Possible Ways To Break The Encryption Code Of The San Bernardino Shooter’s Phone…Cut Off His Thumb

“It probably depends on if he used a thumb to actually lock the phone vs a passcode, that could potentially work. We have seen, I wrote about this in my book, where you could actually transfer a fingerprint to a gummy bear and use the gummy bear to actually trick some of the fingerprint readers.”

—Theresa Peyton on if it’s possible to cut off San Bernardino shooter Syed Farook’s thumb to access his encrypted phone

Theresa Peyton, former White House Chief Information Officer and author of Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family, called into Kilmeade & Friends to talk about the problems the FBI is having accessing the encrypted phone of San Bernardino shooter Syed Rizwan Farook. Peyton doesn’t fault the FBI’s efforts not being able to crack the encryption. She explained technology is always moving at a rapid pace and phone manufactures are using technology to protect the privacy of the users by incorporating either a thumb print or access code and the phone companies no longer have a back door access to unlock the phones. Peyton said another problem with the new phones is if there are 10 failed attempts to unlock an encrypted phone, all data will be erased forever. Peyton did say that it is possible to cut off the thumb of Farook and use his thumb to gain access to the phone, just like in the movies and on TV.

Plus, Peyton weighed in on Hillary Clinton using her private server to e-mail classified information to her colleagues and discussed the protocol that was used when she was in the Bush Administration when it came to accessing official e-mails.

Listen here: