Comment Re:Chain of custody? (Score 0) 237
First they prove they can do it by giving them several phones with the same kind of firmware, iOS version, encryption, etc, set up and locked by the FBI with known data with the FBI watching and being informed in detail what is going one each step of the way. Assuming they are successful, they then fly out the team to a controled area, have all their equipment and software inspected. You then put out 5 phones of which one is the real one, and 4 others have fake but known data. As long as the 4 fake phones have the data you are expecting, it is very likely the data from the real one is correct (not altered.)
Of course, if it is a software solution of some sort that is relatively easy to run, the FBI could just buy it and run the tests themselves...