Cellebrite

The acquisition allowed Cellebrite to expand its digital intelligence solution offerings to include data collection tools from computers.

[12] In April 2021, Cellebrite announced plans to go public via a merger with TWC Tech Holdings II Corporation, a blank-check firm.

[13][14] In July 2021, a group of civil society organizations signed a letter arguing that the company should not be allowed to go public prior to demonstrating compliance with human rights.

[18] In July 2024, Cellebrite announced that it was acquiring Cyber Technology Services,[19] a US-based cybersecurity company licensed to work on federal projects with maximum security clearance.

[20] Cellebrite's products are classified as "dual-use civilian services," and not security-related, a distinction which it is argued allows them to operate without serious oversight from the Israeli government.

[29][30] The announcement by Marlinspike raised questions about the integrity of data extracted by the software,[31][32] and prompted Cellebrite to patch some of the vulnerabilities found by Signal and to remove full support for analyzing iPhones.

[24] Cellebrite's UFED program was used to persecute the democratic opposition in Belarus and Russia; Vladimir Putin used the technology against his political opponents for many years.

[35] In March 2021, after finding out that technology was used in the Lyubov Sobol affair, a Jerusalem activist filed a lawsuit against the company in the Israeli Supreme Court.

[36] In May 2021, the Committee to Project Journalists reported that police in Botswana used a UFED device sold by Cellebrite to extract data from the phone of journalist Oratile Dikologang, the digital editor and co-founder of the Botswana People’s Daily News website, after a senior office ordered that his device be searched for information about "offensive" Facebook posts.

Rio de Janeiro police used Cellebrite devices to extract deleted WhatsApp messages between Jairinho, Medeiros, and Henry's nanny, which the department described as "essential technical evidence" for the case.

[41] As of October 7, 2020, the company announced that it would stop selling its solutions and services to customers in Hong Kong and China as a result of a change in U.S.

[43] In 2021, the New York Times reported that Myanmar's state budget included MacQuisition, a forensic software product made by Cellebrite subsidiary BlackBag Technologies that is used to extract data from Apple computers.

The staff at Cellebrite demanded the Saudis to send a government representative to meet one of their employees at the King Khalid International Airport in Riyadh.

Following the demand, a representative of Cellebrite traveled to Riyadh in November 2019 for a hacking attempt on a phone in the possession of a Saudi Justice Ministry employee.

[49] Following its refusal to grant the ACLU of Michigan's 2008 Freedom of Information Act request unless the organization paid $544,000 to retrieve the reports, MSP issued a statement claiming that it honored the Fourth Amendment in searching mobile devices.

[55][56] In July 2024, the FBI gained access to the phone of Thomas Matthew Crooks, the man that tried to assassinate the former President Donald Trump, using unreleased technology from Cellebrite.