New York Law Enforcement Officials Operate $10 Million Lab Designed to Crack iPhones - MacRumors
Skip to Content

New York Law Enforcement Officials Operate $10 Million Lab Designed to Crack iPhones

Manhattan District Attorney Cy Vance Jr. built and oversees a $10 million high-tech forensics lab built expressly for the purpose of cracking iPhones, according to a new profile done by Fast Company.

The lab is equipped with "mind-bending hardware" and a team of technology experts, many of whom are ex-military. The facility itself features a radiofrequency isolation chamber that prevents iPhones being used in investigations from being accessed remotely to keep them from being wiped.

fastcompanyiphonelab
Vance's team has thousands of iPhones at the facility in various stages of being cracked. There's a supercomputer that generates 26 million random passcodes per second, a robot that can remove memory chips without using heat, and specialized tools for repairing damaged devices to make them accessible once again.

All of the iPhones are hooked up to computers that are generating passcodes in an effort to get into the iPhones, and sometimes that requires going through tens of thousands of number combinations. Those who work at the facility, including director Steven Moran, also attempt to narrow down possibilities using birthdays, significant dates, and other info that could be used in each specific case for an iPhone passcode.

Proprietary workflow software tracks all of the iPhones at the facility, including their software and their importance, for the purpose of deciding which iPhone to work on and which might be able to be cracked using a newly found third-party solution.

Vance has been a major critic of Apple and has called on the government to introduce anti-encryption legislation to make it easier for law enforcement officials to get into iPhones needed for criminal investigations. According to Vance, 82 percent of smartphones that come into the unit are locked, and his cybercrime lab can crack "about half."

Apple's frequent software updates continually make breaking into iPhones harder by making the process more complicated, which can make it close to impossible to breach an iPhone in a timely manner. "The problem with that, particularly from a law enforcement perspective, is, first of all, time matters to us," said Vance.

Vance believes that it's "not fair" that Apple and Google can prevent law enforcement officials from accessing smartphones. Vance says that law enforcement is entrusted with a responsibility to "protect the public" but Apple and Google have limited access to information "just because they say so." Vance is of the opinion that there should be a "balance" between protecting user privacy and getting justice for victims of crimes.

"That's not their call. And it's not their call because there's something bigger here at issue rather than their individual determination of where to balance privacy and public safety. What's bigger is you've got victims and you've got a law enforcement community who have strong imperatives that should be recognized and balanced equally with the subject decision-makers by the heads of Apple and Google. Today, I think it's unbalanced.

Apple's argument is that it provides iPhone data from iCloud without breaking into the iPhone itself, but Vance says that a serious criminal doesn't have an ‌iCloud‌ backup. A user can also choose what information is stored remotely, and "in many cases" smartphones do not backup between the time when a crime takes place and an iPhone is shut off.

Law enforcement officials can also obtain device metadata like the time and location of a phone call from SIM cards or phone carriers, but Moran says that's the difference between being able to read a letter and being limited to just the envelope the letter came in.

"Even if we are lucky enough to get into the cloud or even if we're lucky enough to get some of the metadata, we're still missing an awful lot of important information that's critical to the investigation."

Vance says that he's not "whining" about the encryption problem, but his lab is "not the answer" as most of the U.S. can't afford to do the work that the New York cyber lab does.

Fast Company's profile of Vance's cyber lab comes as Apple is gearing up for another battle with the FBI. Apple has been asked to unlock the iPhones used by Florida shooter Mohammed Saeed Alshamrani, and while Apple has provided ‌iCloud‌ data, the company will fight requests to unlock the actual devices.

For more on New York's High Technology Analysis Unit and facility, make sure to check out Fast Company's full profile.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Political News forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Popular Stories

iOS 27 on iPhone 17 1

iOS 27 Will Add These New Features to Your iPhone

Saturday May 2, 2026 8:43 am PDT by
Apple is expected to unveil iOS 27 during its WWDC 2026 keynote on June 8, and there are already many rumored features and changes for iPhones. The first developer beta of iOS 27 will likely be available immediately following the keynote, and a public beta typically follows in July. Following beta testing, the software update should be released to all users with a compatible iPhone in...
Apple Event Logo

Apple Just Released a New Accessory

Monday May 4, 2026 8:13 am PDT by
Apple today released a new Pride Edition Sport Loop for the Apple Watch. The band features a rainbow design with 11 colors of woven nylon yarns. The new Pride Edition Sport Loop is available to order now on Apple.com and in the Apple Store app in 40mm, 42mm, and 46mm sizes, and it will be available at Apple Store locations starting later this week. In the U.S., the band costs $49. There...
Apple MacBook Pro M4 hero

Why You Might Want to Wait to Buy a MacBook Pro

Friday May 1, 2026 3:43 pm PDT by
Apple refreshed the 14-inch and 16-inch MacBook Pro with M5 Pro and M5 Max models in March 2026, but depending on your needs and interests, you might want to skip this generation because there's something better in the works. The M5 Pro and M5 Max MacBook Pro models have faster chips, but the same design that Apple has used since 2021. An updated design with new display technology and faster ...

Top Rated Comments

crawfish963 Avatar
82 months ago
I'm on record as a law enforcement officer to say that I do not agree with private companies being forced to create backdoors to get into people's devices. If the agency or government comes up with a method on their own, or purchases it from the private sector, then that's fine. But putting a gun to a company's head must never be allowed.
Score: 72 Votes (Like | Disagree)
82 months ago
This almost reads like an ad for iPhone security. Thanks for taking the side of your customers, Apple. :)
Score: 51 Votes (Like | Disagree)
82 months ago
Color me shocked - yet another gov't stooge who doesn't understand you can't crack one iPhone without compromising every other as well :rolleyes:
Score: 36 Votes (Like | Disagree)
82 months ago
No problem with the lab. The cry baby attitude of its leader is a real problem. It's obvious that laws and the constitution don't mean anything to him because they make his job harder. Well too bad.
Score: 31 Votes (Like | Disagree)
82 months ago
So they have a faraday cage ad they use intelligent social engineering to get a start at passwords, okay.
The answer is not a backdoor that he is asking for.
For everyone that reads this you need an alphanumeric passcode.

My current passcode has 12 digits/letters and symbols.
This means that even if they can generate 26 million passcodes a second.

There are 46 keys * 2 functions for each key.
This means that my password will has 3.68x10^23 combinations.
This is 1.4x10^16 seconds to brute force the attack or 3.9x10^12 hours.
So they will never brute force it unless they just get lucky.
Couple that with at the end of every attempt, the enter key must be used.
If you use a 4 digit passcode, a brute force attack renders it useless in 9999 attempts.
Actually it's half that if the approach is either sequential or starts from the middle.
A six digit passcode isn't better.
Use a password that has letters (upper and lower case) numbers and symbols.

A password that is any length is more secure than a passcode.
A password can be any length and makes it much more difficult to brute force.

If you use a less secure 4/6 digit passcode, you should have your phone set to wipe after 10 attempts.

I say don't give them a chance and I'm not doing anything illegal.
My right to privacy, is a right.
Score: 30 Votes (Like | Disagree)
Solomani Avatar
82 months ago
NYC spending $10 million for such a stupid anti-consumer intrusive purpose.... they could have spent it instead on the countless homeless and vagrants roaming the streets of NYC.
Score: 25 Votes (Like | Disagree)