JayJay Samsung SM-S901B
"Telefonen har extraherats utan kod och en omfattande datamängd har anträffats." which translates "The phone has been extracted without code and an extensive amount of data has been found."
Likely Cellebrite.
JayJay Xiaomi 12t pro
fully extracted without code same as Samsung above.
Likely Cellebrite.
JayJay Google Pixel 7A.
IMEI 354487201175140
"The device was powered on and password protected.
The available content of the mobile phone has been extracted and a manual review of the
mobile phone has been conducted."
"Available content" meaning everything visible on lock screen? Doesn't sound like they got into that phone.
JayJay Emil Berling arrested 1st sept 2024
"The mobile phone has been extracted and examined manually by filming the screen."
Was it locked? Forced fingerprint unlocked? What phone?
JayJay GrapheneOS Google Pixel- 6a IMEI 35950275382472
Found in his apartment at a later stage - Fully extracted with software
Potentially interesting. Was it passphrase protected?
JayJay Google Pixel 6A with GrapheneOS
The device was turned on and NOT password protected. Found on desktop at home. IMEI 358385582080647
Well, this phone was not passphrase protected, so some use GrapheneOS but with security intentionally disabled (or only fingerprint to unlock).
JayJay Google Pixel 6A with GrapheneOS 1st Sept 2024 IMEI 358385589319923 From Kjellgren, Kent Sven Olof
The device was turned on AND password protected.
"The available content of the mobile phone has been extracted and a manual review of the mobile phone has been carried out."
Another "available content", so only what was on lock screen.
JayJay Google Pixel 7A IMEI 354487205182232
"The device was password protected, but the available content of the mobile phone has been extracted and is available in its entirety in the accompanying material."
Another one. Should be easy to verify it is only info on lock screen by looking in that accompanying material.
JayJay During a search of Firat Akgün's home at Stamgatan 37, Älvsjö, on 30 September 2024, a Google Pixel mobile phone was found.73 The device was found in a closet in the hall and was turned off.
The mobile phone has been identified (IMEI:35950275382472) and has been examined. The contents have been
extracted
If this if extraction of credential encrypted content, which is vague from that phrasing, this is not done by exploit, but knowing, guessing or being given the passphrase. Exploits would not help for BFU devices.
JayJay "The Google Pixel mobile phone has been extracted and Signal chats have been found.3 4
The chats themselves have not been extracted due to technical obstacles as the mobile phone was heavily
encrypted.
No information about how they got into the device, but maybe no passphrase or only fingerprint. This at least shows my theory is wrong, as the only reason they couldn't extract messages is because of Signal's ability to encrypt its messages in another layer at rest. Nothing indicates exploitation.
JayJay Google Pixel 7A. IMEI 352493420613342
"The device was turned on and password protected.
The available content of the mobile phone has been extracted and a manual review of the mobile phone has been carried out. The extraction and manual review of the device are available in their entirety in the accompanying material."
Another one "available content".
JayJay Google Pixel 6A IMEI 358385582080647
"The device was turned on and not password protected.
The available content of the mobile phone has been extracted and a manual review of the mobile phone has been carried out. The extraction and manual review of the device are in their entirety in the accompanying material. For your information, the extraction and manual review have generated different materials."
Not passphrase protected.
So, summary, no signs of any exploitation of vulnerabilities in GrapheneOS in any of these cases. Non-Pixels might have been victims to Cellebrite, but we know already they are vulnerable at that point of time and likely still.
Thank you a lot @JayJay for compiling this list. It saved me a lot of work.