his correspondence, photos, browser history, and more that can serve as proof of the involvement of the detainee to a perfect act. Among law enforcement officers are of the opinion that the potential offender does not expect that it will delay, and therefore not even thinking about how to erase information to demonstrate against him. It is strange that nobody thought about the fact that removal is possible even after the device was withdrawn.

The smartphone — as the material evidence

According DailyGazette, 24-year-old Jewel Grant, passing on charges of complicity in the shooting on the streets of new York, was unable to format your iPhone X, with which it seized after the arrest. According to the sources, police was in shock when I found out that all data from the smartphone were erased by remote connection from the outside. And, oddly enough, the first thing that came to mind the police is a hacker attack, which was organized by the suspect.

How to remotely wipe data from the iPhone’s memory

But it was ridiculously simple. Apple itself provides the ability to remotely format their devices in case of theft or loss, and the whole process takes no more than a couple minutes. All you need to do is log in using your Apple ID account on the website icloud.apple.com, go to the “Find my iPhone” and initiate a device search. After the location is determined, the system will prompt to remove from his memory all the data, than obviously took advantage of the Grant.

Leave a Reply

Your email address will not be published. Required fields are marked *