Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Toyota Motor Manufacturing Canada to deploy Agility Robotics’ Digit humanoids

    February 19, 2026

    Exposing biases, moods, personalities, and summary ideas hidden in massive language fashions | MIT Information

    February 19, 2026

    Pricing Construction and Fundamental Capabilities

    February 19, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Citizen Lab Finds Cellebrite Software Used on Kenyan Activist’s Cellphone in Police Custody
    AI Ethics & Regulation

    Citizen Lab Finds Cellebrite Software Used on Kenyan Activist’s Cellphone in Police Custody

    Declan MurphyBy Declan MurphyFebruary 19, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Citizen Lab Finds Cellebrite Software Used on Kenyan Activist’s Cellphone in Police Custody
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananFeb 18, 2026Cell Safety / Adware

    New analysis from the Citizen Lab has discovered indicators that Kenyan authorities used a industrial forensic extraction device manufactured by Israeli firm Cellebrite to interrupt right into a outstanding dissident’s telephone, making it the most recent case of abuse of the know-how concentrating on civil society.

    The interdisciplinary analysis unit on the College of Toronto’s Munk Faculty of International Affairs & Public Coverage stated it discovered the indications on a private telephone belonging to Boniface Mwangi, a Kenyan pro-democracy activist who has introduced plans to run for president in 2027.

    Particularly, it has emerged that Cellebrite’s forensic extraction instruments have been used on his Samsung telephone whereas it was in police custody following his arrest in July 2025.

    The telephone was returned to him almost two months later, in September, at which level Mwangi discovered that the telephone was now not password-protected and may very well be unlocked with out requiring a password. It has been assessed with excessive confidence that Cellebrite’s know-how was used on the telephone on or round July 20 and July 21, 2025.

    “Using Cellebrite might have enabled the complete extraction of all supplies from Mwangi’s system, together with messages, personal supplies, private recordsdata, monetary data, passwords, and different delicate data,” the Citizen Lab stated.

    The most recent findings observe a separate report launched final month, through which the researchers stated officers in Jordan seemingly used Cellebrite to extract data from the cellphones of activists and human rights defenders who had been vital of Israel and spoke out in help of Palestinians in Gaza.

    The units have been seized by Jordanian authorities throughout detentions, arrests, and interrogations, and subsequently returned to them. The documented incidents happened between late 2023 and mid-2025, the Citizen Lab stated.

    In response to the findings, a spokesperson for Cellebrite instructed The Guardian that the corporate’s know-how is used to “entry personal knowledge solely in accordance with authorized due course of or with acceptable consent to assist investigations legally after an occasion has occurred.”

    The 2 circumstances add to a rising physique of proof documenting the misuse of Cellebrite know-how by authorities purchasers. It additionally displays a broader ecosystem of surveillance abuses by varied governments world wide to allow highly-targeted surveillance utilizing mercenary adware like Pegasus and Predator.

    Predator Adware Targets Angolan Journalist

    The event additionally coincides with one other report from Amnesty Worldwide, which found proof that the iPhone belonging to Teixeira Cândido, an Angolan journalist and press freedom advocate, was efficiently focused by Intellexa’s Predator adware in Could 2024 after he opened an an infection hyperlink acquired by way of WhatsApp.

    The iPhone was working iOS 16.2, an outdated model of the working system with recognized safety points. It is at the moment not recognized what exploit was used to set off the an infection. In a number of reviews revealed final 12 months, Recorded Future revealed that it has noticed suspected Predator operations in Angola courting again to 2024.

    “That is the primary forensically confirmed case of the Predator adware getting used to focus on civil society in Angola,” the worldwide human rights group stated. “As soon as the adware was put in, the attacker might achieve unrestricted entry to Teixeira Cândido’s iPhone.”

    “The Predator adware an infection seems to have lasted lower than in the future, with the an infection being eliminated when Teixeira Cândido’s telephone was restarted within the night of 4 Could 2024. From that point till 16 June 2024, the attackers made 11 new makes an attempt to re-infect the system by sending him new malicious Predator an infection hyperlinks. All of those subsequent assault makes an attempt seem to have failed, seemingly because of the hyperlinks merely not being opened.”

    Based on an evaluation revealed by French offensive safety firm Reverse Society, Predator is a industrial adware product “constructed for dependable, long-term deployment” and permits operators to selectively allow or disable modules based mostly on course exercise, granting them real-time management over surveillance efforts.

    Predator has additionally been discovered to include varied undocumented anti-analysis mechanisms, together with a crash reporter monitoring system for anti-forensics and SpringBoard hooking to suppress recording indicators from victims when the microphone or digicam is activated, illustrating the sophistication of the adware. On high of that, it has express checks to keep away from working in U.S. and Israeli locales.

    “These findings show that Predator’s operators have granular visibility into failed deployments, […] enabling them to adapt their approaches for particular targets,” Jamf Risk Labs researchers Shen Yuan and Nir Avraham stated. “This error code system transforms failed deployments from black packing containers into diagnostic occasions.” 

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity

    February 19, 2026

    Infostealer Discovered Stealing OpenClaw AI Id and Reminiscence Information

    February 19, 2026

    Dalhousie’s Case Diversification: Sexual Orientation and Gender Identification (Half 2)

    February 19, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Toyota Motor Manufacturing Canada to deploy Agility Robotics’ Digit humanoids

    By Arjun PatelFebruary 19, 2026

    Digit moved bins at a GXO Logistics facility in a RaaS mannequin. Supply: Agility Robotics…

    Exposing biases, moods, personalities, and summary ideas hidden in massive language fashions | MIT Information

    February 19, 2026

    Pricing Construction and Fundamental Capabilities

    February 19, 2026

    The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity

    February 19, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.