But cracking the phone isn't a matter of course -- the FBI's currently weighing its "legal and technical" options to get inside the unspecified device. A lot of the FBI's work here depends on what kind of iPhone they recovered, too -- the introduction of iOS 8 two years ago meant not even Apple could decrypt the contents of a locked device running that software.

"Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data," the company wrote in 2014, referring to photos, messages, contacts and more. "So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

Still, that didn't stop the FBI cracking from iPhone 5c owned by Rizwan Farook, one of the San Bernardino shooters who killed 14 people in late 2015. The road to that crack was a winding one -- the FBI originally pushed Apple for support to unlock the iOS 9-powered device, and got court orders compelling the company to assist. Apple resisted, but the FBI ultimately found a way to crack Farook's iPhone without Apple's assistance, a move that apparently cost the bureau a tidy sum. At the time, FBI director James Comey said he hadn't decided if the bureau would reveal that crucial backdoor to Apple out of concerns it would be closed.

While the FBI might still have that particular ace up its sleeve, the process of sifting through Adan's data might be way more difficult. Farook's iPhone 5c lacked the secure enclave that was baked into newer models with the A7 chipset and beyond. It's unclear at this point how much progress the FBI has made -- only time will tell if it'll try to force Apple to help somehow, or how Apple will response if the government comes knocking.