Stay safe

What is Cellebrite and why to protect from it?

Cellebrite is an Israeli digital intelligence company that offers tools for collecting, reviewing, analyzing and managing digital data for investigations. Their products are used by both law enforcement and private organizations.

Cellebrite’s most well-known product is the UFED (Universal Forensics Extraction Device). UFED is a hardware tool used to extract data from mobile devices like phones and tablets. This can include things like text messages, call history, photos, videos, and even deleted data.

Law enforcement agencies use Cellebrite UFED to gather evidence in criminal investigations. For instance, they might use it to extract messages from a suspect’s phone to see if they were involved in a crime.

Here are some key things to know about Cellebrite:

  • Lawful Access Required: Law enforcement typically needs a warrant to use Cellebrite UFED on a suspect’s device.
  • Not Foolproof: Encryption and strong passwords can make it difficult, but not impossible, for Cellebrite to extract data.
  • Privacy Concerns: The use of Cellebrite UFED has raised concerns about privacy, as it allows for extensive extraction of personal data from devices.

Why should I protect my phone from Cellebrite?

You might want to protect your phone from Cellebrite for a few reasons, depending on your situation:

  • Privacy: Cellebrite can extract a vast amount of data from your phone, including messages, call history, browsing data, photos, videos, and even deleted information. If you have sensitive information on your phone, you might want to take steps to make it harder to access.

  • Legal Issues: If you are ever involved in a legal situation, law enforcement might use Cellebrite to try and gather evidence from your phone. Having strong security measures in place can make it more difficult for them to find incriminating information (assuming you have none).

  • Corporate Security: If you use your phone for work and it contains sensitive business data, you might be required by your company to take steps to protect it from unauthorized access, including Cellebrite.

  • Peace of Mind: Even if you don’t think you have anything to hide, increased security measures can give you peace of mind knowing your data is protected in case your phone is lost, stolen, or confiscated.

It’s important to note that Cellebrite is a powerful tool, and there’s no guarantee these methods will completely block them, especially for well-funded organizations. However, making data extraction harder can deter casual attempts and buy you time in case you need to take further action.

Ultimately, the decision of how much to protect your phone depends on your individual needs and risk tolerance.

How to protect your phone from Cellebrite:

Achieving complete protection against Cellebrite is difficult. Cellebrite UFED is a powerful tool and law enforcement agencies with resources can potentially bypass security measures. However, there are steps you can take to make it significantly harder to crack your phone:

  • Strong Encryption: Enable full-disk encryption on your phone. This encrypts all data on the device, making it inaccessible without the decryption key (your PIN, password or fingerprint).

  • Strong PIN/Password: Use a long and complex alphanumeric passcode (mixing letters, numbers and symbols). Avoid simple patterns or easily guessable codes.

  • Keep Software Updated: Running the latest software updates ensures you have the latest security patches that may address vulnerabilities used by Cellebrite.

  • USB Restricted Mode: Enable USB restricted mode on your phone if available. This mode limits what a connected device can do, making physical extraction more difficult.

  • Power Down: If you believe your phone may be confiscated, power it down. Data encryption is typically stronger when the phone is off and requires the PIN/password for decryption.

  • Advanced Measures: Some users explore methods like wiping the phone remotely or using self-destructing messaging apps. These are more drastic actions and come with their own risks, so research them thoroughly before implementing.

Important to Consider:

  • These methods make data recovery harder but may not be foolproof, especially for determined agencies with advanced resources.
  • Some features may not be available on all phones. Check your phone’s security settings for specifics.
  • There’s a balance between security and usability. Stronger passwords may take longer to enter and disabling features like USB data transfer might cause inconvenience.

Remember, the best course of action depends on your specific threat model and risk tolerance.

For your iPhone/iPad especially

Here’s a breakdown of the best practices to protect your iPhone/iPad from Cellebrite, considering the balance between security and usability:

Essential Steps:

  • Strong Encryption: This is the foundation. Enable full-disk encryption by going to Settings -> Face ID & Passcode (or Touch ID & Passcode) -> Turn on Passcode. Choose a long and complex alphanumeric passcode (mixing letters, numbers, and symbols). Avoid birthdays, simple patterns, or easily guessable codes.

  • Software Updates: Always keep your iPhone/iPad updated to the latest iOS version. Updates often include security patches that address vulnerabilities Cellebrite might exploit. Go to Settings -> General -> Software Update to check for updates.

  • USB Restricted Mode: This limits what a connected computer can do with your device. Navigate to Settings -> Face ID & Passcode (or Touch ID & Passcode) -> Scroll down and enable USB Restricted Mode. Without your passcode within an hour of connecting, data transfer is disabled.

  • Power Down: If you believe your device is at risk of confiscation, power it down. Encryption is typically stronger when the device is off and requires the passcode for decryption.

Advanced Options (Consider the trade-offs):

  • Lockdown Mode: This is an extreme security measure that disables many features like data transfer over USB and syncing with iCloud. Go to Settings -> Privacy -> Lockdown Mode and turn it on. This mode is best for high-risk situations but can be inconvenient for daily use.

  • Self-Destructing Messaging Apps: Some messaging apps offer disappearing messages that automatically delete after a set time. These can be useful for specific conversations but may not be ideal for all communication. Research reputable options that align with your needs.

  • Remote Wipe: If all else fails and you have Find My turned on, you can remotely wipe your device from another device https://www.apple.com/iphone/. This is a drastic step resulting in complete data loss.

Android phones, i.e. Google Pixel 6

Protecting a Google Pixel 6 from Cellebrite involves similar strategies to iPhones, but with some Android-specific considerations:

Essential Steps:

  • Enable Encryption: Go to Settings -> Security -> Encryption & decryption and enable “Encrypt phone.” Use a strong PIN, password, or fingerprint for unlocking.

  • Stay Updated: Ensure your Pixel 6 runs the latest Android version. Updates often contain security patches that address vulnerabilities exploited by Cellebrite. Go to Settings -> System -> System update to check.

  • Limit USB Access: Enable USB Restricted Mode if available on your Pixel 6. This mode restricts data transfer over USB when your phone is locked. The specific location of this setting may vary depending on your Android version.

  • Power Down for Security: If you fear confiscation, power down your Pixel 6. Encryption is usually stronger when the phone’s off, requiring the PIN/password for decryption.

Advanced Options (Weigh the trade-offs):

  • Find My Device Remote Wipe: Similar to iPhones, if Find My Device is enabled, you can remotely wipe your Pixel 6 from another device https://www.google.com/android/find. This is a last resort as it erases all data.

  • Third-Party Secure Messaging Apps: Explore secure messaging apps with disappearing messages. These can be useful for specific conversations but may not be suitable for all communication needs. Research well before using one.

Things to Consider:

  • Android Fragmentation: Unlike Apple’s controlled ecosystem, Android experiences fragmentation across different manufacturers and models. Security updates may not roll out as consistently or quickly as on iPhones.

  • Limited Features: Some advanced security options might be limited depending on your specific Pixel 6 model and software version.

  • Balance Usability and Security: Stronger passwords take time to enter, and features like USB data transfer might be inconvenient when disabled.

Remember: No method is foolproof, especially for well-funded organizations with advanced resources. These steps make data extraction significantly harder and can deter casual attempts.

By implementing these practices, you can increase the difficulty of unauthorized data extraction from your Pixel 6 using Cellebrite.