Apple Has Backlog of Requests From Police to Unlock Seized iPhones - MacRumors
Skip to Content

Apple Has Backlog of Requests From Police to Unlock Seized iPhones

PasscodeApple has created a 'waiting list' for law enforcement requests to unlock seized iOS devices, according to a report from CNET.

The article notes a case in Kentucky where the Bureau of Alcohol, Tobacco, Firearms and Explosives was the lead agency, and investigators contacted Apple for assistance after they were unable to locate any law enforcement agency in the country with the forensic capabilities to unlock an iPhone crucial to the case.

The agency contacted Apple but was told by a representative in Apple's litigation group that there would be a seven-week delay.

The ATF's Maynard said in an affidavit for the Kentucky case that Apple "has the capabilities to bypass the security software" and "download the contents of the phone to an external memory device." Chang, the Apple legal specialist, told him that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" and delivered to the ATF.

It's not clear whether that means Apple has created a backdoor for police -- which has been the topic of speculation in the past -- whether the company has custom hardware that's faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET.

While it's easy to erase an iPhone when it has been locked, for law enforcement, it appears to be considerably more difficult -- but not impossible -- to retrieve data from seized devices.

In its privacy policy, Apple says it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence" or "if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate."

Popular Stories

Apple WWDC25 iOS 26 CarPlay Light mode 250609

Six Popular iPhone Apps Now Available on CarPlay

Thursday May 14, 2026 9:10 am PDT by
Apple's CarPlay system for accessing iPhone apps on a vehicle's dashboard screen has received six popular apps in recent weeks: ChatGPT, Perplexity, Grok, Google Meet, WhatsApp, and the indie artist streaming platform Audiomack. Make sure you have the latest version of each app and they will automatically appear on CarPlay. ChatGPT Starting with iOS 26.4, CarPlay supports voice-based...
Apple Card iPhone 16 Pro Feature

Apple Card Promo to Offer Free AirPods Pro 3

Friday May 15, 2026 8:59 am PDT by
Starting as early as next week, customers who sign up for an Apple Card at Apple's retail stores in the U.S. will receive $249 cash back when they purchase AirPods Pro 3, according to Bloomberg's Mark Gurman. The promotion has yet to be officially announced by Apple, so exact terms and conditions are not available at this time. AirPods Pro 3 are priced at $249 in the U.S., so customers who...
ipad mini 7 blue

OLED iPad Mini: Release Date, Pricing, and What to Expect

Thursday May 14, 2026 5:08 am PDT by
According to the latest rumors, Apple is close to launching its next-generation iPad mini. So what should we expect from the successor to the iPad mini 7 that Apple released over a year ago? Read on to find out. Processor and Performance Apple is working on a next-generation version of the iPad mini (codename J510/J511) that features the A19 Pro chip, according to information found in code...

Top Rated Comments

Nightarchaon Avatar
170 months ago
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.
Score: 18 Votes (Like | Disagree)
170 months ago
There is a guy in my local mall who will do it for them for only £15...

£ and 'mall' in the same sentence - culture clash!
Score: 15 Votes (Like | Disagree)
170 months ago
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.
Unlikely. Apple has a ramdisk that they execute via DFU/iBoot that allows access to the filesystem, very similar to the ones used by forensic companies.

However, since the iPhone 4S and beyond, these ramdisks stopped working for forensic companies when Apple made the bootrom DFU code bulletproof (there are no exploits for it).

Only Apple can make their ramdisk work on the device because they have to codesign it with their private key AND obtain the proper personalisation signing for the device's identifiers and random NONCE. (Getting all these signatures for production devices could be time consuming without a lot of pre-existing tools to automate it. The personalisation process also varies between 4S/5/iPad 2/iPad 3/iPad mini. Normally iTunes mediates this during device restores to production iOS releases).
Score: 15 Votes (Like | Disagree)
toschlebelge Avatar
170 months ago
Ncc...

One thing is for sure... The code on the depicted iPhone is 1701. Wild guess! ;-)
Score: 6 Votes (Like | Disagree)
170 months ago
Hmm...this seems a little vague:

if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate
Score: 6 Votes (Like | Disagree)
AppleMark Avatar
170 months ago
There is a guy in my local mall who will do it for them for only £15...
Score: 6 Votes (Like | Disagree)