Baltimore Brings Back Controversial Cellphone Hacking System
A year after a court told Maryland police that Cellebrite searches were too broad, Baltimore quietly resumed using the software.

Cellebrite is a dream come true for police surveillance. Plug in any cellphone, even a locked one, and get a full report of every file on its hard drive. Cellebrite, along with its main competitor, Grayshift, is one of the few companies offering this service. No wonder the Baltimore Police Department, like 6,900 other law enforcement agencies, bought a subscription.
Where police saw a dream, however, courts saw a constitutional nightmare. In September 2022, the 5th Appellate Judicial Circuit in Maryland ruled that police must stop using "general and overbroad warrants" to scrape the entire content of people's cellphones. After the ruling, Baltimore police announced that they would suspend their use of Cellebrite and work with lawyers "to ensure the current search warrant template is in line with all requirements."
Less than a year after the ruling, Baltimore cops re-upped their Cellebrite subscription, Reason has learned. In response to a Maryland Public Information Act sent through the website MuckRock, the Baltimore Police Department disclosed a $112,940 contract for Cellebrite services from March 2023 to March 2024, and another $6,100 contract from September 2023 to September 2024.
The Baltimore Police Department did not respond to a request for comment.
The contracts also shed light on how Cellebrite services work. The March 2023 contract includes a license for using the Cellebrite software for an unlimited number of scans over one year and a physical kit for conducting the scans. The September 2023 contract is an additional subscription to the "UFED 4 PC Ultimate" service, which allows police to run the cellphone extraction software on their office computer.
Cellebrite "probably provides the device and then has something on the device that— after the subscription expires—will lock the device, so that [police] need to renew the subscription," says William Budington, a senior staff technologist at the Electronic Frontier Foundation, a digital civil liberties nonprofit. "So they'll have this specific device that's provided to the law enforcement agency, and then they'll have to get a contract for a certain amount of time."
The device works to bypass the "secure enclave," the hardware that prevents a phone's storage from being read while it is locked. Then the software generates a report, sometimes thousands of pages long, listing all of the information stored on the phone. Police can specify what specific parts of the phone's storage they would like to search, although they are often loath to limit their searches.
"When you have a cellphone and you suspect it's used as an element of a crime, you don't know where those elements are going to be stored," digital forensics expert William Folson told the Baltimore Sun in response to the 2022 court ruling. "Let's say, for example, I send a threatening letter to somebody. I can type that out on my phone, I can send it as an email, or I can type it out on my home computer, set it out on my desk, and take a photograph."
The court ruling also noted that "some perpetrators purposely mislabel electronic files or hide evidence in unusual places" and that broader search warrants may be justified in cases of child pornography or financial crimes, but suggested that courts should apply this exception "rarely" and "consider requiring the inclusion of search protocols to restrict how the searching officers conduct such an analysis."
In the past, police had to send the cellphone or a copy of its data to the Cellebrite headquarters for analysis, according to Budington, which raised serious privacy concerns. A foreign private firm—Cellebrite is owned by a Japanese company and based in Israel—was given the run of the house on citizens' most sensitive personal information.
And the company is far from transparent about how its system works. In a leaked training video, company representatives told police to keep their use of Cellebrite devices "as hush hush as possible" and avoid letting Cellebrite's techniques "leak in court through disclosure practices, or you know, ultimately in testimony."
Cellebrite's marketing materials emphasize its role in stopping crimes against children. Yet the company's international clientele also has a much darker side. Cellebrite has provided phone scraping services to police states like China, Russia, Saudi Arabia, Venezuela, Belarus, Bahrain, and Myanmar. Even after Cellebrite claimed to back out of Russia and China, those countries' governments continued to use Cellebrite products.
"Cellebrite has developed a strong compliance framework, and our sales decisions are guided by internal parameters, which consider a potential customer's human rights record and anti-corruption policies," the company told The Intercept in response to the revelations about Chinese police. "Cellebrite remains committed to safeguarding human rights and has developed strict controls ensuring that our technology is used appropriately in legally sanctioned investigations."
Baltimore's most recent contract states that "the Product is an on-premise solution used and operated solely by Buyer without the involvement of Cellebrite" and that "Cellebrite is not engaged in any processing of 'personal data' (as this term is used in Laws governing data privacy and data protection) that flows through the Product." In other words, all of the data is supposed to be processed on the police station's own computer.
"Leakage of data exists," Budington says. "Just because the document says that doesn't mean it's actually doing that, but it does indicate that they have taken some steps in order to make sure that it's all locally processed within law enforcement's walls."
In the end, though, the largest threat to privacy may be the police themselves. "The effort that went into traditional police legwork served as some barrier to police abusing this power" in the past, Budington adds. "Today, this extraction process is routine and used on countless devices for minor offenses for which a suspect is alleged. This level of easy access has grave impacts on our privacy and civil liberties."
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
I had a funny thought.
I worked with many a system that had expiration dates, and you could fool all of them by setting the system date back to before the expiration date.
Something like this, what if the vendor thought they get defeat that by looking at all the file timestamps and refusing to run if any were in the future and past its expiration date?
All you'd have to do is add a single file with a future timestamp to make it snoop-proof. Could make an interesting gimmick in a movie.
That concept died decades ago. Most subscriptions wisely use an online call to the server to check for subscription info. Your imagined hacking abilities have just proven the Dunning Kruger effect.
Courts tell cops they can't.
Cops do it anyway.
Nothing else happens.
The growth of unaccountable authoritarians is the greatest threat we have towards our republic.
If Trump gets his way he’ll turn the entire country into a ‘Stop and ID’ state while giving cops total immunity in his effort to round up the illegal vermin that are poisoning the blood of the nation. Anyone who complains about it will be branded a leftist.
And there you go again, dragging Trump, and only Trump, into a non-partisan comment.
And there you go again, defending unaccountable authoritarians as long as it’s Trump giving them more authority and less accountability. They're GRRREAT!™
The unaccountable authoritarians in this case are Democrats.
So Trump promising to give police complete immunity instead of the problematic qualified immunity is Democrats.
It's a natural inescapable feature of immortal monopoly coercive government.
Sounds like conspiracy to violate rights. I'm sure Jack Smith will be on it.
.
No disclosure, then any evidence obtained through Cellebrite's system should be inadmissible in court.
Police. State.
"Plug in any cellphone, even a locked one, and get a full report of every file on its hard drive." - Not exactly true, there are many limitations based on the make/model of phone and the type of operating system, and no, you can't always unlock a phone. And LE agencies either must get consent or get a warrant to download someone's phone. If they pull evidence of a crime without consent/warrant, it will not be admissible in court.
I really don't need the police with this technology. Why can't we put this in the hands of the district attorney? Let the police do their investigation without these tools and send the referral to the prosecutor who is actually sworn to uphold the rule of law.