Caselaw

Serious Crimes Case (Center) 16924-10-22 State of Israel v. Iman Musrati - part 49

January 21, 2026
Print

Therefore, it is not only Waspi's firm impression that the defendant will not hand over his phone to the defendant to the defendant, but also the totality of the circumstances surrounding the message sent by subscriber 685 at 11:40 a.m.  on the day of the murder.  What reason would another person, other than the defendant, who temporarily holds the device as an operational phone in the framework of a serious criminal incident, find a casual Friday blessing from a number that is not kept as a contact, from a device that is not his own, in the midst of such an event? The only plausible explanation is that it was the defendant, who had a routine of such messages with Wasfi, who sent the same reply, as he had always done, despite the exceptional circumstances in which he was subjected.

If these arguments, which are well anchored in logic, common sense and life experience, are not enough, then the assumption that the defendant was the one who held the 685 subscription that day and that he replied at 11:40 a.m.  to Wasfi's blessing, is further substantiated by an objective technological-forensic perspective.  As you may recall, at a certain point, the investigation team was able to identify the code/password that protected the Samsung A32 device, and with its help they were able to unlock the device and penetrate it.  However, after unlocking the device, it became clear that the WhatsApp application was "locked" by means of a fingerprint, so that unlike the other apps on the phone, additional identity verification is required via TA in order to be able to correspond on WhatsApp and review messages, beyond the general code that opens the phone.  The head of the ZIT division in the Central District Command was able to overcome this difficulty in a sophisticated way, by adding an additional TA in the biometric identification settings, and by opening the application using the new fingerprint, so that it was possible to expose and document the WhatsApp correspondence [see P/101 - Infiltration of a cellular device, P/103 - video documentation of the bypass process].

Previous part1...4849
50...165Next part