Despite Everyone Knowing Cellebrite Devices Can Be Used To Break Into Locked Phones, Cellebrite Tells Cops Not To Tell Anyone Its Tech Can Used To Break Into Locked Phones

from the foregone-conclusion-yo dept

Cops and cop tech providers like to pretend the things they use and the things they do are so black ops the public should not be allowed to discuss them with anyone, much less the defendants, judges, and juries being asked to weigh evidence and render verdicts in criminal trials.

A lot of supposedly secret tech has been an open secret for years, ranging from law enforcement’s belated admissions of Stingray use to the ongoing existence of multiple tech tools capable of compromising phones completely and/or bypassing passcodes to give cops access to data arrested suspects are unwilling to part with voluntarily.

Adding to the annals of ridiculous law enforcement secrecy is this report from Lorenzo Franceschi-Biccierai for TechCrunch:

As part of the deal with government agencies, Cellebrite asks users to keep its tech — and the fact that they used it — secret, TechCrunch has learned. This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.

In a leaked training video for law enforcement customers that was obtained by TechCrunch, a senior Cellebrite employee tells customers that “ultimately, you’ve extracted the data, it’s the data that solves the crime, how you got in, let’s try to keep that as hush hush as possible.”

“We don’t really want any techniques to leak in court through disclosure practices, or you know, ultimately in testimony, when you are sitting in the stand, producing all this evidence and discussing how you got into the phone,” the employee, who we are not naming, says in the video.

To start with, anything used to collect evidence used in open court should be, by default, open. This is nothing more than a company pitching tech tools to cops with the (well, I would say “unspoken” but it appears to have been said out loud) agreement cops won’t talk too much about the tech even when sworn to honesty.

It’s not exactly a non-disclosure agreement — something that should automatically be considered null and void if it interferes with the presumption of public access that underlies criminal proceedings. But it’s also not anything that would deter investigators from engaging in parallel construction to obscure the source of the presented evidence.

No, if it’s anything, it’s a conspiracy. Cellebrite — despite being well-known as a supplier of phone hacking tools — wants to pretend the public doesn’t know what its tech is capable of. Cellebrite’s addition to the public domain started all the way back in 2016 when the DOJ was trying to secure precedent for compelled decryption in the San Bernardino shooting case. That it still thinks cops are essential to its ongoing secrecy suggests its execs and sales teams can’t be bothered to read the news.

If law enforcement complies with this unenforceable request from Cellebrite, it is now part of a conspiracy that could actually be considered criminal. Lying to courts is a crime. Lying to defendants about the source of evidence is a constitutional violation. Now, I know it’s hard for cops to wrap their minds around this concept since most lawsuits involving violated rights are civil (in the legal sense of the word), but violating constitutional rights is also a criminal act. That it’s most often resolved through civil lawsuits doesn’t change that underlying fact.

While I understand cops don’t want to tip their (tech) hands too early when exploiting new devices/methods, at some point there’s enough on the public record that makes these assertions about protecting means and methods ridiculous, if not actually disingenuous. While the TechCrunch article doesn’t pinpoint a date on the sales pitch, if it occurred any time in the last half-decade, it’s a tech company asking cops to contribute to futile opacity effort.

And even without a time stamp, Cellebrite continues to insist what it says in sale pitches does nothing to harm anyone and is, in fact, it being perhaps the most honorable purveyor of phone hacking tools that ever existed.

Cellebrite spokesperson Victor Cooper said in an email to TechCrunch that the company “is committed to support ethical law enforcement. Our tools are designed for lawful use, with the utmost respect for the chain of custody and judicial process.”

“We do not advise our customers to act in contravention with any law, legal requirements or other forensics standards,” the spokesperson said.

Even if we choose to believe most cops could say the phrase “ethical law enforcement” without laughing out loud, the quoted video says exactly the opposite: Cellebrite does, in undeniable fact, “advise customers to act in contravention with any law, legal requirement or other forensics standards.” Lying about the source of submitted evidence contravenes laws and legal requirements. Hiding it behind parallel construction contravenes laws and legal requirements.

And it appears Cellebrite is going to continue to engage in this bullshit for the foreseeable future:

When asked whether Cellebrite would change the content of its training, the spokesperson did not respond.

It won’t change this. It won’t because this messaging appeals to cops and their “fuck you” attitude towards criminal defendants and the general public. And because that messaging appeals to cops, there’s no reason to change it, since that’s Cellebrite’s core market. Both parties know where the power really lies in criminal court. And it sure isn’t with the people being cut out of the loop by this public-private collusion that pretends information already in the public domain can’t be shared with those facing the loss of rights and freedoms.

Filed Under: , , , ,
Companies: cellebrite

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Despite Everyone Knowing Cellebrite Devices Can Be Used To Break Into Locked Phones, Cellebrite Tells Cops Not To Tell Anyone Its Tech Can Used To Break Into Locked Phones”

Subscribe: RSS Leave a comment
12 Comments

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Another cop hating article? Cops put their lives on the line every day for our freedom. You have no idea how hard it is to be a cop. Dealing with the worst of the worst, putting bad guys behind bars, stopping dangerous hippies from inhaling unapproved plant vapours and shooting yapping Yorkies before they can gash a capillary. All the time cops deal with thugs not consenting to searches, terrorists filming them from a safe distance and wives mouthing off. If you had any idea how hard it was you’d stop whining like a freedom-hating liberal. Sheesh.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Re:

So cops should be above the law? Why do you think those in power should be less constrained by the law then the citizens?

Why do you hate America and the constitution so much you want to ignore the law and instead copy how dictatorships act?

What you are defending here is the practice of cops hiding and lying about how they jail someone so that the person cannot defend themselves.

If police officers cannot do their job in the full view of the public then those officers are just criminals.

That One Guy (profile) says:

In a leaked training video for law enforcement customers that was obtained by TechCrunch, a senior Cellebrite employee tells customers that “ultimately, you’ve extracted the data, it’s the data that solves the crime, how you got in, let’s try to keep that as hush hush as possible.

We don’t really want any techniques to leak in court through disclosure practices, or you know, ultimately in testimony, when you are sitting in the stand, producing all this evidence and discussing how you got into the phone,” the employee, who we are not naming, says in the video.

We do not advise our customers to act in contravention with any law, legal requirements or other forensics standards,” the spokesperson said.

Apparently lying and/or obfuscation in court and under oath as to where and how you got a piece of data isn’t ‘in contravention with any law, legal requirements or other forensics standards’, who knew?

They either have quite the view of what is and is not covered by the law or that is one hell of an example of gaslighting and pretending that people didn’t just watch the training video where they strongly suggest that very act.

The solution seems to be pretty easy if the judges involved had spines: If the prosecution refuses to admit how they got a piece of evidence and shares that in full with the defense then they don’t get to use that evidence or anything based upon it.

IamNotSure (profile) says:

Re: Forensics, Experts, and Court

“If the prosecution refuses to admit how they got a piece of evidence and shares that in full with the defense then they don’t get to use that evidence or anything based upon it.”

That actually already is law, but the catch is what I bolded.

It’s common practice for prosecution to introduce, or attempt to introduce, forensic evidence in the form of technical reports derived from unstated methods or unidentified experts. As a general rule, prosecutors don’t want technical people subject to cross examination because their nature is to be precise including error possibilities and techniques. This is almost always bad when trying to spin a binary Good/Bad tale for the jury.

It’s incumbent upon the defense to challenge both the lack of information and the inability to cross examine claims. The problem is that most often the defense does not have the technical expertise to know when to challenge nor the money to hire its own experts. This is exacerbated by the fact that a great many forensic experts gained their skills working for law enforcement and there is a very real unwritten pressure to never work for the defense. Consequently the small number of forensic experts willing to work for defense are even more rare and more expensive.

billyfromcali (profile) says:

The part that sucks is cops and prosecutors are allowed to file motions that “disclosure of the techniques used will expose methods and practices” and therefore should not be able to be disclosed. You’d be shocked at how often courts grant this motion to them and especially in federal courts, where the US Attorney does not even have to turn over their discovery until just like 10 days before trial. They can withhold evidence and that prevents the defense from being able to find arguments against it. It’s not an even playing field. I will tell you that.

That One Guy (profile) says:

Re: 'Trust us, it's not your freedom or life on the line Your Honor' the legal argument

Which essentially translates to ‘we’re super sure that they’re guilty, no you can’t look at our homework for how we know they’re guilty, you just have to trust us on that because if we told you other super guilty people might find out how we did it and not break the law in a way we could catch them!’, making it all the more embarrassing that judges buy such a terrible argument.

Anonymous Coward says:

Am I missing something or does this have no evidence to back up the article’s claim? The quote from the Cellebrite employee says nothing that the article infers. It is basically stating not to discuss the IP of the company which many companies do. The original writer of this article should talk to a lawyer about this and motion to limine. Seem like a hit piece of someone who doesn’t know forensic. Cellebrite has had presentations and demonstrations of them unlocking locked phones in the public at forensic conferences so hence why I think its just a hit piece.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...