Skip to main content

À la carte phone hacking is scary, but it’s better than a government backdoor

Another day, another hack by the Israeli firm that’s become a go-to for exposing what’s happening in various high-profile targets’ phones. If you haven’t heard of Cellebrite yet, it’s because you’re not Jeff Bezos, Lev Parnas, or a criminal whose phone the FBI would very much like to access.

Recommended Videos

The company has hacked several phones on behalf of the U.S. government, and in the Bezos case, was actually used by experts at the United Nations to analyze how, exactly, the Amazon founder’s phone was hacked.

Please enable Javascript to view this content

Cellebrite is not the only name in the game: There’s also the much shadier NSO Group, which experts suspect has been hired by authoritarian regimes to spy on journalists and dissidents. GrayKey, Paraben, Blackbag, and MSAB have also all sold their phone-hacking tech to at least two dozen law enforcement agencies around the U.S., according to a report by OneZero.

That report revealed in stark detail just how widespread the use of this type of phone hacking tech has become across the country: It is truly possible for most law enforcement agencies to access the phone of just about anyone, if they so wish.

Yet the U.S. government, from President Donald Trump to the FBI, continues to demand that Apple and other tech companies provide authorities with an encryption backdoor — an idea that privacy advocates all agree is an extremely bad one.

Image used with permission by copyright holder

“I would rather see this than mandatory backdoors,” said Ron Gula, in reference to having companies like Cellebrite in operation. Gula is a former National Security Agency white-hat hacker who now invests in up-and-coming cybersecurity companies in the D.C. area. “Of course, I would rather there be no vulnerabilities at all. But this is a world were law enforcement relies on vulnerabilities to do intelligence gathering, and I want them to focus on that, and not mandatory backdoors. Otherwise, we’re China.”

Rosa Smothers, a former CIA analyst who is now the senior vice president of cyber operations at KnowBe4, a provider of digital security awareness training, said she “1,000% agrees” with Gula’s assessment. “The government has to weigh the benefit of that kind of exploitation and whether it’s worth that kind of security damage,” she told Digital Trends.

“We should all be very concerned about people getting into digital devices,” said David Harding, senior vice president and chief technical officer at ImageWare, a biometric digital security company that works in both the private sector and with the government. “And we should all be very concerned about a government that has everybody’s information readily accessible.”

Why Cellebrite matters

Cellebrite is truly the 800-pound gorilla in the industry, according to Smothers, which is why its name keep popping up in so many cases. “They’re the most user-friendly,” she told Digital Trends, which is useful for police precincts that might not have the time or resources to train up their offices on very technical software. (Cellebrite told Digital Trends that it “cannot comment on specific cases.”)

cellebrite machine
An engineer shows devices developed by the Israeli firm Cellebrite that can hack a locked smartphone and pull the data from it. Jack Guez / AFP via Getty Images

Companies like Cellebrite rely on finding existing vulnerabilities in operating systems and software to provide access opportunities into phones (and they keep those a secret, so companies like Apple don’t get wise and patch them). As those vulnerabilities are updated, these companies must also update their methods. An encryption backdoor would eliminate the need for these kinds of constant updates, and would make it easier to actually read any images that police had taken off of a phone. “They are only as successful as the availability of these vulnerabilities,” Harding said.

The legality of all of this is still extremely fuzzy, said Harding. Every state has its own regulations, and they’re changing all the time: some states will allow police to take someone’s biometric data but not a password, for example. “It’s a bit patchwork in this country,” Harding said.

For now, an average person on the street should probably assume that their phone can and has been accessed by some random tech firm. “We’re all only a few degrees away from someone interesting,” Gula said. “Everyone’s got something to steal.”

These companies all advertise strictly to law enforcement — for now. Smothers said it should stay that way. “Yes, we want to be able to seize the phones of terrorists from Afghanistan or Syria, and see what they’re planning,” she said. “But the reality on the ground is, if the government starts introducing purposeful backdoors, every intelligence agency in the world will be full-court press to get into those phones. You’ll be ringing the dinner bell.”

“It’s really unfortunate that there might be terror cells in the U.S.,” said Gula. “But the threat of someone with a gun who might be part of a terrorist group doesn’t rise to the occasion of needing to put a backdoor on everyone’s phones.”

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
Apple is eyeing AirPods with camera and health sensors as a priority
Simon Cohen wearing Apple AirPods 4.

Apple CEO Tim Cook recently sat for an interview with Wired and dished on Apple’s focus in the foreseeable future. Health and wellness stood out as a recurring element. AirPods, which recently landed a hearing assistance facility, are visibly at the center of those ambitions. Now, Bloomberg reports that the earbuds will soon add cameras and health sensors to their arsenal.

At one point in time, Apple was reportedly working on integrating cameras into the wireless earbuds, but the project was put on ice. It seems that the recent explosion of AI-based workflows across nearly every product category inspired Apple to revive the endeavor.

Read more
Waymo’s robotaxis are safer than human-driven vehicles, study says
A Waymo robotaxi picking up a passenger.

Love them or hate them, but robotaxis have certainly been making headlines in 2024. And beyond the glamorous, sci-fi-inspired marketing around Tesla’s recently unveiled Cybercab robotaxi, safety has remained, in one way or another, a recurring theme.

Earlier this year, a survey revealed a majority of the U.S. public, or 68%, brought up safety concerns when asked what they thought about having self-driving vehicles (SDVs) on public roads. Yet within that majority, more than half either believe that SDV safety issues can be addressed or that SDVs will actually be safer than humans.

Read more
Masters of the Universe movie casts Jared Leto as Skeletor
Jared Leto furrows his eyebrows in Blade Runner 2049.

Mattel and Amazon MGM's live-action Masters of the Universe movie has added yet another noteworthy name to its cast. Variety reports that Morbius and House of Gucci star Jared Leto has signed on to play the skull-faced sorcerer known as Skeletor in the film. Skeletor is the villainous archnemesis of He-Man, who will be played in the new Masters of the Universe movie by Bottoms and The Idea of You actor Nicholas Galitzine.

Sam C. Wilson (House of the Dragon), Kojo Attah (The Beekeeper), and Hafthor Bjornsson (Game of Thrones) have also joined the Masters of the Universe cast as Trap Jaw, Tri-Klops, and Goat Man, three of Skeletor's henchmen. They, along with Leto, mark the latest additions to what is shaping up to be a star-studded ensemble, which already includes Alison Brie as Evil-Lyn, Skeletor's second-in-command; Idris Elba as Duncan/Man-At-Arms, one of He-Man's closest allies; and Camila Mendes as Teela, Man-At-Arms' fierce adopted daughter.

Read more