Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.



iphone_5s_touch_id-250x250.jpg
Police in Michigan are reportedly attempting to use a 3D model of a fingerprint to unlock a murder victim's phone and reveal clues that could help solve an open case.

Fusion reports that the investigation is still ongoing, therefore details remain murky, but essentially instead of requesting that the phone manufacturer unlocks the murder victim's handset, officers have asked computer scientists at Michigan State University to create a 3D printed replica of the victim's fingers so they can do it themselves.

The victim's body was apparently too decayed for a fingerprint to be directly applied to the phone, but the police already had a scan of the victim's prints from when the man was arrested in a previous case.

Most fingerprint readers like Apple's Touch ID are capacitive, meaning they use electric circuits that close when human skin comes into contact with them, which generates the image of the print.

However, a 3D printed finger doesn't possess the conductivity that human skin does. So, to circumvent the problem, engineers coated the printed fingers in a thin layer of metallic particles so that the fingerprint scanner can read them.

Currently it's unclear whether the method works, as the designers haven't yet delivered the printed fingers to the police to attempt to unlock the victim's phone.

Another potential stumbling block is that if the phone in question is an iPhone, then police may come up against a passcode screen, since newer Apple handsets request a passcode if the fingerprint unlock hasn't been used within eight hours and the code hasn't been entered in six days.

But if the technology is a success, then theoretically the authorities could use it on cases involving living suspects by applying for a court order.

Fusion notes that the courts draw a distinction between a fingerprint password and a memorized one. "Courts generally draw a line between the 'contents of the mind' (which is protected) and 'tangible' bodily evidence like blood, DNA, and fingerprints (which is not)," said Bryan Choi, a security, law and technology researcher.

So while a memorized password might be protected by the Fifth Amendment which protects against self-incrimination, a fingerprint isn't. Indeed, in 2014, a court in Virginia ruled that a suspect can be required to unlock their phone using their fingerprint.

Therefore if a suspect is at large but the police have their phone in hand and their fingerprints on record, there's nothing to say that the method could be used to unlock the device in the owner's absence.

Choi argues that in this day and age, phones should be considered extensions of the mind and therefore protected under the Fifth Amendment and not just the Fourth Amendment (protection against illegal search and seizure).

"We offload so many of our personal thoughts, moments, tics, and habits to our cellphones," Choi told Fusion. "Having those contents aired in court feels like having your innermost thoughts extracted and spilled unwillingly in public."

Article Link: Police Ask 3D Print Lab to Replicate Dead Man's Finger to Unlock Phone

I would would have to assume this is a click bait article since these people have clearly already bypassed the time allowed to unlock with Touch ID. Let alone the few attempts you have to get it right. Must be a Wah-way phone Or something
 
  • Like
Reactions: thisisnotmyname
Maybe it's going to be used for an Android phone. iOS will ask for a passcode after some amount of time, no matter what.
 
What makes you think when a person dies they want their loved ones going in their phones. If they didn't learn their finger print using Touch ID or gave them the password while he or she was alive, then most likely they don't want them in the phone while their dead. Apple should absolutely not help people get into dead families phone or accounts. It is up to the family while alive to share that information with their family.

This is an interesting thought experiment. Do you give your family member your PIN and have a finger registered on your device, or do you make sure your device is unrecoverable, loved ones be damned. Family photos, videos, etc gone.
 
That's nothing. Lex Luthor used kryptonite fragment to remove the fingerprints from a dead Krypton man to open the door on an alien ship and hack it's computer.
 
  • Like
Reactions: DogHouseDub
That's nothing. Lex Luthor used kryptonite fragment to remove the fingerprints from a dead Krypton man to open the door on an alien ship and hack it's computer.
So....you're saying that this police department needs to consult with Jessie Eisenberg or Kevin Spacey?
 
How does one alert loved ones of one's passwords in the event of one's death?

I feel that someone needs to invent an app or some neat way for solving this problem. Leaving a paper note isn't very secure.

How about this? One could instruct Apple to lift a password restriction on an iCloud account on presentation of a death certificate. That way, passwords stored in iCloud could then be accessible.
This is the first time I see a post from you that I can 100% totally agree with. For me its easy because my wife knows the password to my imac and from there she can get to keychain and access everything. Of course, if we were to die together, then no one will ever get anything from either one of us. Then again, we're dead so we won't be too worried about it. :D
 
  • Like
Reactions: Benjamin Frost
Won't be long before criminals start kidnapping people to just get 3D scans of the victims fingers to be used later in some criminal act.

I guess in the future we'll need a face, eye, finger and code to get into our phones.
 
The victim's body was apparently too decayed for a fingerprint to be directly applied to the phone, but the police already had a scan of the victim's prints from when the man was arrested in a previous case.

This victim was already dead so I don't think it would have worked anyway. Chop off the finger and it won't work either. Must be alive, as I've read.
 
Good to see law enforcement doing its job instead of trying to wreck the system for everyone else.

However:

I agree that finger prints should receive the same 5th amendment protection as pass codes. The deceased, in this case, will not object. What about the family?
 
How does one alert loved ones of one's passwords in the event of one's death?

I feel that someone needs to invent an app or some neat way for solving this problem. Leaving a paper note isn't very secure.

How about this? One could instruct Apple to lift a password restriction on an iCloud account on presentation of a death certificate. That way, passwords stored in iCloud could then be accessible.
There's a death website that sends all your information you want sent when you die. If you don't keep checking into the site it will assume you're dead.
 
As someone getting into 3D printing, are there even printers that can print finely enough to replicate a thumbprint? Usually the filing takes is way too wide... it'd be easier to recast it with silicon...
 
Really depends. As someone pointed out, we don't know the type of phone. If it is an iPhone, and if they're on some version of iOS 9, they did add an 8 hour requirement for passcode if not unlocked within the last 8 hours as well as requiring a passcode after 6 or 7 days regardless.

I've never had to enter my passcode after 8 hours. And I don't see any way to adjust this in settings. I think you mean 48 hours.
 
Apple wouldn't have hacked into a phone in the other case either. If you don't see the difference you need to redhead both articles, but more likely you are deliberately ignoring the difference.

In this case I'm sure Apple will provide access to iCloud if presented with a valid court order. They don't have to passcode so they can't do it.

Yes, this. I came here to say this when I saw the top comment. There is a huge difference. Apple follows the law, if presented with a court order, they comply when the request is within their power. Creating a "master key" to get into an iPhone was beyond the scope of "following the law" in their interpretation. Huge difference in these cases.
 
One could instruct Apple to lift a password restriction on an iCloud account on presentation of a death certificate. That way, passwords stored in iCloud could then be accessible.
It wouldn't work.

iCloud Keychain encryption keys are created on your devices, and Apple can't access those keys. Only encrypted keychain data passes through Apple's servers, and Apple can't access any of the key material that could be used to decrypt that data.
from https://support.apple.com/kb/HT202303
 
  • Like
Reactions: Benjamin Frost
I've never had to enter my passcode after 8 hours. And I don't see any way to adjust this in settings. I think you mean 48 hours.
Correct, it's 48 hours.

[Y]our passcode will be needed for additional security validation:
  • After restarting your device
  • When more than 48 hours have elapsed from the last time you unlocked your device
  • To enter the Touch ID & Passcode setting
from https://support.apple.com/kb/HT204587
 
So this makes Apple proving that the Touch ID CAN by bypassed ? Nice self shooting Apple. Btw why not using the hacker company that found a backdoor in the famous phone were the FBI paid $$$ to get it unlock?
 
We already knew that Touch ID could be fooled with a fake fingerprint if you have enough time and the resources to do so (which most thieves will not). That is likely part of the reason why Apple made the change to require the passcode if Touch ID has not been used in the last 48 hours. Also the requirement to use the passcode if Touch ID fails three times. It helps cut down this vulnerability a lot.
 
  • Like
Reactions: Glassed Silver
That's why Apple requires your passcode if your phone hasn't been accessed by Touch ID for 8 hours.
I believe that's 48 hours.
[doublepost=1469207791][/doublepost]
Really depends. As someone pointed out, we don't know the type of phone. If it is an iPhone, and if they're on some version of iOS 9, they did add an 8 hour requirement for passcode if not unlocked within the last 8 hours as well as requiring a passcode after 6 or 7 days regardless.
It's basically either if the device hasn't been unlocked in any fashion for 48 hours or more, or if the device hasn't been unlocked with a passcode for at least 6 days and at least 8 hours has passed since it was unlocked last (via TouchID).
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.