Cellebrite Forensic Tool Used on Kenyan Activist’s Phone, Citizen Lab Finds

Related

DigitStealer Infostealer Targets macOS Systems and Cryptocurrency Wallet Data

What happened A macOS-targeting infostealer called DigitStealer has seen increased...

QR Code Phishing Campaigns Deliver Malicious Links and Mobile Malware

What happened Security researchers at Palo Alto Networks Unit 42...

Carding-as-a-Service Marketplaces Fuel Surge in Global Credit Card Fraud

What happened Cybercriminals have built sophisticated Carding-as-a-Service (CaaS) marketplaces that...

Share

What happened

New research from the University of Toronto’s Citizen Lab shows that Kenyan authorities used a commercial forensic extraction tool made by Israeli company Cellebrite to access the mobile phone of prominent pro-democracy activist Boniface Mwangi while it was in police custody in July 2025. Indicators suggest the device was accessed around July 20-21, and when returned in September 2025 the phone’s password protection had been removed.

Who is affected

The immediate subject of the report is Kenyan activist Boniface Mwangi, who has announced plans to run for president in 2027, but the findings echo a broader pattern of civil society targets, including activists in Jordan and other countries, where similar forensic extraction tools have been documented. 

Why CISOs should care

Commercial forensic and surveillance technologies like Cellebrite’s tools are increasingly used by governments and law enforcement to extract data from devices, often beyond traditional legal process frameworks. This trend highlights evolving vendor risk, data protection, and privacy implications for organizations and individuals, particularly where infrastructure or personnel intersect with geopolitical and civil society issues.

3 practical actions

  1. Review vendor policies: Ensure any digital forensics or investigative tool providers have clear, audited human-rights and lawful-use policies, and verify compliance clauses in contracts.
  2. Strengthen endpoint encryption: Enforce strong device security policies (biometric + PIN/passphrase) and remote lock/wipe capabilities to reduce the risk of unauthorized access.
  3. Enhance incident response planning: Incorporate scenarios involving lawful and unlawful device access into tabletop exercises to prepare for potential exploitation or misuse of forensic tools.