Hack into anyone's iPhone, a dream come true with this software!

Author :

React :

Un commentaire

In a recently leaked video training session, Cellebrite shows its users how to use its software, provided they keep this information to themselves. The importance of this condition is obvious: this software can access almost every iPhone in the world, and its main users are none other than certain governments and police departments.

We have translated the full transcripts of the video they sell to governments for you in the rest of this article! You will be surprised at how they managed to do it. keep it secret until today !

Cellebrite recommends discretion not only to attract a discreet clientele but also for everyone's safety. The company states that leaks could harm the entire international law enforcement community. It would be catastrophic if such tools fell into the hands of malicious forces.

For those who are unfamiliar with Cellebrite, here is an example of what they do:

Are there other software programs that do the same thing?

Cellebrite is not the only company developing tools to access iPhones. Pegasus, another well-known spyware program, is used by countries such as Morocco. There are rumors that the French secret services are developing similar software, and other companies such as Grayscale offer similar services.

You also have Mspy, which allows you to hack several applications such as :

Transcription of the Cellebrite private training video:

Here is the full transcript of the training video:

I am glad you can join us. And I am pleased to launch this initial module covering the introduction and orientation to the Cellebrite Premium system. Thank you, and enjoy.

Did you know that Cellebrite Advanced Services has 10 labs in nine different countries around the world? Well, in order to leverage all of these capabilities, we are working together to bring you this training, so you will hear from colleagues from around the world. The following list are those who make up this current set of modules, and I hope you enjoy meeting each of them.

Before we start, it's very important to review the confidentiality and operational security issues that we have to respect when using Cellebrite Premium, not only ourselves in our own Cellebrite Advanced Services laboratories, but especially you in your own laboratories around the world.

Well, we have to recognize that this capability actually saves lives. And in situations where it's too late, we help bring closure to the families of victims and ultimately solve crimes and put people behind bars. So it's very important to keep all of these capabilities as protected as possible, because ultimately, leaks can be detrimental to the entire law enforcement community around the world.

In a little more detail, these capabilities that are built into Cellebrite Premium are actually Cellebrite's trade secrets, and we want to continue to ensure their viability so that we can continue to invest heavily in research and development, so that we can give these capabilities to law enforcement agencies around the world. Your role is to ensure that these techniques are protected as best you can and to treat them as «law enforcement sensitive» or classify them at a higher level of protection in your country or agency.

And the reason is that we want to make sure that widespread knowledge of these capabilities doesn't spread. And, if the bad guys find out how we get into a device, or that we're able to decrypt a particular encrypted messaging app, then they might move on to something much, much harder or impossible to overcome. I don't want that.

We are also aware that phone manufacturers are constantly seeking to enhance the security of their products. And the challenge is already difficult enough as it is, but we continue to make very good progress. Please don't make our job any harder than it already is.

And at the end of the day, we don't really want techniques to be disclosed in court through discovery practices, or you know, ultimately in testimony, when you're sitting on the stand, producing all this evidence and discussing how you got into the phone. At the end of the day, you've extracted the data, it's the data that solves the crime. How you got in, let's try to keep that as quiet as possible.

Now, let's move on to operational security, or “opsec.” This begins with the physical protection of the premium system and all of its components that you received in the kit.

These little pieces that make all this capability... magical. They are very sensitive assets, and we want to make sure that no tampering or other tampering is used on these devices. And in some cases, there is a risk of tampering and deactivation of the component, and that's something you really don't want to do, because it could prevent your agency from having the capability while you wait for a replacement.

Furthermore, exposure of any of these premium features could be very detrimental to the global law enforcement environment. So, be careful with sharing information, whether in face-to-face conversations, on the phone, in online discussion groups, via email—other things like that—just try to keep it sensitive and don't go into detail.

When it comes to written documentation, obviously, you don't want to disclose too much in your court reports. But definitely include the bare minimum to ensure that a layperson can understand the basic concepts of what was done.

Be sure to mention that you used Premium. You can mention the version, but don't go into detail about what you did with the phone: either manipulating it or anything that appears on the Premium graphical user interface itself.

And when it comes to technical operations and quality management within your organization, please be aware that any document you create as a standard operating procedure could be visible to an external auditor for ISO 17025 or other individuals who may apply a freedom of information law request within your agency under any law in your country.

So be careful with all of this. You need to protect it as best you can. And the other additional factor you may not be aware of is that faulty devices—if they are able to connect to the network—could call home and inform the manufacturer that the device is under attack. And with enough knowledge and intelligence, it's possible that phone manufacturers could find out what we're doing to make this magic happen. So please do your best to follow all instructions and make them the best possible procedures [sic] in the future.

As a result, the software was only made for governments, with no public use planned, and those who want to hack an iPhone will have to find out more about Mspy.

 

Found this helpful? Share it with a friend!

This content is originally in French (See the editor just below.). It has been translated and proofread in various languages using Deepl and/or the Google Translate API to offer help in as many countries as possible. This translation costs us several thousand euros a month. If it's not 100% perfect, please leave a comment for us to fix. If you're interested in proofreading and improving the quality of translated articles, don't hesitate to send us an e-mail via the contact form!
We appreciate your feedback to improve our content. If you would like to suggest improvements, please use our contact form or leave a comment below. Your feedback always help us to improve the quality of our website Alucare.fr


Alucare is an free independent media. Support us by adding us to your Google News favorites:

1 comments on the discussion forum for «Hack anyone's iPhone—a dream come true with this software!'

Post a comment on the discussion forum