You are viewing a single comment's thread.

view the rest of the comments →

0
4

[–] 16744905? [S] 0 points 4 points (+4|-0) ago 

The way this is worded, it’s hard to tell if this is how texts were initially recovered or if this recovered more texts then we’ve already seen. Not sure

0
1

[–] 16750614? 0 points 1 point (+1|-0) ago 

This is not saying more texts were recovered since their report in December.

In addition, unknown to the FBI, the OIG found that FBI text messages were saved to a database on the devices, some of which were not captured by the collection application. The OIG identified this, and other concerns, as security vulnerabilities. The OIG described these issues in its Report of Investigation: Recovery of Text Messages from Certain FBI Mobile Devices.....

The December report discussed this database at length.

....OIG Discovery of Text Messages in Enterprise Database File During its final quality assurance checks in May 2018, the OIG located an additional cache of text messages in a database identified as "enterprise.db." This was in addition to the OIG's having recovered text messages on the S5 phones in locations where they are typically located through the use of forensic extraction tools. This database appeared to retain a copy of text messages sent and received beginning shortly after the phone was issued until the day the phone was no longer connected to the service provider. The database included text messages sent and received during the period the device was in use, including during the period of the FBl's collection tool failure.

https://oig.justice.gov/reports/2018/i-2018-003523.pdf,