Police Used Cellebrite to Crack Kenyan Activist's Phone
Here's what you should know about commercial phone-hacking tools being used against activists. The latest case involves Kenya.
Your phone just became a lot less private if you're an activist in Kenya. Researchers at Citizen Lab discovered that Kenyan authorities broke into a prominent dissident's phone using Cellebrite's forensic extraction tools while the device was in police custody.
So what's Cellebrite? It's an Israeli company that makes powerful phone-cracking software, originally designed to help law enforcement solve crimes. Think of it as a master key for smartphones - it can bypass locks, extract messages, photos, location data, basically everything on your device. And yeah, it works on both iPhones and Android phones.
Here's where things get sketchy. This technology was supposedly built for fighting serious crimes, but now we're seeing it used to target people who speak out against their governments. The Kenyan case isn't unique either. We've seen similar abuse in countries like Bangladesh, Belarus, and Russia over the past few years.
What strikes me about this whole situation is how these tools keep ending up in the wrong hands. Cellebrite says they have strict export controls and ethics policies, but clearly that's not stopping authoritarian governments from getting their hands on this tech. Once a government has these tools, there's basically no oversight on how they use them.
If you're involved in activism or journalism in countries with questionable human rights records, you need to assume your phone isn't secure once authorities get physical access to it. Use encrypted messaging apps, enable disappearing messages, and honestly? Consider using a burner phone for sensitive activities. Because right now, the tools to crack your digital life are out there, and they're being used against civil society.