Unless Cellebrite is hiding a lot of capabilities from ordinary visitors to their website, they don't have a chance of breaking into the terrorists' iPhones if said terrorist used complex pass codes and iOS 7, 8 or 9: Cellebrite can obtain "existing and deleted data" from: iPhone 2G,iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5,iPhone 5S, iPhone 5C, iPhone 6, iPhone 6Plus, iPod Touch 1G, iPod Touch 2G, iPod Touch 3G, iPod Touch 4G, iPod Touch 5G, iPad Mini, iPad 1, iPad 2, iPad3, iPad 4 And they have: Different ways to perform data extraction: • Logical and file system (for unlocked devices) extraction is enabled on the UFED Touch • Physical extraction and file system extraction (for locked devices) is enabled on the UFED Physical Analyzer If the iOS device was locked with a simple passcode: Simple passcodes will be recovered during the physical extraction process and enable access to emails and keychain passwords. However, if the device was locked with a complex password: If a complex password is set on the device, physical extraction can be performed without access to emails and keychain. But: If the complex password is known, emails and keychain passwords will be available. If the password is known, why would the FBI need Cellebrite? Anyway, all of this is very nice, but can they decrypt iOS 9x devices?: Real-time decryption to interpret encrypted data from devices running iOS4.x, iOS5.x and iOS6.x. Decryption is performed on-the-fly, obtaining access to data, files and application content In short, it appears that Cellebrite can't do real-time decryption of an iPhone that has iOS 7, 8 or 9. Whether they can decrypt 7, 8, or 9 if they don't have to do it in real-time is not mentioned. And, if they don't have the complex password to unlock the iPhone, it's looks like they won't be able to access email and the password keychain. Finally, I thought the FBI had scrambled the iPhone by botching attempts to enter the passcode. All of this looks like a waste of time and money.