Texas Rangers serve Apple with warrants for access to Sutherland Springs shooter's iPhone
The Texas Rangers have served Apple with search warrants for data linked to the iPhone of Devin Kelley, who killed 26 people at a church in Sutherland Springs near San Antonio.

On Nov. 9 the Rangers secured warrants for files stored locally on Kelley's iPhone SE, as well as his iCloud account, according to mySA. Another warrant covers an LG feature phone -- a 328BG -- found near his body.
The warrants seek access to calls, contacts, messages, passwords, social media, photos, videos, and other data reaching back to Jan. 1 of last year.
Two days after the shooting the FBI's San Antonio office head, Christopher Combs, complained that encryption was preventing investigators from accessing Kelley's data. The iPhone was at some point flown out to an FBI lab in Quantico, Va., but without success.
Law enforcement may have missed a critical window during which they could have tried to use Kelley's fingers to unlock his iPhone without a passcode, though it's not certain that would have worked. Regardless, investigators reportedly failed to contact Apple during that window, leading to Apple itself getting in touch after seeing Combs' press conference.
Apple has a policy of handing over iCloud data when served with a proper legal order, but the company is unlikely to cooperate in cracking the iPhone's encryption. The company famously refused to do so for the FBI in the case of San Bernardino shooter Syed Rizwan Farook, arguing it would have to rewrite iOS to create a backdoor and fundamentally weaken security.
The FBI eventually recruited the help of a third party to break into the phone, dropping its demands with Apple, but no useful data was found.

On Nov. 9 the Rangers secured warrants for files stored locally on Kelley's iPhone SE, as well as his iCloud account, according to mySA. Another warrant covers an LG feature phone -- a 328BG -- found near his body.
The warrants seek access to calls, contacts, messages, passwords, social media, photos, videos, and other data reaching back to Jan. 1 of last year.
Two days after the shooting the FBI's San Antonio office head, Christopher Combs, complained that encryption was preventing investigators from accessing Kelley's data. The iPhone was at some point flown out to an FBI lab in Quantico, Va., but without success.
Law enforcement may have missed a critical window during which they could have tried to use Kelley's fingers to unlock his iPhone without a passcode, though it's not certain that would have worked. Regardless, investigators reportedly failed to contact Apple during that window, leading to Apple itself getting in touch after seeing Combs' press conference.
Apple has a policy of handing over iCloud data when served with a proper legal order, but the company is unlikely to cooperate in cracking the iPhone's encryption. The company famously refused to do so for the FBI in the case of San Bernardino shooter Syed Rizwan Farook, arguing it would have to rewrite iOS to create a backdoor and fundamentally weaken security.
The FBI eventually recruited the help of a third party to break into the phone, dropping its demands with Apple, but no useful data was found.
Comments
A: Yes.
End of discussion.
LOL Right?!
if it's encrypted, Apple can't provide without the keys, which they can't access by design. Making the keys accessible defeats the purpose of encrypting the files in the first place.
Also note that Apple tried to assist them right away, so there's no reason to suspect that Apple will not try to assist them now. If his iCloud account was accessible I'm sure they already have the data waiting for them.
Texas Rangers: "What do you have?"
Apple: "Nothing."
Texas Rangers: "Well, alright then..."
The warrant makes no sense. It has been well documented and I’m sure Apple told them they can’t access the phone, so why even make such a legal request when it is moot. The only possible reason is deflection.
Where it gets interesting is if the Rangers insist on Apple unlocking information for which it doesn’t have the key.
The iCloud account warrant will be honored like Apple siesta does.
I don't think there is much of a mystery around this case, or much need to discover anything, aside from providing some answers to family of the victims.
The big failures in this case were the military in how they handled it (reporting him to civilian authorities), and the failure of our health-care system and VA treatment of mental health. Also, big pharma might be involved too, if the info I've heard is correct.
The guy had a violent history... even more violent than people knew because the military failed to pass the info along. Apparently he tried to get psych counseling, but couldn't afford it (that should be a shame on our veterans care system!). He also supposedly started on some meds... and having had some mild personal experience with this in the past... that can lead to some really bad stuff. Throw in family problems and such, and this isn't exactly rocket-science.
2) You mention "access the phone" but ignore iCloud. If this asshole backed up his iPhone to iCloud and Apple can access his iCloud backups then they may be able to a computer-based brute force attack on this backup to see what has been saved.
3) I say this as someone that doesn't want manpower and department money spent on a pointless investigation. They know who did the killing and he's dead. We know he worked alone. Maybe if you're a psychologist there is data to be hard in trying to understand the criminal mind, but that's not the job of Texas Rangers, as far as I know.
http://www.cnn.com/2016/04/21/politics/san-bernardino-iphone-apple-hacking/index.html
A fact of life in the digital age, a key that opens one lock will open all locks.