Cellebrite

Last updated

Cellebrite DI Ltd.
Company type Public
Nasdaq:  CLBT
Industry
Founded1999;25 years ago (1999), in Petah Tikva, Israel
Founders
  • Avi Yablonka
  • Yaron Baratz
  • Yuval Aflalo
Headquarters
Petah Tikva
Number of locations
14 (2021)
Area served
Worldwide
Key people
Number of employees
1,000+ (2023) [1]
Parent Sun Corporation
Divisions Mobilogy
Website cellebrite.com

Cellebrite DI Ltd. is a digital intelligence company headquartered in Petah Tikva, Israel, that provides tools for law enforcement agencies as well as enterprise companies and service providers to collect, review, analyze and manage digital data. [2] Their flagship product series is the Cellebrite UFED.

Contents

Cellebrite is a fully owned subsidiary of Sun Corporation based in Nagoya, Japan. The company has fourteen offices around the globe, including business centers in Washington, D.C., Munich, Germany, and Singapore. [3] In 2021, the company was valued at approximately $2.4 billion. [4]

History

Cellebrite was established in Israel in 1999 by Avi Yablonka, Yaron Baratz, and Yuval Aflalo. [5]

Ron Serber joined Cellebrite in 2001 and Yossi Carmil joined in 2004. Since 2005 they both served as Co-CEO's until Ron Serber left the company in 2020. Carmil has since been the sole CEO.

Cellebrite first manufactured hardware and software that offered a compressive phone-to-phone data transfer devices, contact synchronization and content transfer tools for mobile phones, intended for use by wireless carrier sales and support staff in retail stores.

In 2007, Cellebrite established an independent mobile forensics division aimed at producing digital forensics and intelligence tools for use by law enforcement, intelligence agencies, military branches, corporate security and investigations, law firms, and private digital forensic examiners. [6] [7] That year, Cellebrite was acquired by FutureDial Incorporated and one of its major shareholders, Sun Corporation in Japan. [8]

In 2017, Cellebrite's Mobile Lifecycle division was rebranded as Mobilogy, which produces hardware and software for phone-to-phone data transfer, backup, mobile applications electronic software distribution, and data analysis tools. [9]

In 2019, Israeli Growth Partners (IGP) invested $110 million in Cellebrite. [10]

In January 2020, Cellebrite announced the acquisition of US-based BlackBag Technologies, Inc., a forensics company with a focus on computer forensics. The acquisition allowed Cellebrite to expand its digital intelligence solution offerings to include data collection tools from computers. [11]

In April 2021, Cellebrite announced plans to go public via a merger with TWC Tech Holdings II Corporation, a blank-check firm. Once completed, Cellebrite would become a publicly listed company on the Nasdaq under the new ticker symbol, "CLBT"; the pro forma implied equity value of Cellebrite post-merger is expected to be approximately $2.4 billion. [12] [13] In July 2021, a group of civil society organizations signed a letter arguing that the company should not be allowed to go public prior to demonstrating compliance with human rights. [14] [15] In August 2021, Cellebrite announced the completion of the merger. [16] The Nasdaq ticker symbols were renamed to CLBT and CLBTW on the announcement day. [17]

In July 2024, Cellebrite announced that it was acquiring Cyber Technology Services, [18] a US-based cybersecurity company licensed to work on federal projects with maximum security clearance. [19]

Subsidiaries

Technology

Cellebrite's products are classified as "dual-use civilian services," and not security-related, a distinction which it is argued allows them to operate without serious oversight from the Israeli government. [23]

In 2007, Cellebrite introduced the first version of their Universal Forensic Extraction Device (or UFED), a portable tool capable of extracting the contents of a cell phone, which became popular with law enforcement agencies around the world. [19]

In 2019, Cellebrite announced a new version of their flagship UFED product called UFED Premium. The company claimed that it can unlock iOS devices including those running iOS 12.3 and Android phones such as the Galaxy S9. [24]

In 2021, Moxie Marlinspike, creator of the encrypted messaging app Signal, pointed to a number of vulnerabilities in Cellebrite's UFED and Physical Analyzer software that allowed for arbitrary code execution on Windows computers running the software. One exploit he detailed involved the UFED scanning a specially formatted file which could then be used to execute arbitrary code on the computer running the UFED. Marlinspike wrote that the code could then "[modify] not just the Cellebrite report being created in that scan, but also "all previous and future generated Cellebrite reports" from all previously scanned devices and all future scanned devices in any arbitrary way." [25] Marlinspike also found that Cellebrite software was bundled with out-of-date FFmpeg DLL files from 2012, which lacked over 100 subsequent security updates. Windows Installer packages, extracted from the Windows installer for iTunes and signed by Apple, were also found, which he said raised legal concerns. [26] Cellebrite responded that the company "is committed to protecting the integrity of our customers' data, and we continually audit and update our software in order to equip our customers with the best digital intelligence solutions available." [27] The report by Signal followed an announcement by Cellebrite in 2020 that it had developed technology to crack encrypted messages in the Signal app, a claim the company later retracted and downplayed. [28] [29] The announcement by Marlinspike raised questions about the integrity of data extracted by the software, [30] [31] and prompted Cellebrite to patch some of the vulnerabilities found by Signal and to remove full support for analyzing iPhones. [32] [33]

Law enforcement and government assistance

Bangladesh

The software has been sold to the Rapid Action Battalion (RAB) in Bangladesh. After a connection between Cellebrite and the extrajudicial killings of the RAB was reported in 2021, Cellebrite announced they would cease selling products to the organization. It is likely the RAB can continue to use the existing Cellebrite products they had already purchased. [23]

Belarus and Russia

Cellebrite's UFED program was used to persecute the democratic opposition in Belarus and Russia; Vladimir Putin used the technology against his political opponents for many years. [34] In March 2021, after finding out that technology was used in the Lyubov Sobol affair, a Jerusalem activist filed a lawsuit against the company in the Israeli Supreme Court. The company announced the termination of cooperation with Russia and Belarus shortly afterwards. [35]

Botswana

In May 2021, the Committee to Project Journalists reported that police in Botswana used a UFED device sold by Cellebrite to extract data from the phone of journalist Oratile Dikologang, the digital editor and co-founder of the Botswana People’s Daily News website, after a senior office ordered that his device be searched for information about "offensive" Facebook posts. [36]

Brazil

In March 2021, the Civil Police of Rio de Janeiro State opened an investigation into the mysterious death of 4-year old Henry Borel. [37] The boy's stepfather Jairinho and his mother Monique Medeiros were arrested for obstructing the investigation into the boy's death and were being investigated for homicide. Rio de Janeiro police used Cellebrite devices to extract deleted WhatsApp messages between Jairinho, Medeiros, and Henry's nanny, which the department described as "essential technical evidence" for the case. [37] [38]

European Union

In 2019, Cellebrite advertised their products as an effective way to combat refugees in the European Union, stating that 77% of refugees arrived in Europe without documentation, though 43% had a smartphone. [39]

Hong Kong

In August 2020, MIT Technology Review reported that Cellebrite sold its services to the Hong Kong Police Force for use in unlocking phones of detained demonstrators during the 2019–20 Hong Kong protests. [40] As of October 7, 2020, the company announced that it would stop selling its solutions and services to customers in Hong Kong and China as a result of a change in U.S. regulations. [41] However, in 2021 The Intercept reported the software was still being sold to China. [42]

Myanmar

In 2021, the New York Times reported that Myanmar's state budget included MacQuisition, a forensic software product made by Cellebrite subsidiary BlackBag Technologies that is used to extract data from Apple computers. Court document also showed that police in Myanmar reported using Cellebrite forensic technology to obtain data from the phones of two Reuters journalists, who were tried and convicted in 2018 for publishing evidence of a Rohingya massacre in Myanmar in 2017. A spokesperson for Cellebrite stated that Cellebrite stopped selling to Myanmar in 2018 and that BlackBag had not sold to Myanmar after being acquired by Cellebrite in 2020. [20]

Philippines

The Philippines government under president Rodrigo Duterte was a purchaser of Cellebrite, and the company trained many of the country's government bodies, including some involved in the thousands of extrajudicial killings of the Philippine drug war. According to journalist Antony Loewenstein, Cellebrite cannot claim ignorance of its involvement in the killings. [43]

Saudi Arabia

On 16 September 2020, Haaretz reported how Cellebrite had provided Saudi Arabia with mobile phone hacking services. The staff at Cellebrite demanded the Saudis to send a government representative to meet one of their employees at the King Khalid International Airport in Riyadh. Following the demand, a representative of Cellebrite traveled to Riyadh in November 2019 for a hacking attempt on a phone in the possession of a Saudi Justice Ministry employee. The Cellebrite representative called for the authorities to let him pass through passport control without getting his passport stamped or his electronic equipment being checked, while remaining only under his possession. The hacker was supposed to head to an isolated hotel room from the airport, where the process was planned to be executed without any electronic surveillance. The Cellebrite representative then returned to the Riyadh airport to fly back to London. [44]

Serbia

In December 2024, Amnesty International reported that police in Serbia had used Cellebrite UFED tools to bypass security measures on an Android device belonging to Slaviša Milanov, an independent journalist from Dimitrovgrad, as well as on devices belonging to environmental activists in the country, and had subsequently installed a novel form of domestically-produced spyware known as NoviSpy on the targeted devices. [45]

Thailand

In October 2018, the Freeland Foundation, a global non-profit organization that fights wildlife and human trafficking, was called in to assist a Thai Police investigation into two Vietnamese males suspected of wildlife trafficking. Freeland's forensics experts were dispatched to the scene to provide on-the-job training. Using Cellebrite devices, police discovered evidence the poaching coordinators had arrived in Thailand to sponsor targeted hunting in Thailand, Malaysia and possibly Myanmar. [46]

United Kingdom

In November 2015, 15-year old Kayleigh Haywood from Measham, Leicestershire, was found dead. Leicestershire Police used a Cellebrite device to unlock Kayleigh's badly damaged smartphone, which led them to whom she had been talking and their whereabouts. This evidence uncovered Kayleigh's murderer Stephen Beardman and her groomer, Luke Harlow, and cleared a suspect who was nowhere near the scene of the crime at the time of her murder. [47]

In 2024, seven UK government agencies signed contracts with Cellebrite, including three police agencies, London’s city authority, and the UK Foreign Office, which collectively spent $370,000 on contracts for Cellebrite services. [19]

United States

In April 2011, the Michigan chapter of the American Civil Liberties Union questioned whether Michigan State Police (MSP) troopers were using Cellebrite UFEDs to conduct unlawful searches of citizens' cell phones. [48] Following its refusal to grant the ACLU of Michigan's 2008 Freedom of Information Act request unless the organization paid $544,000 to retrieve the reports, MSP issued a statement claiming that it honored the Fourth Amendment in searching mobile devices. [49]

In March 2016, it was reported that Cellebrite offered to unlock an iPhone involved in the FBI–Apple encryption dispute. [50] Later, after the FBI announced it had successfully accessed the iPhone thanks to a third party, a press report claimed Cellebrite had assisted with unlocking the device, [51] which an FBI source denied. [52]

In 2017, Cellebrite entered into a contract with U.S. Immigration and Customs Enforcement (ICE) for $2.2 million. [53] On June 24, 2019, another contract was signed with ICE for between $30 and $35 million. The 2019 contract was for "universal forensic extraction devices (UFED), accessories licenses, training and support services" for one year, with an option to extend for up to five years. [54] [55]

In July 2024, the FBI gained access to the phone of Thomas Matthew Crooks, the man that tried to assassinate the former President Donald Trump, using unreleased technology from Cellebrite. After initial attempts with existing Cellebrite software failed due to the phone's advanced security, the FBI received new, still-in-development software from Cellebrite's federal team, which enabled them to unlock the phone within 40 minutes. [56]

Security breaches

On 12 January 2017, it was reported that an unknown hacker had acquired 900 GB worth of confidential data from Cellebrite's external servers. The data dump includes alleged usernames and passwords for logging into Cellebrite databases connected to the company's my.cellebrite domain, and also contains what appear to be evidence files from seized mobile phones, and logs from Cellebrite devices. [57] The dumped data suggested Cellebrite sold its data extraction products to countries such as Turkey, the United Arab Emirates and Russia. [58]

Related Research Articles

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton.

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches. A jailbroken device typically permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

<span class="mw-page-title-main">Mobile device forensics</span> Recovery of evidence from mobile devices

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.

<span class="mw-page-title-main">Moxie Marlinspike</span> American entrepreneur

Matthew Rosenfeld, better known by the pseudonym Moxie Marlinspike, is an American entrepreneur, cryptographer, and computer security researcher. Marlinspike is the creator of Signal, co-founder of the Signal Technology Foundation, and served as the first CEO of Signal Messenger LLC. He is also a co-author of the Signal Protocol encryption used by Signal, WhatsApp, Google Messages, Facebook Messenger, and Skype.

<span class="mw-page-title-main">WhatsApp</span> Messaging and VoIP service owned by Meta

WhatsApp is an instant messaging (IM) and voice-over-IP (VoIP) service owned by technology conglomerate Meta. It allows users to send text, voice messages and video messages, make voice and video calls, and share images, documents, user locations, and other content. WhatsApp's client application runs on mobile devices, and can be accessed from computers. The service requires a cellular mobile telephone number to sign up. In January 2018, WhatsApp released a standalone business app called WhatsApp Business which can communicate with the standard WhatsApp client.

Whisper Systems was an American enterprise mobile security company that was co-founded by security researcher Moxie Marlinspike and roboticist Stuart Anderson in 2010. The company was acquired by Twitter in November 2011. Some of the company's software products were released under open-source licenses after the acquisition. An independent group called Open Whisper Systems later picked up the development of this open-source software, which led to the creation of the Signal Technology Foundation.

David Wang is a mobile phone hacker.

<span class="mw-page-title-main">Open Whisper Systems</span> Open source software organization

Open Whisper Systems was a software development group that was founded by Moxie Marlinspike in 2013. The group picked up the open source development of TextSecure and RedPhone, and was later responsible for starting the development of the Signal Protocol and the Signal messaging app. In 2018, Signal Messenger was incorporated as an LLC by Moxie Marlinspike and Brian Acton and then rolled under the independent 501(c)(3) non-profit Signal Technology Foundation. Today, the Signal app is developed by Signal Messenger LLC, which is funded by the Signal Technology Foundation.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

<span class="mw-page-title-main">Signal (software)</span> Privacy-focused encrypted messaging app

Signal is an open-source, encrypted messaging service for instant messaging, voice calls, and video calls. The instant messaging function includes sending text, voice notes, images, videos, and other files. Communication may be one-to-one between users or may involve group messaging.

<span class="mw-page-title-main">Apple–FBI encryption dispute</span> 2015–2016 public relations and legal dispute

The Apple–FBI encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access to strong encryption.

<span class="mw-page-title-main">NSO Group</span> Israeli cyber-espionage and malware firm

NSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones. It employed almost 500 people as of 2017.

Pegasus is a spyware developed by the Israeli cyber-arms company NSO Group that is designed to be covertly and remotely installed on mobile phones running iOS and Android. While NSO Group markets Pegasus as a product for fighting crime and terrorism, governments around the world have routinely used the spyware to surveil journalists, lawyers, political dissidents, and human rights activists. The sale of Pegasus licenses to foreign governments must be approved by the Israeli Ministry of Defense.

Grayshift is an American mobile device forensics company which makes a device named GrayKey to crack iPhones, iPads, and Android devices. In 2023, it merged with the Canadian firm Magnet Forensics.

<span class="mw-page-title-main">Jeff Bezos phone hacking incident</span> Incident involving Jeff Bezos and Saudi Arabia

In January 2020, the FTI Consulting company claimed that in May 2018 with "medium to high confidence" the phone of Jeff Bezos had been hacked by a file sent from the WhatsApp account of the crown prince of Saudi Arabia, Mohammed bin Salman. The Saudi Arabian embassy to the United States has denied the allegations. Billionaire Jeff Bezos, the owner of The Washington Post newspaper and founder of the company Amazon, engaged FTI Consulting in February 2019 after the National Enquirer in January 2019 reported details of Bezos's affair. FTI Consulting did not link the National Enquirer to the hack. In December 2021, the FBI stated they could not find proof to substantiate claims that Saudi Arabia hacked Jeff Bezos's phone, and has considered an investigation into those allegations a low priority.

<span class="mw-page-title-main">Bootloader unlocking</span> Process of disabling secure device booting

Bootloader unlocking is the process of disabling the bootloader security that makes secure boot possible. It can make advanced customizations possible, such as installing custom firmware. On smartphones, this can be a custom Android distribution or another mobile operating system. Some bootloaders are not locked at all and some are locked, but can be unlocked with a command or with assistance from the manufacturer. Some do not include an unlocking method and can only be unlocked through a software exploit.

<span class="mw-page-title-main">Cellebrite UFED</span> Software to extract data from mobile devices

The UFED is a product series of the Israeli company Cellebrite, which is used for the extraction and analysis of data from mobile devices by law enforcement agencies.

References

  1. "2023Q4 Earnings presentation".
  2. "Cellebrite DI Ltd". Archived from the original on September 1, 2021.
  3. "About - Cellebrite".
  4. "Cellebrite to go public via $2.4 billion SPAC deal". Reuters. April 8, 2021.
  5. Annasha (May 5, 2022). "Cellebrite - Global Leader In The Digital Intelligence Sector". Your Tech Story. Retrieved October 5, 2023.
  6. "Cellebrite Customers" . Retrieved April 9, 2017.
  7. "Press Kit (2021)" (PDF). Archived from the original (PDF) on August 3, 2022.
  8. "FutureDial and Sun Corporation Acquire Cellebrite". ThomasNet. Retrieved July 19, 2012.
  9. "Mobilogy Rebrand Press Release" (PDF). Archived from the original (PDF) on July 3, 2018. Retrieved July 3, 2018.
  10. Rabinovitch, Ari (June 17, 2019). "Israeli digital forensics firm Cellebrite gets $110 mln IGP investment". Reuters. Thomson Reuters. Retrieved July 8, 2020.
  11. Miller, Chance (January 14, 2020). "Cellebrite expands to computers with $33M acquisition of BlackBag Technologies forensics firm". 9to5 Mac. Retrieved July 8, 2020.
  12. "Cellebrite to list on Nasdaq at $2.4b valuation through SPAC". Globes. August 4, 2021. Retrieved April 22, 2021.
  13. "Cellebrite, The Leading Digital Intelligence Solutions Provider, to List on Nasdaq Through Merger with TWC Tech Holdings II Corp". Archived from the original on April 29, 2021.
  14. "USA: Civil society calls on SEC & other stakeholders to halt technology company Cellebrite going public until human rights compliance demonstrated". Business & Human Rights Resource Centre. August 17, 2021. Archived from the original on June 20, 2024. Retrieved October 27, 2024.
  15. "Open Letter: Cellebrite should not go public without demonstrating human rights compliance" (PDF). Access Now . July 13, 2021. Archived (PDF) from the original on July 20, 2024. Retrieved October 27, 2024.
  16. "Cellebrite Announces Effectiveness Of Registration Statement in Connection with its Proposed Business Combination with TWC Tech Holdings II Corp". Archived from the original on August 10, 2021.
  17. "Cellebrite Completes Business Combination with TWC Tech Holdings II Corp., Company Will Begin Trading on Nasdaq Under Symbol "CLBT"". Archived from the original on September 9, 2021.
  18. "Cellebrite Advances Plans to Transform and Elevate its Strategic Relationship with the U.S. Federal Government". GlobeNewswire News Room. July 17, 2024. Retrieved October 27, 2024.
  19. 1 2 3 4 Gee, Georgia (October 27, 2024). "Israeli Digital Intelligence Firm Aims to Become Top U.S. Contractor". Drop Site News. Retrieved October 27, 2024.
  20. 1 2 Beech, Hannah (March 1, 2021). "Myanmar's Military Deploys Digital Arsenal of Repression in Crackdown". The New York Times . Archived from the original on March 4, 2021. Retrieved October 27, 2024.
  21. "Cellebrite GmbH, Munich, Germany". www.northdata.com.
  22. "Cellebrite GmbH - Registration · Managing Director: Yossi Carmil · Capital: €25,000 · Shareholder agreement · Proxy · Corporate Purpose". www.northdata.com.
  23. 1 2 Lowenstein, Antony (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso Books. p. 212. ISBN   978-1922310408.
  24. "Cellebrite Now Says It Can Unlock Any iPhone for Cops". Wired. ISSN   1059-1028 . Retrieved September 7, 2021.
  25. Marlinspike, Moxie (April 21, 2021). "Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective". Signal Blog. Archived from the original on April 21, 2021. Retrieved April 22, 2021.
  26. Goodin, Dan (April 21, 2021). "In epic hack, Signal developer turns the tables on forensics firm Cellebrite". Ars Technica . Archived from the original on April 21, 2021. Retrieved April 22, 2021.
  27. Kan, Michael (April 21, 2021). "iPhone Hacking Device From Cellebrite Is Rife With Exploitable Flaws, Says Signal". PCMag . Archived from the original on April 21, 2021. Retrieved April 22, 2021.
  28. "Encrypted chat app Signal alleges flaws in Cellebrite equipment". Reuters. April 21, 2021. Retrieved April 22, 2021.
  29. "Signal slams Cellebrite security company over alleged security holes". BBC News. April 22, 2021. Retrieved April 23, 2021.
  30. Ropek, Lucas (April 27, 2021). "Signal's Cellebrite Hack Is Already Causing Grief for the Law". Gizmodo . Archived from the original on April 28, 2021. Retrieved April 28, 2021.
  31. Yaron, Oded; Benjakob, Omer (April 25, 2021). "'Stop Using Cellebrite': Israeli, U.K. Police Urged to Stop Using Phone-hacking Tech". Haaretz . Archived from the original on April 28, 2021. Retrieved April 28, 2021.
  32. Lovejoy, Ben (April 27, 2021). "Cellebrite Physical Analyzer no longer fully available for iPhones following Signal blog post". 9to5mac. Archived from the original on April 28, 2021. Retrieved April 28, 2021.
  33. Franceschi-Bicchierai, Lorenzo; Cox, Joseph (April 27, 2021). "Cellebrite Pushes Update After Signal Owner Hacks Device". Motherboard . Archived from the original on April 28, 2021. Retrieved April 28, 2021.
  34. Lowenstein, Antony (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso Books. p. 22. ISBN   978-1922310408.
  35. ""Через 6 часов они ушли из России". Юрист вынудил израильских взломщиков смартфонов разорвать отношения с российскими силовиками". Медиазона.
  36. Rozen, Jonathan (May 5, 2021). "Equipped by US, Israeli firms, police in Botswana search phones for sources". Committee to Protect Journalists . Archived from the original on July 12, 2024. Retrieved October 27, 2024.
  37. 1 2 Digital, Olhar (April 9, 2021). "Israeli software was decisive in the police decision on the Henry case". Olhar Digital (in Brazilian Portuguese). Archived from the original on April 17, 2021. Retrieved June 14, 2021.
  38. "Henry Borel: Como polícia teve acesso a mensagens de WhatsApp apagadas por casal". BBC News Brasil (in Brazilian Portuguese). Retrieved June 14, 2021.
  39. Lowenstein, Antony (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso Books. p. 137. ISBN   978-1922310408.
  40. O'Neill, Patrick Howell (August 25, 2020). "Israeli phone hacking company faces court fight over sales to Hong Kong". MIT Technology Review. Retrieved August 30, 2020.
  41. Shmuklyer, Olga (October 7, 2020). "Cellebrite to Stop Selling Its Digital Intelligence Offerings In Hong Kong & China". Cision PR Newswire. Retrieved October 9, 2020.
  42. Mara Hvistendahl, "Chinese police kept buying Cellebrite phone hackers after the company said it ended sales," The Intercept, August 17, 2021
  43. Lowenstein, Antony (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso Books. p. 210. ISBN   978-1922310408.
  44. "Revealed: Israeli Firm Provided Phone-hacking Services to Saudi Arabia". Haaretz. Retrieved September 16, 2020.
  45. ""A Digital Prison": Surveillance and the suppression of civil society in Serbia". Amnesty International . December 16, 2024. Archived from the original on December 16, 2024. Retrieved December 16, 2024.
  46. "Investigation Reveals Cross Border Tiger Syndicate". Freeland Foundation . January 21, 2019. Archived from the original on January 22, 2021.
  47. Murphy, Margi (May 23, 2021). "Meet the man behind controversial iPhone-cracking company Cellebrite". The Telegraph.
  48. Sullivan, Bob. "Gadget gives cops quick access to cell phone data". MSNBC. Archived from the original on April 23, 2011. Retrieved April 21, 2011.
  49. Heussner, Ki Mae. "Michigan Police Use Device to Download Cellphone Data; ACLU Objects". ABC News. Retrieved June 8, 2012.
  50. "San Bernardino shooting:Israeli company is helping the FBI, reports say". The Press-Enterprise. March 23, 2016. Retrieved March 23, 2016.
  51. Benmeleh, Yaacov (March 30, 2016). "FBI Worked With Israel's Cellebrite to Crack iPhone". Bloomberg.com. Retrieved April 1, 2016.
  52. "FBI's Comey, officials discount two iPhone hack theories". USA Today. Retrieved April 1, 2016.
  53. Fox-Brewster, Thomas. "US Immigration Splurged $2.2 Million On Phone Hacking Tech Just After Trump's Travel Ban". Forbes. Retrieved September 13, 2019.
  54. Montgomery, Blake (September 11, 2019). "ICE Has a New $30M Contract With Israeli Phone Cracking Company Cellebrite" . Retrieved September 13, 2019.
  55. Pelt, Mason (September 13, 2019). "ICE Will Pay Up To 35M To Cellebrite For Phone Hacking Tech". Internet News Flash. Retrieved September 13, 2019.
  56. Murphy, Margi; Manson, Katrina (July 18, 2024). "FBI Used New Cellebrite Software to Crack Trump Shooter's Phone". Bloomberg News . Archived from the original on July 19, 2024. Retrieved October 27, 2024.
  57. "Hacker Steals 900 GB of Cellebrite Data". Motherboard.
  58. Cox, Joseph (January 12, 2017). "Cellebrite Sold Phone Hacking Tech to Repressive Regimes, Data Suggests". Motherboard. Retrieved July 3, 2017.