There are methods to maintain somebody from remotely wiping data from a mobile phone or utilizing information encryption to hide evidence, the ruling observed, and exemptions that let for warrantless queries will continue to exist with regard to crisis cases for example that presented in disrupting a terrorist How to trace an apple iphone secretly.