Jordanian authorities appear to be utilizing an Israeli-made tool to extract information from activists who have spoken out against Israel and in support of Gaza, according to a report by the Citizen Lab. The investigative body found that these authorities were using forensic extraction tools made by Cellebrite, which can access data such as photos, videos, chats, passwords, location history, and more.
The investigation, spanning several years, revealed with high confidence that Jordanian security forces have been utilizing this technology against members of civil society, including activists, a student organizer, and a human rights defender. The researchers note that the use of Cellebrite by authorities "likely violates human rights treaties Jordan has ratified", specifically the International Covenant on Civil and Political Rights.
The Citizen Lab analyzed four mobile phones belonging to individuals who had been detained or interrogated by authorities between January 2024 and June 2025, and all had been subjected to forensic extraction using Cellebrite. In one case, a researcher discovered that an activist's iPhone was in custody for 35 days after being seized following an interrogation.
In another instance, a student activist refused to provide their phone passcode, leading authorities to unlock the device using Apple's Face ID while holding it up to the activist's face. Upon release from prison, the activist found their passcode written on a piece of tape stuck to the back of the phone, which was later linked to an external Cellebrite device.
Cellebrite maintains that its technology is forensic in nature and used only for investigations with legal due process or consent. The company claims it vets potential customers against internal human rights parameters and takes proactive steps to investigate any allegations of misuse. However, the Jordanian government has yet to respond to requests for comment on this matter.
The report highlights concerns about Cellebrite's use in other countries, including Myanmar, Botswana, Serbia, and Belarus, further raising questions about its role in the surveillance state.
The investigation, spanning several years, revealed with high confidence that Jordanian security forces have been utilizing this technology against members of civil society, including activists, a student organizer, and a human rights defender. The researchers note that the use of Cellebrite by authorities "likely violates human rights treaties Jordan has ratified", specifically the International Covenant on Civil and Political Rights.
The Citizen Lab analyzed four mobile phones belonging to individuals who had been detained or interrogated by authorities between January 2024 and June 2025, and all had been subjected to forensic extraction using Cellebrite. In one case, a researcher discovered that an activist's iPhone was in custody for 35 days after being seized following an interrogation.
In another instance, a student activist refused to provide their phone passcode, leading authorities to unlock the device using Apple's Face ID while holding it up to the activist's face. Upon release from prison, the activist found their passcode written on a piece of tape stuck to the back of the phone, which was later linked to an external Cellebrite device.
Cellebrite maintains that its technology is forensic in nature and used only for investigations with legal due process or consent. The company claims it vets potential customers against internal human rights parameters and takes proactive steps to investigate any allegations of misuse. However, the Jordanian government has yet to respond to requests for comment on this matter.
The report highlights concerns about Cellebrite's use in other countries, including Myanmar, Botswana, Serbia, and Belarus, further raising questions about its role in the surveillance state.