An Israeli newspaper has since reported that data forensics experts at Cellebrite are involved in the case.
Cellebrite told the BBC that it works with the FBI but would not say more.
Its website, however, states that one of its tools can extract and decode data from the iPhone 5C - the model in question - among other locked handsets. Apple has refused to help the FBI do this.
"File system extractions, decoding and analysis can be performed on locked iOS devices with a simple or complex passcode," Cellebrite's site states.
"Simple passcodes will be recovered during the physical extraction process and enable access to emails and keychain passwords.
"If a complex password is set on the device, physical extraction can be performed without access to emails and keychain."
The keychain reference relates to a tool on Apple devices that allows all of an owner's log-ins to be revealed if a master password is known.
Cellebrite told the BBC that it works with the FBI but would not say more.
Its website, however, states that one of its tools can extract and decode data from the iPhone 5C - the model in question - among other locked handsets. Apple has refused to help the FBI do this.
"File system extractions, decoding and analysis can be performed on locked iOS devices with a simple or complex passcode," Cellebrite's site states.
"Simple passcodes will be recovered during the physical extraction process and enable access to emails and keychain passwords.
"If a complex password is set on the device, physical extraction can be performed without access to emails and keychain."
The keychain reference relates to a tool on Apple devices that allows all of an owner's log-ins to be revealed if a master password is known.
Leave a comment: