Prosecutors Charge Suspect With Evidence Tampering After A Seized iPhone Is Wiped Remotely

from the lots-of-missing-info-here dept

Going on little more than their belief a phone may contain evidence in a drive-by shooting case, prosecutors in Schenectady, New York are charging a suspect with destroying evidence.

A cellphone seized by police as part of an investigation into a drive-by shooting last month was remotely wiped by its owner, authorities said this week.

Police believe Juelle L. Grant, 24, of Willow Avenue, may have been the driver of a vehicle involved in an Oct. 23 drive-by shooting on Van Vranken Avenue, near Lang Street, so they obtained her phone, according to police allegations filed in court. No one was injured in the shooting.

After police took her iPhone X, telling her it was considered evidence, “she did remotely wipe” the device, according to police.

“The defendant was aware of the intentions of the police department at the conclusion of the interview with her,” according to court documents.

Grant now faces three felonies: two counts of evidence tampering and one count of hindering prosecution. One count of evidence tampering related to the alleged phone wipe. The other two counts listed are related to concealing the shooter’s identity and disposing of the weapon used.

Grant purchased a new iPhone some time after her other one was seized. It could be her logon from a new device erased files on her old one, but that seems unlikely and the dates don’t really line up. Her lawyer says she got a new phone “days after” the cops took her first one, but the documents alleging evidence tampering says it happened less than 24 hours after the alleged drive-by. Supposedly, Grant isn’t a “computer-savvy person,” according to her attorney, but it’s not all that tough to do even for someone with limited tech skill

The easiest method for remote wiping would be using Apple’s “Find My iPhone” feature, which has “Erase iPhone” right on the landing page. This seems to be the likeliest explanation for what happened, although it may be Grant herself did not trigger the remote wipe.

And there are unanswered questions about law enforcement’s handling of the seized iPhone. Have they not heard of Faraday cages/bags? That exact question was posed to law enforcement by The Daily Gazette. The first answer was a deflection:

Asked last Wednesday evening if such technology was available to city detectives, police spokesman Sgt. Matthew Dearing said he did not know but would check with detectives. He indicated late Thursday afternoon that he had yet to hear back from them.

One week later, there’s still no answer.

A message Monday morning asking Dearing if he had yet heard back from detectives was not immediately returned.

Finally, there’s another question that needs to be answered by law enforcement as it moves forward with these charges: how likely is it that there’s evidence of a drive-by shooting on a person’s phone? That probability — an essential part of “probable cause” — seems a little low. Sure, cops might have found a judge willing to believe a person’s phone is just something that collects evidence of any and all criminal activity until law enforcement needs it, but there’s always a chance the judge might actually demand justification for searching a phone seized from a drive-by shooting driver.

With the alleged “evidence” now allegedly maliciously deleted, law enforcement might be off the probable cause hook. But it shouldn’t be. It should have to justify its original search plans before it can move forward with evidence tampering charges. From what’s been presented in this coverage, it doesn’t appear law enforcement has a solid basis for the search it never got to perform.

Filed Under: , , ,
Companies: apple

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Prosecutors Charge Suspect With Evidence Tampering After A Seized iPhone Is Wiped Remotely”

Subscribe: RSS Leave a comment
46 Comments
Anonymous Anonymous Coward (profile) says:

Chickens without eggs, or is it eggs but no chickens?

Wouldn’t they need evidence to show that there was in fact evidence on the wiped phone?

Then there’s disposing of the weapon used. Do they have proof that the ‘culprit’ had the weapon? It does not appear that she has been charged for the shooting, or even for being there.

And finally, refusing to give up someones name sure sounds like testifying against oneself. If they give up the name, then that would make themselves complicit because how else would one know the name if they weren’t there?

Arthur Morgan Stole My Horse says:

Re: Chickens without eggs, or is it eggs but no chickens?

You read my mind. Another thought that occurred to me involves police receiving the phone in an unlocked state and upon finding no evidence, wipe the phone themselves in order to hit her up with trumped up charges instead. There’s certainly no shortage of dishonorable law enforcement officials out there who’d feel justified doing exactly that, especially when angered by a suspect they don’t like. Given the timing involved, I wouldn’t be at all surprised if this wound up being what happened. I’ve certainly encountered my fair share of dishonorable police officers (good ones as well) and have even had one contact me to apologize for their behavior, so I know for a fact that my hypothesis is possible.

ShadowNinja (profile) says:

Re: Hmmm....

That and records of texts/calls seem like the only things they could realistically find that would be relevant.

I always thought the cell phone provider had all that information and could be required to hand it over with a warrant?

The contact list is stored on the phone I think (unless it’s different on iOS) so it would be deleted, but surely they’d have texts/calls to those numbers in the phone company records if they existed.

Uriel-238 (profile) says:

Re: Location data...

…should be attainable by third parties, say the suspect’s phone service.

They might need (read: should need) a warrant for it, but that might even be easily doable under the circumstances.

Personally, I think anytime a law enforcement officer is looking into a phone for evidence of a crime that doesn’t involve the phone, they’re fishing.

Though it also raises the question what is someone doing bringing a personal cell phone to a drive by shooting? That’s totally a premeditated crime and warrants a burner or not having a phone.

Ehud Gavron (profile) says:

Re: Re: I can wear a short skirt if I want to.

Having a phone shouldn’t be something we avoid because of government overreach. We [our society and our elected officials] should be limiting that overreach and having strong protections.

Like, let me think, oh I don’t know, the 4th Amendment? And… uh, the Exclusionary Rule?
And… no Good Faith exemption?

I tire myself just thinking about how much our protections have been gutted by the gutless.

E

Uriel-238 (profile) says:

Re: Re: Re: Bringing a rifle to an assassination

I just find it strange that people expect to be able to bring their phones when they’re planning on committing a major crime, exempli gratia, murder.

A drive by shooting is a hit. That’s pretty serious, and police are going to be given a lot of latitude regarding warrants when they start investigating it.

In fact, were I writing crime fiction, I’d expect my shooting team to drop their phones with their alibis, so that the phone stays mobile and yet not at the scene of the crime.

So this is not about whether or not you can wear your short skirt, but whether or not you can keep your ordnance in your trunk.

Anonymous Coward says:

Defense

Arguably, she didn’t wipe the phone, she asked it be wiped the next time it connected to the public cellular network. It would be reasonable to expect any competent law enforcement body to not do that until they’re done with it. After all, leaving it connected raises serious chain-of-custody concerns.

In her position, I’d claim this was done only to protect against e.g. someone buying this at a police auction, not to protect against police access.

Coyne Tibbets (profile) says:

Re: Re: Defense

A phone is a computer. Per the rules for computers, anything it reports is Gospel.

Gallois’ Revelation: If you put tomfoolery into a computer, nothing comes out but tomfoolery. But this tomfoolery, having passed through a very expensive machine, is somehow enobled, and no one dares to criticize it.

Paul says:

Is there a deadhand option?

This has me wondering if there’s a way I could set up a phone to automatically wipe unless a password is entered at specific intervals, a la the deadhand nuclear launch system of the cold war. Such as if I don’t sign in via my password in a week it automatically wipes. A feature like that could be useful for many other circumstances as well, not just having my phone seized by law enforcement.

TKnarr (profile) says:

Re: Is there a deadhand option?

There isn’t an easy way to set up an automatic wipe like you describe, but many phones have an option to encrypt the storage (internal and SD card) so that a password has to be entered during boot before the phone can even read it’s own storage. You’d combine this with a scheduled-reboot app (requires a rooted phone to work) that would trigger a restart of the phone at a certain time each day. You could use a remote-power-off app as well, but doing it automatically on a preset schedule avoids the issue of you having to actively do something after the phone was confiscated. I’d have to dig into whether there’s software out there that could invalidate the decryption credentials (forcing a re-entry of the password) if the device is idle for longer than a set time (something like the lock screen, but operating at the hardware layer rather than the level of the UI and external interfaces).

Anonymous Coward says:

1) The Police should have turned off the phone immediately, and not turned it on again until it was in the cell phone examination room, which are usually faraday cages, for this very purpose. Sounds like the police mishandled evidence.

2) The evidence they were likely looking for was text messages concerning the shooting, either planning ahead, or commenting after.

3) There is a remedy for this at trial. The State can argue that the Jury can presume that there would have been evidence harmful to the defendant on the phone. However, they would need to prove that she DID intentionally wipe it. And that there likely WAS evidence on it that was harmful to her.

Anonymous Coward says:

Re: Re: Re:

This isn’t quite the cut-and-dried situation you may think it is. Courts have changed how they approach “lack of evidence” when it comes to destroying that evidence.

There are landmark cases which have set precedence in scenarios where even the expectation of legal proceeding can create a duty to preserve data, and this duty is for both sides of the court case.

If this duty is ignored, judges have given jury instructions to assume the destroyed information would have been detrimental to the party doing the destruction (either plaintiff or defendant).

In lawsuit scenarios, even the amount of time it takes to provide this data can cause the judge to give these adverse jury instructions… though I don’t know if this translates directly to criminal cases.

Anonymous Coward says:

Re: Re:

Members of the jury. It is our considered opinion that the defendant is the second shooter on the grassy knoll. A search of electronic communications on the date in question reveals no mobile phone activity, and, as the defendant’s phone also has no records of activity stored on it, this proves that this is the phone that generated those non-existent signals.

Thus you MUST conclude that the defendant maliciously and remotely wiped those signals from the spectrum on the date, and did, with further malicious forethought, remotely delete all evidence from the phone in question.

Absence of evidence is not evidence of absence, ipso facto, the defendant can only be found guilty.

Quid erronium dumbonstrandum.

Bryan Beals (profile) says:

Re: Phones

1) The Police should have turned off the phone immediately, and not turned it on again until it was in the cell phone examination room, which are usually faraday cages, for this very purpose. Sounds like the police mishandled evidence.

This chould make there job harder. I am an IT guy and I work with our company MDM. On Android phones at least if the phone is rebooted non of our remote commands will work till it loged back into with pin/password. Including our ability to remotely reset someones pin code. We have rather complext pin requirements and people for get there pins from time to time from using finger prints 99% of time. When they forget there pin and the rebooted there phones I have to tell them I hope you had you photos and such backed up because you are not getting them back. if they hav’t rebooted i can send a command and poof your pass code is now 1234 and you have 15 min to pick a new one before the system kicks you out of company email :)..

That One Guy (profile) says:

Handy that

Whether the police had anything to do with it(beyond gross negligence in not putting a phone they believed to contain evidence in a container to block outside instructions), I can’t help but notice that having the phone wiped seems to be almost entirely in their favor.

Rather than having to defend whether or not the phone did contain evidence of the act(somehow), they get to move right on to asserting that it did, use the destruction of said evidence against the accused, and hit them with additional charges related to that.

Is it possible that the phone did (somehow) contain evidence and it was wiped by the accused or someone else who might be incriminated by it and had access? Most certainly. However the (at best) gross negligence on the part of the police with regards to the phone, and the fact that the ‘destruction of evidence’ would appear to be nothing but helpful to them has me looking at the situation with a suspicious eye.

Bamboo Harvester (profile) says:

Re: Handy that

It doesn’t work in their favor. The prosecution can’t use it, other than to say it was erased by a party or parties unknown.

Otherwise they could claim it had the location of Hoffa’s body on it, the Mafia’s main Credit Suisse number, etc.

The only thing I can see the phone being used for is the charge that she remotely wiped it, which they won’t bother with if they can’t prove SHE did it.

Tip for criminals: When you see the flashing lights, destroy your cell phone…

That One Guy (profile) says:

Re: Re: Handy that

Grant now faces three felonies: two counts of evidence tampering and one count of hindering prosecution. One count of evidence tampering related to the alleged phone wipe. The other two counts listed are related to concealing the shooter’s identity and disposing of the weapon used.

Assuming that’s accurate they either think that they can connect the phone wipe to her, or (equally possible to be sure) they’re bluffing in hopes that they can make her think they can such that she takes a plea deal.

As I understand it destroyed evidence is assumed to be detrimental to the one who destroyed it, so if they can link the wipe to her, and claim that the phone contained evidence, it certainly looks like it would be beneficial to them.

Anonymous Coward says:

I imagine she was concerned about the nudes on the phone.
Why do the leos think it was wiped .. because there are no nudes? I routinely wipe old data from the phone, why not? I had no idea that it could be considered a felony to remove things from my cell phone – perhaps I do not even need a cell phone, is that a felony also?

btr1701 (profile) says:

Hobson's Choice

> Grant now faces three felonies: two counts of evidence
> tampering and one count of hindering prosecution.

Depending on what she would have been charged with in the drive-by (attempt murder, aggravated assault, unlawful discharge of a firearm, etc.), she probably still is getting off easy.

The destruction of evidence charge is better than a murder one charge any day.

Ehud Gavron (profile) says:

Who owns my data?

TechDirt (rightly) spends a lot of brain power and well crafted discussions discussing our rights to our devices, to have them free of malware, and protecting our rights to use, repair, and keep them free for OUR use, not others.

So here’s a case where the bad guys wanted to get this woman’s data. They were determined to hack into her phone to get her private data. We’ve discussed for ages this data reveals FAR MORE about her life than the alleged drive-by shooting.

Instead of allowing these bad guys (LEOs) to get her data, she (allegedly) wiped it. That’s equivalent in result to her phone being locked and LEOs being unable to unlock it, and equivalent in action to what she’s charged with… which is destruction of evidence.

Evidence isn’t “all known data we didn’t get to access.” LEOs claiming so doesn’t make it so.

There are two types of cops… bad ones, and the ones that let them continue to be bad cops. I don’t trust any of them with an open copy of all the data on any of my devices. They can’t even have my fitbit.

E

Gary (profile) says:

Re: Re: Who owns my data?

Unless they had a warrant…

That isn’t how warrants work. Or arrests. Police can (and will) seize everything, it’d held as potential evidence. They even have a special room to lock it up in.
If the prosecutors and/or defence want to use the seized items at trial, then it is entered as evidence.

Ehud Gavron (profile) says:

Re: Re: Re: "Evidence"

Even more technical, when a prosecutor wants to enter an exhibit at trial, he requests the permission of the Court to do so. That gives the defense an opportunity to object.

If said objection occurs and if it is upheld, the exhibit is not allowed to be entered, and it never becomes “evidence”. Sometimes the prosecution will even return this private property undamaged to the defendant in an undamaged condition, but don’t count on it. Law enforcement in the US is all about punishing everyone and hoping to catch some promotions in the process.

That whole “innocent until proven guilty” and “criminal JUSTICE system” and cops following the law is just an intro to a TV show. https://www.youtube.com/watch?v=lMalvNeJFLk

E

Anonymous Coward says:

No, it wasn’t a deflection. It was a complete lack of understanding. A Faraday cage could hardly be called a piece of technology. It’s little more than a metal mesh. You can get them small enough to fit in a wallet, so NFC can’t ping your credit card.

Forensics would probably need something more robust and foolproof. So it’ll probably be something a contractor will charge millions of dollars for, and it will be proclaimed as a revolutionary new piece of equipment.

Anonymous Coward says:

restraining order ?

Wouldn’t a court need to issue a restraining order to legally bar a specific person from accessing her electronic devices remotely?

Or is the situation more akin to the very nebulous crimes of “witness tampering” (two subjective variables) and “conspiracy” that gives organized crime prosecutors a handy multitool to rope in everyone in a targeted person’s social circle and force them to talk?

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...