Cellebrite asks cops to keep its phone hacking tech ‘hush hush’ | TechCrunch::For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite to unlock phones and In a leaked video, a Cellebrite employee urges law enforcement customers to keep their use of its phone hacking technology secret.
Reminder: They’re using your tax dollars to pay other companies to spy on you. This will only get worse.
I really love Signal.
That was the article that introduced me to signal, very good read.
I like this part…
For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.
They’ll do their best to keep this out of the courtroom. This is a spying tool for parallel construction and espionage (corporate, political, etc) and they do not want to get called onto the stand under oath to testify about it.
Yes they will, and it will work. It’s not like this is the first time fascists built tools for other fascists to use on the public illegally, then once it came to light the tired, sick, worked to death population did exactly what they were conditioned to do, nothing, because they can’t, they have no power, because they have been drained by corporate fascists so they have no recourse, no say in anything, it’s just go back to work to make sure you’re not eating out of garbage cans by next month.
The public is apathetic, but it’s by design, if you don’t already know about Edward Bernays then I suggest looking him up and finding out how they control the public. This however feels vary familiar, there was a scandal in the 90s about Stingray devices being used illegally by guess who… fascist cops doing what the fascist propaganda taught them their whole life, get those “criminals” anyway you can, even if you have to become the highest order of criminal scum to do so, all those cop shows conditioned those fascists just right (no pun intended.) In other words this is just business as usual. Here’s a link to Wikipedia about Stingray devices if you’re interested. https://en.m.wikipedia.org/wiki/Stingray_use_in_United_States_law_enforcement
I’m sorry but this is just not true.
Any given criminal case these days is lousy with cellebrite reports.
This is the best summary I could come up with:
This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.
“We don’t really want any techniques to leak in court through disclosure practices, or you know, ultimately in testimony, when you are sitting in the stand, producing all this evidence and discussing how you got into the phone,” the employee, who we are not naming, says in the video.
“The results these super-secretive products spit out are used in court to try to prove whether someone is guilty of a crime,” Riana Pfefferkorn, a research scholar at the Stanford University’s Internet Observatory, told TechCrunch.
“The accused (whether through their lawyers or through an expert) must have the ability to fully understand how Cellebrite devices work, examine them, and determine whether they functioned properly or contained flaws that might have affected the results.”
“And anyone testifying about those products under oath must not hide important information that could help exonerate a criminal defendant solely to protect the business interests of some company,” said Pfefferkorn.
“It’s super important to keep all these capabilities as protected as possible, because ultimately leakage can be harmful to the entire law enforcement community globally,” the Cellebrite employee says in the video.
The original article contains 821 words, the summary contains 217 words. Saved 74%. I’m a bot and I’m open source!
If the cops have it then the crims have it too. That’s the way it worlds. Every time.
Since criminals are no longer wearing jail stripes and black opera masks lets get more specific: Industrial spies are the ones who will steal your trade secrets and slush fund accounting records to assure that your business tanks and they get the juicy contracts.
National spies already have this gear, but so do our counter-espionage departments…hypothetically.
Anyone know what Cellebrite can hack these days? I thought many of the latest phones and software versions had closed their vulnerabilities. Does anyone have data on which phones and OS versions are still vulnerable?
My wife works an cellebritete. Its a device you connect to any phone and it gets evidence police is looking for. It can scan ANYTHING on the phone in seconds. This includes messages in applications, phone calls, images, appilcation data. Anything.
The smart thing about this is (if used under legal hands under a non corrupt government/entity) is it can be set up to only spit out relevant evidence by some search predicate / criteria and nothing else incriminating.
So for example if someone is arrested for kidnaping and they want to know if the suspect is really a kidnapper and maybe where the victim is it can spit out anything related to the case in question but nothing else incriminating on unrelated stuff.
It does this in under a set of rules admissible in court. IE the evidence cannot be tampered with (even by police) , it assures that the evidence is actually from that specific phone and wasnt touched, changed, modified and norhing was added in and so on…
Yeah, but phones have encryption and security. In order to get access to the data on the phone, cellebrite is hacking the device to circumvent the security measures and break the encryption, which is illegal for any individual to do, and should also be illegal for a corporation to do (corporations are individuals, legally speaking).
Phone manufacturers do not want companies like cellebrite breaking into their devices because it can be used for nefarious purposes. If cellebrite can get in, any other hacker can get in. So, phone makers are always closing these security vulnerabilities where they can find them.
Cellebrite is (hopefully) used under the law. They either get warrant or use a perpetual warrant on urgent security stuff. At least in countries with proper laws and abiding police.
Hackers sure indeed can use the insecurities cellebrite is using. But cellebrite has massive amount of budget for finding insecurities which normal hackers / people lack.
Illegal to hack my own phone? Not even close
It’s like you’re trying to miss the point.
It’s a comment, not my opening arguments to the debate, it’s perfectly legal to “hack” things you own, especially your fucking phone which pokes a hole in your argument that therefore companies shouldn’t be able to either.
It’s illegal to break into other peoples stuff, not your own which is why these loopholes holes will always exist for “consumers” who wish to “get back into their own stuff”
How would making it illegal for companies to find security holes in other companies phones prevent cops from going to underground sources if what they’re doing now is so illegal?
Idk maybe I have missed your point, I really don’t see how the logic follows
I do agree it seems legal to hack the things you own. My comment has nothing to do with that, so your comment felt like a nonsequiter, or at best a straw man.
In this case, cellebrite is not hacking things it owns. It is hacking things other people own. It is bizarre to me how this is legal given the laws against it that individuals have been prosecuted with. Also, doing security research to find vulnerabilities usually results in disclosing those vulnerabilities to the software producer. In this case, cellebrite is not doing that because it would not like to see those vulnerabilities patched.
Cellebrite not disclosing the vulnerabilities isn’t very “nice” but it’s not the law. I’m definitely not arguing for this company being ethical in any way. They’re also not the one hacking other peoples devices. They just make the device that is capable of doing so.
Forgive the analogy, but they’re basically making guns. Now whether or not we should allow anyone to make weapons that could impact others is another question we’ve not had sufficient time to discuss legally yet. Mostly because the govt in my country is old as shit and mostly clueless about tech
The question is which devices it works on. Probably mostly older ones, but I wouldn’t be surprised if they invest heavily into zero day research and can do some stuff with newer ones as well.
I wrote with 100% confidence: all of them. This is what they are a zero day warehouse company and trader.
It’s true, my uncle’s cousin works for Cellebrite and says they can even hack into our brains
I trust you, bro
deleted by creator
My wife works at cellebrite. Its totally not like that. It can have access to ANY phone and any set of data within that phone.
Its using zero day attacks that the company has either bought or found itself. And they are trying to keep their pool of zero day attacks up to date for all most comon phones.
Laughs in FDE pinephone