contador web Saltar al contenido

Health app data is used as evidence in the first homicide trial

Nowadays, our smartphones are so much a part of our lives that they ?know? every step we take and say literally, because the iPhone is able to record the steps and store them in the application Sade (Health) as part of the exercise monitoring we do.

Normal people (as I hope we all are) would not feel threatened by the fact that the device monitors their steps after all, the intention here is to check how sedentary we are (or not). However, you may be left with one foot behind if you do something wrong, as this little detail can become a great evidence against you. At least that's what happened in Germany, in a case of cruel and terrible murder, as the Motherboard.

Hussein K., a refugee from Afghanistan, was accused of raping and killing a 19-year-old woman and then throwing her body into a river. The trial of the alleged killer had been taking place since last September and the information was murky, there were no certainties, mainly about Hussein's real age and his location in the time the crime was committed.

IOS 8 App Sade (Health)

The accused, who has an iPhone 6s, declined to give his password to the authorities. But the investigators did not give up: they hired a local company, which was able to access the device. Then, through the Sade app, they found information that roughly matches the timing of the crime, as well as the criminal's movement:

The app recorded part of his activity as "climbing stairs", which the authorities managed to correlate with the time he would have dragged the victim down the river embankment and then climbed back up. The Freiburg police sent an investigator to the scene to replicate his movements and, certainly, the activity of the Sade app correlated with what was recorded on the ru's phone.

As much as it is legal to obtain information from the application, this seems to be the first known case of an iPhone 6s (model confirmed by the local media) being cracked previously, this had only happened with iPhones 5s and earlier.

The possibilities for this to have happened are that the device was running an old system and the company took advantage of some vulnerability already corrected in current systems or we hope that this is not the case the device was running the newer system and, In fact, there is a way to circumvent Secure Enclave iPhones.

Anyway, this case says a lot about the provenance of the authorities when they really want something

via Cult of Mac