The Israel-based firm Cellebrite, which specializes in software that breaches cellphones, enjoys a reputation as a silver bullet in 21st-century policing whose products are used only to beat terrorists and find abducted kids. Like any good, vaguely sinister corporate spy outfitter, the company has never publicly confirmed which governments are among its customers, and deflects questions about whether it would sell its infamously powerful software to a repressive, rights-violating regime. Political activist Mohammed al-Singace (commonly referred to as Abdali) was arrested at his home on the morning of May 15, 2013, in the tiny island petro-monarchy of Bahrain. For years, Singace — brother of the well-known dissident Dr. Abduljalil al-Singace, currently serving a life sentence for his role in Bahrain’s February 2011 protests — had worked to bring attention to the Bahraini government’s mishandling of poverty and inflation and to advocate for the poor. The Bahraini government is among the worst human rights offenders in the world, routinely disappearing and torturing dissidents and citizen organizers for purely ideological reasons. According to Amnesty International, over the past year, hundreds have been convicted in unfair trials, and “many defendants in terrorism cases were convicted largely on the basis of ‘confessions’ that they said interrogators had forced them to make under torture; some received death sentences.” In particular, “torture and other ill-treatment of detainees, mainly suspects in security or terrorism-related cases, remained rife … within the Criminal Investigations Directorate (CID).” Shortly after his arrest, Singace was transferred to “Building 10″ of Bahrain’s infamous Jau Prison, a facility known for its particularly brutal treatment of prisoners. According to the Bahrain Center for Human Rights, Singace says his beatings began while he was still in bed: [Singace] stated that he was tortured from the moment of his arrest from his bed as policemen beat him with an unknown machine causing him to bleed and fall unconscious. While being unconscious, they beat and kicked him mostly on the back, hands and head. The signs are still visible on Alsingace as he entered the court with hands that looked abnormal, in addition to a wound on his head, and neck pain which he still suffers from. According to the Bahrain Institute for Rights and Democracy, Singace’s beard was also shaved against his will.

Photo: Facebook

Beatings and humiliation are timeless torture techniques, but for draconian police forces desperate to construe personal association as criminal conspiracy, the ability to exploit the contents of someone’s cellphone is still novel. Getting into someone’s phone without their cooperation is more technically sophisticated than simply hanging them upside down or battering them, given how typical it is to lock your device with a password or even a fingerprint — and this is where Cellebrite comes in. Aimed at “law enforcement, military, intelligence and e-discovery personnel,” the company’s marketing materials promise “unprecedented access” to “the widest variety of mobile devices and operating systems” through the use of its trademarked Universal Forensic Extraction Device, which siphons virtually every scrap of data from a phone and makes it searchable and browsable on a third-party computer. Conveniently, the extraction process completely deactivates or bypasses any password you might have put in place to prevent just this kind of intrusion. When Cellebrite was founded in 1999, this access would have been limited to call logs and contacts. But in the smartphone era, when Cellebrite started marketing forensics gear to military and police customers (Motto: “ACCESS. UNIFY. DEFEND.”), billions of people around the world began carrying a full computer’s worth of information on their person: personal emails, bank records, photos, videos, and IMs. In other words, exactly the trove of personal errata, lists of association, and circumstantial evidence that any police force would covet — particularly that of a repressive regime with an acute allergy to due process. It’s little surprise that our increasingly martial American police have leapt at the chance to use Cellebrite equipment; a CNN investigation reported that “for years, it has been the go-to resource for FBI agents breaking into suspects’ phones, according to security researchers familiar with the FBI’s operations.” This new ability to spirit away someone’s cellphone and copy its contents has already attracted the attention of the ACLU, which worries that Cellebrite tech could help police skirt the Fourth Amendment. The company is a truly 21st-century corporation: Founded in Israel, Cellebrite is now owned by a Japanese software conglomerate, operating sales offices in New Jersey for customers in Michigan. But the cracking gear isn’t just popular among U.S. police: A 2014 CNN Marketplace Middle East segment on the company counted 140 different police clients worldwide. As is typical, this report cited “the advancement of ISIS … deep into Iraq and Syria” as the explanation for Cellebrite’s sales to Gulf and North African states, a rationale Cellebrite repeats in all of its marketing materials. Left unmentioned was the possibility that Cellebrite might sell its wares to countries that would buy this power only to abuse it. An impressed, wide-eyed corporate profile by the BBC included one interesting moment, when tech correspondent Rory Cellan-Jones asked Cellebrite VP Yuval Ben-Moshe if there were any ethical limits to its sales: Cellan-Jones: And who will you sell this equipment to? Is it any law enforcement in any country? Ben-Moshe: We typically sell to any … I wouldn’t say any but … government-owned or government-operated law enforcement agencies around the world. Cellan-Jones: What about repressive regimes that are intent on spying on their citizens in ways that many people would find offensive? Would you sell to them? Ben-Moshe: I don’t know. … I don’t know the answer to that and I’m no position to comment on that in this point in time. Cellan-Jones: So you won’t say whether Cellebrite will sell to, say, Saudi Arabia, for example, or Iran, or various regimes around the world which might be oppressive? Ben-Moshe: We operate under law. Under international and the laws of every jurisdiction and country we work at and this is what guides us. Not exactly a moral stance. Perhaps Ben-Moshe evaded the question because the company does exactly what Cellan-Jones was asking. Based on a recently uncovered document presented as evidence in Singace’s prosecution, we can conclude that Bahrain is among the governments that use Cellebrite technology, because it used the technology against Abdali al-Singace. Singace’s phone was taken from him as he was arrested and placed in police custody, where it was cracked and its contents extracted using Cellebrite’s UFED technology. A report on the contents of Singace’s phone, prepared by Bahrain’s General Directorate of Anti-Corruption and Economic and Electronic Security and generated by Cellebrite’s software, was entered as evidence against him during his trial. It contains nearly 20 pages of Singace’s private WhatsApp conversations. Other court documents show that photos were taken from Singace’s phone as well, including several images that were specifically cited during his sentencing as evidence of criminal association. A page from the prosecution’s report can be seen below on the left — on the right is a sample Cellebrite report page from the United States National Institute of Standards and Technology:

Document: Kingdom of Bahrain, U.S. NIST

Yaniv Schiff, an Illinois-based mobile forensics expert, told The Intercept he is “very confident” the extraction report was indeed created using Cellebrite. After viewing the documents, Cindy Murphy, a certified forensics instructor at the SANS Institute who worked as a digital forensics examiner with the Madison Police Department for 17 years, told The Intercept, “ This is an easy one. It’s [from] Cellebrite Physical Analyzer or Logical Analyzer.”

Document: Kingdom of Bahrain, U.S. NIST

Cellebrite would be in good company, too: Bahrain relies on a variety of technology firms to keep tabs on its people, including Nokia-Siemens FinFisher , and Netsweeper Notably, just two weeks before Singace’s arrest, another Bahraini dissident, Naji Fateel, a human rights activist and blogger, was arrested suddenly at his home and subjected to equally brutal treatment. Fateel was prosecuted in the same case as Singace and 48 other defendants. And just like they would do with Singace’s phone, Bahraini authorities extracted and analyzed the contents of Fateel’s phone, according to court documents. Although it is clear from Singace’s case that authorities had access to Cellebrite’s technology and were willing to use it against political dissidents, there is no direct evidence that it was used to crack Fateel’s phone. According to a source with direct knowledge of Fateel’s prosecution (who asked not to be named for fear of reprisal), the data vacuumed off of his Samsung phone wasn’t just used against him in court, but used as a basis for suspicion, evidence of criminality, and pretext for torture: “Naji’s and the others’ phone contact was mentioned to them as evidence against them during their interrogation in CID … the torture happened in CID.” This source also said that in the prosecution of a co-defendant of Fateel’s, the sole evidence presented against him was his presence in a private WhatsApp group chat used to discuss Bahraini news. Fateel is currently serving a 15-year sentence after a trial that, according to human rights watchdog Front Line Defenders, “fell short of fair due process guarantees.” No observer was permitted to witness the appeals trial, which upheld the conviction on the charge of forming “a group for the purpose of disabling the constitution.” Bahrain’s relationship with Cellebrite or its parent company is still unclear because neither side will say anything. It’s possible, too, that the Bahraini government purchased Cellebrite equipment through a third party reseller, rather than directly from the company. Seeking some clarity here, The Intercept contacted Cellebrite co-CEO Yossi Carmil, who referred me to Jeremy Nazarian, the company’s CMO. Nazarian told The Intercept that the use of Cellebrite technology to torture a Bahraini human rights activist “doesn’t ring a bell,” and “as a general policy we don’t discuss anything having to do with field operations.” Nazarian said he would “do some digging” on the matter, but the next day The Intercept received an email from Mike Reilly of Banner Public Affairs, a Washington, D.C.-based firm that represents Cellebrite, saying that the company declined to comment any further. Multiple requests for comment sent to both the Bahraini Embassy in Washington and Bahrain’s United Nations consulate in New York went unanswered. But we do know that Bahrain is on the record as using Cellebrite tech, per a 2014 newspaper article by an adviser to the kingdom’s Interior Ministry: The administration uses the most recent technologies and machines in its work specially in the process of evidence examination. Work on developing these technologies and machines regularly with what is appropriate with the international technological advances — Encase, FTK, Cellebrite, [and] XRY. Sharah Tal, Cellebrite’s director of research, told The Intercept in October that the company has “a strong ethics backbone, a clear-use case for our capabilities, and dramatically less potential for abuse should ‘evil customers’ attempt to deceive us.” According to Cellebrite’s own user manuals, its software can only be used if remotely activated, either with a USB dongle provided by the company or through an internet connection to the company — either of these routes would provide Cellebrite a means of blocking known repressive regimes from using its technology. If the Bahraini General Directorate of Anti-Corruption and Economic and Electronic Security and the Criminal Investigations Directorate wanted to see Abdali al-Singace imprisoned and horrifically tortured, they could have done so without the use of Cellebrite or any other modern forensic technology, as has been fashionable for millennia. Keeping Cellebrite UFED kits out of the hands of tyrannical monarchies and repressive police forces won’t put an end to that which makes them tyrannical and repressive.

Photo: Yaniv Schiff