Index/Organizations/Cellebrite

Cellebrite

Israeli digital intelligence company

Fact-Checks

49 results
Jan 21, 2026
Most Viewed

Does ICE recive training in Irseal

Yes — multiple investigative reports and activist investigations conclude that officials have participated in training and exchange programs with i security forces or in Israel-focused seminars; organ...

Jan 30, 2026
Most Viewed

is ICE receiving training from the IDF

Multiple independent investigations, advocacy groups and news outlets report that officers and other U.S. law‑enforcement personnel have participated in longstanding exchanges, conferences and joint t...

Jan 14, 2026
Most Viewed

Which private contractors received the largest ICE contracts after the 2025 budget surge and for what services?

The 2025 budget surge funneled tens of billions of dollars into ICE’s enforcement and detention missions, and the early spending went overwhelmingly to large private detention firms and a cluster of s...

Dec 12, 2025

Graphene OS origins, how it came to fruititio, the one who funded it or team that got it started or currently running it Are there any connection from Israel or ethnic Jews?

GrapheneOS began as an open-source, security-focused Android project founded by Daniel Micay in late 2014; it evolved from the CopperheadOS codebase and was announced under the GrapheneOS name in 2019...

Dec 12, 2025

MetropleX if Graphene OS, research their ties to Israel, Jews, or pro zionism organizations

Available reporting shows no credible evidence in the provided sources that GrapheneOS or a group named “MetropleX” (or “Metroplex”) has formal ties to Israeli government agencies, Jewish communal org...

Jan 27, 2026

Is it illegal to use signal to track ice

to monitor or share sightings of agents sits in a legal gray zone: public observation and sharing of lawfully obtained information can be protected speech, but coordinated efforts that facilitate evas...

Oct 8, 2025

What are the specific laws governing ICE agent conduct during raids and searches?

Federal law gives ICE broad authority to arrest and detain noncitizens, including warrantless arrests in many circumstances, but courts have repeatedly limited that authority by requiring during searc...

Jan 25, 2026

What specific Israeli-made surveillance or forensic technologies have been contracted by ICE, and what procurement records document those deals?

at least two forensic and surveillance technologies: under a roughly $2 million agreement and long-standing tied to multi-million-dollar contracts; procurement notices, Federal Procurement Data System...

Jan 19, 2026

How transparent are DHS and ICE procurement records for surveillance tools, and where can journalists find detailed contract data?

Transparency around DHS and ICE procurement of surveillance tools is real but highly uneven: procurement notices, inspector‑general reports, and civil society FOIA wins have revealed major purchases a...

Dec 15, 2025

Are there documented ties between GrapheneOS founders or contributors and Israel or Jewish organizations?

Available sources show no documented evidence in this collection linking GrapheneOS founders or core contributors to Israel or to organized Jewish groups; GrapheneOS was founded by Daniel Micay and is...

Dec 15, 2025

How does NCMEC share data and case files with local, state, and federal law enforcement agencies?

NCMEC collects reports of child sexual exploitation via its CyberTipline and forwards those reports and supporting material to designated law enforcement bodies — including FBI, federal task forces, a...

Jan 17, 2026

Which vendors hold the largest active ICE contracts for surveillance and phone‑forensics tools as of 2026?

ICE’s biggest active contracts for phone‑forensics and related surveillance tools as of early 2026 are concentrated among a handful of specialized firms: Cellebrite (major universal forensic extractio...

Dec 16, 2025

How do law enforcement agencies prioritize investigations of individuals who view vs download CSAM?

Law enforcement prioritizes CSAM cases based on risk to live victims and investigatory triage: NCMEC analysts flag and escalate roughly 63,892 of millions of reports as “urgent or involving a child in...

Jan 28, 2026

How do commercial mobile‑forensics vendors like Cellebrite and Grayshift extract data from locked iPhones, and how often do law‑enforcement agencies use them?

Commercial mobile-forensics vendors such as and using a mix of logical file‑system collections, exploit‑based techniques that bypass or brute‑force passcodes, and—according to reporting—installation o...

Jan 18, 2026

What oversight mechanisms exist for high‑risk surveillance contracts like Palantir, Clearview AI, Cellebrite and Paragon in ICE procurement?

Oversight of ICE’s recent wave of high‑risk surveillance contracts — including deals with Palantir, Clearview AI, Cellebrite and Paragon — exists in theory across federal procurement rules and calls f...

Dec 7, 2025

How do courts evaluate the reliability of chat logs and messaging app exports in CSAM investigations?

Courts treat chat logs and messaging exports as powerful but technically fraught evidence: admissibility turns on chain-of-custody, forensic soundness, and whether providers or tools acted as governme...

Jan 20, 2026

What data does apple share with defense and government about its iPhone users

Apple says it responds to valid legal process and publishes semi‑annual Transparency Reports and legal‑process guidelines that enumerate the types and volume of government requests it receives and ans...

Jan 27, 2026

What ICE contracts were awarded through no-bid processes in 2024–2026 and what are their public records?

Reports, watchdog filings and local coverage identify a series of high-profile awards in 2024–2026 that were issued without full competitive procurements — notably a roughly $29.9 million no‑bid task ...

Dec 17, 2025

Which GrapheneOS components or subsystems are most at risk without Micay's contributions?

GrapheneOS’s security posture relies heavily on hardening work such as its hardened memory allocator and active discovery/reporting of Android and Pixel-specific vulnerabilities; those efforts have le...

Oct 8, 2025

What are the privacy implications of ICE's social media surveillance for US citizens?

The assembled reporting shows , including social-media monitoring, phone-cracking tools, facial recognition, and data collection practices that involve U.S. persons, raising interconnected privacy, fr...