Apple Has Backlog of Requests From Police to Unlock Seized iPhones - MacRumors
Skip to Content

Apple Has Backlog of Requests From Police to Unlock Seized iPhones

PasscodeApple has created a 'waiting list' for law enforcement requests to unlock seized iOS devices, according to a report from CNET.

The article notes a case in Kentucky where the Bureau of Alcohol, Tobacco, Firearms and Explosives was the lead agency, and investigators contacted Apple for assistance after they were unable to locate any law enforcement agency in the country with the forensic capabilities to unlock an iPhone crucial to the case.

The agency contacted Apple but was told by a representative in Apple's litigation group that there would be a seven-week delay.

The ATF's Maynard said in an affidavit for the Kentucky case that Apple "has the capabilities to bypass the security software" and "download the contents of the phone to an external memory device." Chang, the Apple legal specialist, told him that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" and delivered to the ATF.

It's not clear whether that means Apple has created a backdoor for police -- which has been the topic of speculation in the past -- whether the company has custom hardware that's faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET.

While it's easy to erase an iPhone when it has been locked, for law enforcement, it appears to be considerably more difficult -- but not impossible -- to retrieve data from seized devices.

In its privacy policy, Apple says it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence" or "if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate."

Popular Stories

iOS 26

iOS 26.4 Adds Two New Features to CarPlay

Tuesday March 24, 2026 1:55 pm PDT by
iOS 26.4 was released today, and it includes a couple of new features for CarPlay: an Ambient Music widget and support for voice-based chatbot apps. To update your iPhone 11 or newer to iOS 26.4, open the Settings app and tap on General → Software Update. CarPlay will automatically offer the new features so long as the iPhone connected to your vehicle is running iOS 26.4 or later....
Apple Business hero

Apple Unveils 'Apple Business' All-in-One Platform

Tuesday March 24, 2026 8:53 am PDT by
Apple today announced Apple Business, a new all-in-one platform that unifies device management, productivity tools, and customer outreach features. The service is designed to be a consolidated replacement for several of Apple's existing business-focused offerings, including Apple Business Essentials, Apple Business Manager, and Apple Business Connect. It provides organizations with a single...
AirPods Pro Firmware Feature

Apple Releases New Firmware for AirPods Pro 3, AirPods Pro 2 and AirPods 4

Tuesday March 24, 2026 12:31 pm PDT by
Apple today released new firmware for the AirPods Pro 2, AirPods Pro 3, and the AirPods 4. The firmware has a version number of 8B39, up from 8B34 on the AirPods Pro 3, 8B28 on the AirPods Pro 2, and 8B21 on the AirPods 4. There is no word on what's included in the firmware, but Apple has a support document with limited notes. Most updates are limited to bug fixes and performance...

Top Rated Comments

Nightarchaon Avatar
168 months ago
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.
Score: 18 Votes (Like | Disagree)
168 months ago
There is a guy in my local mall who will do it for them for only £15...

£ and 'mall' in the same sentence - culture clash!
Score: 15 Votes (Like | Disagree)
168 months ago
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.
Unlikely. Apple has a ramdisk that they execute via DFU/iBoot that allows access to the filesystem, very similar to the ones used by forensic companies.

However, since the iPhone 4S and beyond, these ramdisks stopped working for forensic companies when Apple made the bootrom DFU code bulletproof (there are no exploits for it).

Only Apple can make their ramdisk work on the device because they have to codesign it with their private key AND obtain the proper personalisation signing for the device's identifiers and random NONCE. (Getting all these signatures for production devices could be time consuming without a lot of pre-existing tools to automate it. The personalisation process also varies between 4S/5/iPad 2/iPad 3/iPad mini. Normally iTunes mediates this during device restores to production iOS releases).
Score: 15 Votes (Like | Disagree)
toschlebelge Avatar
168 months ago
Ncc...

One thing is for sure... The code on the depicted iPhone is 1701. Wild guess! ;-)
Score: 6 Votes (Like | Disagree)
168 months ago
Hmm...this seems a little vague:

if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate
Score: 6 Votes (Like | Disagree)
AppleMark Avatar
168 months ago
There is a guy in my local mall who will do it for them for only £15...
Score: 6 Votes (Like | Disagree)