Monday, February 6, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Uganda’s Human Rights Group Call for Ban on Sale of Cellebrite’s UFED

Avantika Chopra by Avantika Chopra
August 18, 2022 - Updated on August 19, 2022
in Features, Espionage
0
Israeli security firm Cellebrite has been funding smartphone hacking technology "UFED" for Uganda's brutal dictatorship to hack citizens' smartphones.
587
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

Several human rights groups in Uganda have asked the Defense Ministry to stop selling a phone hacking tool made by an Israeli company, Cellebrite. They noted it could be used for rights abuses.

According to a report by Haaretz, the company Cellebrite has sold its tool, known as the UFED, to the police and security agencies in Uganda. It allows them to access a phone’s password-protected data.

You might also like

Hollywood and its Quest with Nailing Hacking Depictions

Internet Censorship and Freedom of Speech

Voice Networks are Under Attack – is Anybody Listening?

The human rights groups sent a letter to the Defense Ministry asking it to stop selling the tool. Among the letter’s signatories was Eitay Mack, an Israeli lawyer known for fighting against human rights violations.

The groups noted that the sale of the tool to Uganda must not be allowed due to the country’s long history of human rights violations. The rights group also addressed the Defense Export Control Agency of the Ministry of Defense, which reviews and approves the sale of security technology.

Uganda accounts for the second youngest populous in the world. Eitay Mack noted that the Museveni regime has taken control of every aspect of its citizens and went even as far as infiltrating human rights, chipping the residents out of the International human rights law (IHRL).

In this impoverished land, selling UFED by Cellebrite has been something that human rights groups have frowned upon. Though Uganda has been deprived of any fundamental human rights by police, even the human rights prescribed by the United Nations General Assembly, Cellebrite denied the technology’s misuse. It said that the technology has been handled with deliberation and only supported its products’ ethical use, while Mack’s investigation contradicted the security company’s statements.

How is UFED being misused in Uganda?

According to Eitay Mack, Cellebrite’s flagship product, “UFED,” enables users to hack into “password-protected devices” and fetches and stores the data.

In one of his investigations, Mack claimed that the Uganda Police Force has been using UFED to hack into smartphones since 2017, and a local Ugandan company backed the claim that it supplies the UFED system to police. It has been being used to extort information from smartphones.

In the letter sent by Eitay Mack to Israel’s Defense Ministry and Cellebrite, Mack mentioned that local human rights activists call for ceasing Cellebrite and its services in the nation.

Within the same letter, the local supplier also revealed how Uganda Police Force uses Cellebrite products to extract information from the detainee cloud services. It said that the police use FED-Cloud Analyzer, which fetches the users’ data on cloud storage services like Google Drive, Dropbox, Apple iCloud, and more. Moreover, the technology can retrieve the information using remote access without typing any password.

However, Cellebrite publications also denied the use of remote access unless the suspect provided a phone password.

Criminals are now using UFED in Uganda

Contrary to Cellebrite statements about the technology used by police to fight crime and terrorism, journalists have pointed out that the company’s clients have previously included repressive regimes in countries like Russia, China, Bangladesh, and more.

Additionally, Eitay Mack denoted that the technology was not limited to police and authorities because hacktivists have been using it to repress human rights activists, LGBTQ communities, and minority groups in Uganda.

The letter also listed conspired murders, illegal abduction by the police, and torture reports of these groups.

Additionally, international workers have also experienced hacking instances while working in Uganda. According to a report by 9to5Mac, the Israel-based NSO Group’s Pegasus spyware targeted nine smartphones for the US Department of State workers serving in Uganda.

A Human Rights Watch also noted that over 400 cases of “snatching,” arbitrary arrests, and abduction had been performed by Uganda Police Force.

While interviewing the victims of atrocities, the NGO noted that their smartphones were also confiscated during the arrest. However, arrested individuals, such as lawyers and students, refused to open their smartphones on the grounds of illegal arrests. Following this, the law enforcement officers hacked and unlocked smartphones using Cellebrite’s UFED to steal crucial data.

However, despite the evidence, Cellebrite has responded against the use of UFED in criminal activities and stated that its only mission is “creating a safer world through providing solutions to law enforcement organizations,” adding that they have developed to ensure the “proper use of our technology in the context of investigations carried out under the law.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Cellebritecellebrite ufed 4pc downloadcellebrite ufed latest versioncyber express newsdata breachThe Cyber ExpressUFEDufed downloadufed priceufed unlock toolwhat is cellebrite ufed
Previous Post

BharatPay Hacked, Details of 37,000 Customers Compromised

Next Post

Ransomware Strain ‘PLAY’ Hits Argentina’s Judiciary of Córdoba

Avantika Chopra

Avantika Chopra

Related Posts

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

by Editorial
February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

by Editorial
February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

by Editorial
February 4, 2023
InTheBox
Features

Global Banking Apps Under Attack: Researchers Find ‘InTheBox’ Web Injects

by Ashish Khaitan
February 1, 2023
SOCs
Features

SOCs to Face Greater Challenges from Cybercriminals Targeting Govt. and Media in 2023

by Editorial
January 28, 2023
Next Post
Argentina Play Ransomware

Ransomware Strain 'PLAY' Hits Argentina's Judiciary of Córdoba

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Yanluowang Ransomware Gang

Yanluowang Ransomware Gang Hacked, Internals Chats Leaked

November 7, 2022
Cyber Monday Deals

Cyber Monday Deals 2022: How To Shop Smart & Get Best Discounts

November 26, 2022

Categories

Don't miss it

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

February 4, 2023
Firewall Daily

Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

February 4, 2023
LockBit. Ion Group
Cybersecurity News

LockBit Claims Ransom From ION Group, Firm Declines To Comment

February 4, 2023
Dominic Alvieri
Firewall Daily

After Hive, Will More Ransomware Groups be Taken Down in 2023?

February 4, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.