FBI Still Unable to Break Encryption on Phone of San Bernardino Attackers

Reuters
Reuters

The FBI has yet to decode the encryption on a cell phone used by San Bernardino attackers Syed Farook and Tashfeen Malik.

This means data believed to be pertinent to the terror investigation remains locked away more than two months after the heinous terror attack occurred.

According to the Los Angeles Times, it is believed the “encrypted data could shed light on why Farook left a bag with several homemade pipe bombs in the conference room, whether they considered additional attacks, or whether the couple was in communication with anyone about their plans before the attack.” Without the data, the FBI has yet to show that Farook and Malik “received and outside direction or support.”

In December, FBI director James Comey said the bureau also had a phone from the May 3 2015, Garland, Texas, terror attack which they had not been able to crack. One of the two Garland attackers–Elton Simpson or Nadir Soofi–exchanged more than a 100 messages with “an overseas terrorist” the morning of the attack, and those messages remain hidden from investigators.

The San Bernardino attackers struck unarmed attendees at a Christmas party and the Garland attackers attacked a well-guarded Curtis Culwell Center, which was housing a Muhammad cartoon contest.  The San Bernardino attackers killed 14 innocents and were themselves killed by police hours later. Both Garland attackers were killed by a traffic cop armed with a handgun during their initial assault.

AWR Hawkins is the Second Amendment columnist for Breitbart News and political analyst for Armed American Radio. Follow him on Twitter: @AWRHawkins. Reach him directly at awrhawkins@breitbart.com.

COMMENTS

Please let us know if you're having issues with commenting.