I've taken the time to actually read through most parts of the documents that the TS provided.
According to the file in the zip he provided (363-1.pdf)
Below phones was installed with GrapheneOS
Page 252 PW Protected Pixel 7A - Extracted through videorecording
Page 319 No PW Pixel 6A - Fully extracted
Page 325 PW Protected 6A - Fully extracted
Page 345 PW Protected Pixel 7A - Fully extracted
Page 357 PW Pixel 6A - Fully extracted
Page 370 PW Protected Pixel 7A through videorecording
The USB ports were disabled on some and therefor they were videorecorded.
Some had foreign simcards installed, or was connecting to internet through another device.
Police never mentions any firmwares but you can assume that they were updated until 2024-07-01.
One of the extracted phone (Pixel 6A) was pw protected and switched off. It was fully extracted.
Others were turned on but in a locked state, the Pixel 6As were fully extracted the 7A video recorded (probably turned off USB). Which concludes they had atleast the firmware of when the USB disable functionality was launched.
The phones that were fully extracted, the extraction was done latest on 2024-11-21.
Considering that one of the phones was switched off and pw protected yet fully extracted it means that an exploit was available for them to use between 2024-07-01 and 2024-11-21.
When the phones are under video recording the police turns on airplane mode first to disconnect it from internet and then afterwards starts the videorecording through an external camera.
edit:
No finger unlock was used. They were pw protected.
However we do not know if the password was written anywhere close, if they were shoulder surfed (I doubt this happened though as no evidence pictures provided was so upclose), we also do not know the complexity of the passwords. The phones was collected from someone in Stockholm with preinstalled GrapheneOS, we do not know if this person was undercover to infiltrate or wrote down the passwords somewhere and got raided. There are many questions to how however we can conclude that the phones security were actually bypassed.