Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Cellebrite and other iPhone hacking tools purchased by U.S. public schools

Cellebrite can be used to hack into student's iPhones depending on security settings

U.S. public schools are acquiring forensic tools meant for police and military use to hack into student and faculty iPhones across the U.S.

Apple places privacy and security above all else when designing the iPhone, yet government facilities and institutions like the FBI continue to seek backdoors for "the greater good." Despite pressure from the United States and Australian governments, among others, Apple has not broken its encryption or created a back door.

Companies like Cellebrite seek to profit from this dilemma by finding new vulnerabilities and hacks to bypass iPhone security. They package these vulnerabilities into devices called "mobile device forensic tools" or MDFTs and sell them for a big profit, mostly to law enforcement and other governmental agencies.

While police and the FBI have been known to deal with Cellebrite and other companies, the desire to break into iPhones is spreading. A report from Gizmodo says that several public school districts have begun purchasing the tools to use on students and faculty.

Cellebrite made headlines after the 2016 San Bernardino shooting when it was discovered that the FBI had purchased at least $2 million worth of Cellebrite products since 2012. Multiple police stations around the U.S. are also on record for possessing the forensic units in order to break into criminal's smartphones.

The school systems investigated have spent thousands on different forensic tools. Given existing precedent on student rights on a school's grounds, in most states, as long as the faculty have reasonable suspicion that a student is performing illegal activities they can search a student's phone. It is unknown if parents are being made aware of the capability in districts that possess the devices.

Apple continues to up its security standards with each new iPhone released Apple continues to up its security standards with each new iPhone released

One such case in 2016 says a student granted the school access to their phone for a search. The phone was plugged into a Cellebrite machine and investigators were able to discover deleted text messages between the student and teacher, which lead to an arrest.

While cases like these occur, giving public schools unilateral access to forensic tools without oversight could lead to the invasion of hundreds of thousands of students privacy for the sake of "security." Due to laws surrounding the public school system students are not necessarily protected by the fourth amendment, and can be subject to search and seizure without due process.

"Cellebrites and Stingrays started out in the provenance of the U.S. military or federal law enforcement, and then made their way into state and local law enforcement, and also eventually make their way into the hands of criminals or petty tyrants like school administrators," says Cooper Quentin, senior staff technologist at the Electronic Frontier Foundation. "This is the inevitable trajectory of any sort of surveillance technology or any sort of weapon."

Concerns have been raised over this new development, surrounding school discipline, and approved staff who can use the device, and for what reasons. The lack of oversight on these phone penetration tools can prove to be serious attacks on student privacy and welfare.

Cellebrite and other forensic tools are only as good as the exploit they use to break into a device. With the proper device security, users can make it very difficult for such tools to work. Measures that smartphone users can take to lengthen the penetration process include use of an alphanumeric passcode, users disabling biometrics before handing over a phone, and enabling the ability for the phone to reset itself after 10 failed access attempts.



38 Comments

Beats 3073 comments · 4 Years

When the principal has access to your iPhone, privacy becomes a bigger problem.

Is Apple not allowed to sue Cellebrite and shut them down? How is this different from intentionally intruding a business'/institution's privacy? How is it different from selling tools that allow you to open specific banks vault or an interceptor that can change prices at Wal-Mart registers?

lkrupp 10521 comments · 19 Years

A school district is NOT a law enforcement agency and therefore cannot confiscate and hack into a student’s or faculty member’s personal mobile device without permission. I can see a deluge of lawsuits coming for these school districts. How could a school official confiscate a faculty member’s personal device in the first place? This makes no sense whatsoever.

anantksundaram 20391 comments · 18 Years


Cellebrite and other forensic tools are only as good as the exploit they use to break into a device. With the proper device security, users can make it very difficult for such tools to work. Measures that smartphone users can take to lengthen the penetration process include... enabling the ability for the phone to reset itself after 10 failed access attempts.

The thing that puzzles me: why is Apple's reset set to a max of 10 password tries by the user? After all, it would take many, many multiples -- even exponents -- of that for an automated password-cracking device to hack even an 'easy' password, no?

darkvader 1146 comments · 15 Years

Beats said:
When the principal has access to your iPhone, privacy becomes a bigger problem.

Is Apple not allowed to sue Cellebrite and shut them down? How is this different from intentionally intruding a business'/institution's privacy? How is it different from selling tools that allow you to open specific banks vault or an interceptor that can change prices at Wal-Mart registers?

What Apple needs to do is reverse engineer these devices and close the holes they're using.

Cops/schools/whoever should NOT be able to access an iPhone without the owner's permission under ANY circumstances.

CloudTalkin 916 comments · 5 Years

lkrupp said:
A school district is NOT a law enforcement agency and therefore cannot confiscate and hack into a student’s or faculty member’s personal mobile device without permission. I can see a deluge of lawsuits coming for these school districts. How could a school official confiscate a faculty member’s personal device in the first place? This makes no sense whatsoever.

You can't evaluate the lawfulness in this situation by lumping student and faculty rights together.  Student rights are far less protective than faculty rights.  In certain school districts, student lockers, cars, and possessions can be searched without consent if there is reasonable suspicion of illegal activity.  The reasonableness of that suspicion is determined by school authorities. However, proper warrants (based on evidence) or consent would be required for faculty.  Plus teachers got unions to put the kibosh on all that rights trampling.   The school can't confiscate a faculty member's personal device.  The school can confiscate a job supplied device like a phone or laptop.

The case mentioned in this story:  the student gave consent, evidence was found implicating the teacher, and proper warrants were issued leading to an arrest.