Why Did Cellebrite Change Its Tune on Human Rights?
Phone hacking tool maker Cellebrite has shifted its response to abuse allegations. After cutting off Serbia, why is it dismissing similar claims from Kenya and Jordan?
Same Company, Different Standards
Last year, Israeli phone hacking tool maker Cellebrite made headlines for all the right reasons. The company suspended Serbian police as customers after human rights researchers documented how local authorities used its tools to hack journalists' and activists' phones, planting spyware. It was a rare example of corporate accountability in the surveillance tech industry—Cellebrite citing Amnesty International's technical report as grounds for action.
But something has changed. When similar allegations emerged from Jordan and Kenya, Cellebrite's response couldn't have been more different: dismissal, deflection, and no commitment to investigate. The question isn't just what happened—it's why the company abandoned its own precedent.
The Digital Breadcrumbs
On Tuesday, researchers at The University of Toronto's Citizen Lab published damning evidence. They alleged Kenyan authorities used Cellebrite's tools to unlock activist Boniface Mwangi's phone while he was in police custody. In January, they made similar accusations against Jordan, claiming the government broke into multiple activists' and protesters' devices.
The evidence? Digital traces of a specific application linked to Cellebrite found on victims' phones. The same application had appeared on VirusTotal, a malware repository, signed with Cellebrite's own digital certificates. For cybersecurity researchers, these traces represent "high confidence" indicators—about as close to a smoking gun as digital forensics gets.
Victor Cooper, Cellebrite's spokesperson, dismissed the findings: "We do not respond to speculation." When pressed about the company's different approach compared to Serbia, he claimed "the two situations are incomparable" and that "high confidence is not direct evidence."
The 7,000 Customer Dilemma
Cellebrite's customer base spans more than 7,000 law enforcement agencies worldwide—a lucrative empire built on the promise of helping police crack encrypted phones. The company has previously demonstrated willingness to cut ties when abuse allegations surface, severing relationships with Bangladesh, Myanmar, Russia, and Belarus in 2021. It also stopped selling to Hong Kong and China following U.S. export restrictions.
But recent responses suggest a shift in corporate philosophy. For Jordan, Cellebrite offered generic assurances about disabling tools if violations are "substantiated" but refused to investigate. For Kenya, the company went silent entirely.
John Scott-Railton from Citizen Lab isn't buying the company's new stance: "If Cellebrite is serious about their rigorous vetting, they should have no problem making it public." He's demanding the company release specific criteria used to approve Kenyan sales and disclose how many licenses have been revoked.
The Accountability Gap
What's driving Cellebrite's apparent policy reversal? Market pressures? Legal considerations? Or simply the realization that cutting off customers hurts the bottom line? The company's $2.4 billion valuation suggests surveillance tech remains highly profitable, potentially creating incentives to look the other way when abuse allegations surface.
The timing is particularly troubling. As authoritarian governments worldwide increasingly target activists and journalists, surveillance companies face growing pressure to implement meaningful human rights safeguards. Cellebrite's inconsistent responses suggest these safeguards may be more marketing than substance.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
FBI reports surge in ATM jackpotting attacks in 2025, with criminals using physical access and Ploutus malware to steal millions. Analysis of evolving cybercrime tactics
Texas lawsuit against TP-Link reveals deeper tensions in global networking equipment market. Analyzing corporate nationality, security concerns, and consumer impact.
A hacker exploited a vulnerability in popular AI coding tool Cline to install OpenClaw on thousands of developers' computers without consent, revealing new security risks in autonomous software.
A major US school admissions platform leaked children's names, photos, addresses to any logged-in user. What this security lapse reveals about protecting student privacy in the digital age.
Thoughts
Share your thoughts on this article
Sign in to join the conversation