Leaked Docs Show Cellebrite Is Still Trailing Apple In The Device Security Arms Race
Good news for phone owners. Perhaps a little less great for law enforcement, which presumably still doesn't have the capability to crack the latest cell phones.
Not that it's all bad news for law enforcement. Whether or not compelled password production is a constitutional violation is still an open question. Those whose phones are secured with biometrics are definitely less protected by the Constitution than those using passcodes. And, despite all the crying you might hear from officials (like, say, consecutive FBI directors), law enforcement still has plenty of options to obtain evidence that don't involve cracking encrypted devices but rather serving warrants to service providers to obtain stuff stored in the cloud.
Cellebrite has been selling its phone-cracking tech for several years now. But it's stuck in a one step forward, one step back loop as device makers patch exploitable flaws, including those used by purveyors of these devices.
Joseph Cox of 404 Media managed to obtain some very recent documents that apparently show the limitations of Cellebrite's tech. The documents were leaked in April 2024, which doesn't necessarily mean they document Cellebrite's latest software version, but they do at least provide a fairly up-to-date snapshot of the tech's capabilities.
For all locked iPhones able to run 17.4 or newer, the Cellebrite document says In Research," meaning they cannot necessarily be unlocked with Cellebrite's tools. For previous iterations of iOS 17, stretching from 17.1 to 17.3.1, Cellebrite says it does support the iPhone XR and iPhone 11 series. Specifically, the document says Cellebrite recently added support to those models for its Supersonic BF [brute force] capability, whichclaims to gain access to phones quickly. But for the iPhone 12 and up running those operating systems, Cellebrite says support is Coming soon."
As Cox notes in his article, this means Cellebrite is capable of cracking iPhones released through the first part of 2020, but possibly only if they haven't been updated to the latest iOS version. That's still a significant number of phones, which means staying ahead of Cellebrite possibly means having to be an early adopter or, at the very least, ensuring the latest updates have been applied to your phone.
The same can't be said for Android, something pretty much everyone has already known. Not only are carriers hit-and-miss when it comes to regular Android updates, the wide variety of manufacturers and models means it's often difficult to tell which Android model is more secure (or, more accurately, less compromised). The rule of thumb, though, is that newer is better, at least in terms of crack-thwarting.
The second document shows that Cellebrite does not have blanket coverage of locked Android devices either, although it covers most of those listed. Cellebrite cannot, for example, brute force a Google Pixel 6, 7, or 8 that has been turned off to get the users' data, according to the document. The most recent version of Android at the time of the Cellebrite documents was Android 14,released October 2023. The Pixel 6 was released in 2021.
Cellebrite has confirmed the authenticity of the leaked documents but told 404 Media that it does not completely reflect its current line of products or their capabilities. So, these should be taken with at least as large a grain of salt as Cellebrite's statement. If these documents accurately portray Cellebrite's offerings, one would expect the company to claim they don't in order to keep criminals (or journalists, activists, politicians, dissidents, etc.) guessing about the current state of cracking tech.
Then there's the fact that Cellebrite is not the only player in this market, even if it appears to be the most well-known. Competitors are presumably engaged in the same race against patches and system updates in order to provide something worth paying for to government customers.
Finally, the Israel-based company appears to have been stung a bit by the steady deluge of negative press covering phone-hacking malware purveyors like NSO Group and Candiru, both of which have been blacklisted by the US government for selling their goods to known human rights violators.
Cellebrite does not sell to countries sanctioned by the U.S., EU, UK or Israeli governments or those on the Financial Action Task Force (FATF) blacklist. We only work with and pursue customers who we believe will act lawfully and not in a manner incompatible with privacy rights or human rights," the email added.
Well, great, I guess. That answers a question no one asked, but as long as you're in the news, I suppose it's smart to get out ahead of the criticism, even if it's still unspoken at this point.
While some in law enforcement might view this reporting as a half-empty glass where the tech they use will always be a step or two behind the efforts of device manufacturers, everyone else should see this as more than half-full. More companies and developers are putting more time and effort into ensuring the devices they sell are as secure as humanly possible. That's a net win for everyone, even if you halfway believe the often-hysterical proclamations of government officials who think device security is the enemy of public safety.
It may not necessarily discourage device theft, but it does limit the damage done by those who steal devices. And it helps protect journalists, dissidents, activists, and political opposition leaders from abusive tech deployments just as much as it protects" criminals from having their seized devices cracked. Non-criminals will always outnumber criminals. And that fact shouldn't be ignored by law enforcement officials just because it makes things a bit tougher when it comes to extracting data from seized devices.