The Cellebrite Wars: Moxie’s Stunt and Freddie’s Phone

On April 21, the guy behind the Signal encrypted texting service, Moxie Marlinspike, wrote a post exposing vulnerabilities in the interface of Cellebrite, the cell phone extraction program that FBI relies on.

Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed.

For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.

After telling Cellebrite to fuck off for integrating Signal exploitation into their offerings in about four different ways, Moxie announced that some Signal installs going forward would have such aesthetic sabotage built in in the future.

In completely unrelated news, upcoming versions of Signal will be periodically fetching files to place in app storage. These files are never used for anything inside Signal and never interact with Signal software or data, but they look nice, and aesthetics are important in software. Files will only be returned for accounts that have been active installs for some time already, and only probabilistically in low percentages based on phone number sharding. We have a few different versions of files that we think are aesthetically pleasing, and will iterate through those slowly over time. There is no other significance to these files.

As a Signal user, I’m thrilled that Moxie is trying to make it harder for FBI to exploit my phone. As someone who’d like FBI to hold the January 6 insurrectionists accountable, this stunt couldn’t have happened at a worse time, when the FBI was in the process of trying to exploit the devices of over 500 defendants in a violent assault on democracy.

Which brings us to Freddie Klein, the former Trump State Department official with family ties to Argentine fascists who was arrested for assault in conjunction with the insurrection.

Freddie wants his phone (and dash cam) back. Freddie was arrested on March 3 and his phone — which was plugged into his car charger when he was arrested — was exploited on March 12. Freddie’s attorney Stanley Woodward first asked verbally for the phone, and on May 6, prosecutors said they’d be happy to return Freddie’s phone as soon as he stipulated that the exploitation of it happened via reliable methods.

Thereafter, on May 6, 2021, the government advised that, “we would be happy to release Mr. Klein’s phone as evidence in the case provided that Mr. Klein is willing to agree to the attached stipulation. This stipulation was subsequently revised following discussions with the Office of the Federal Public Defender for the District of Columbia, although that office has not approved or, to the undersigned’s knowledge, accepted the stipulation as drafted. The stipulation provides, inter alia, that Mr. Klein agree that: “[t]he [digital] Images [of Mr. Klein’s phone] are accurate duplicates of the Digital Media and were created using reliable methods” and “[t]he Images of the Digital Media and/or any other copies are ‘admissible [into evidence] to the same extent as the original,’ within the meaning of Federal Rule of Evidence 1003.”

So now Freddie is moving formally to get it back, because his defense team wants the ability to inspect it forensically.

The government, however, maintains that absent that stipulation, they can’t return the phone. Not only might they need it to introduce the evidence against Freddie, but it’s possible the phone will have evidence implicating some of the other 500+ defendants, and the government wouldn’t be able to call Freddie as a witness against them to attest to the accuracy of the Cellebrite report.

The government doesn’t describe what evidence it thinks Freddie might have implicating others. But they note that some of the evidence they want to use at trial against him includes him bragging about appearing in a video from the riot via a Signal text.

After the filter team completed its review, the prosecution team began its review of the non-privileged and search warrant responsive contents of the defendant’s phone via the Cellebrite extraction report and has identified relevant material that the United States intends to introduce as evidence at trial. The identified evidence thus far includes location information on January 6, 2021, as well as messages exchanged by the defendant via the Signal application (“app”) regarding his presence at the U.S. Capitol.

The government then goes on to explain that some of the evidence they want to use is not available via other means (say, by serving a warrant on Facebook). They’re talking about Signal, of course.

It is also important to note that some of the evidence that has been discovered in the defendant’s phone is not available to the government through other means. For example, the United States has identified text messages sent by the defendant through the Signal app, in which Klein identifies himself in a video at the Capitol. Notably, Signal is a “state-of-the-art end-to-end encryption” app that “keeps your conversations secure.” See Why Use Signal, https://signal.org/en/ (last visited Jul 26, 2021). Signal advertises that even they cannot read messages or listen to calls, “and no one else can either.” Id. As Signal itself says, “Signal doesn’t have access to your messages; your chat list; your groups; your contacts; your stickers; your profile name or avatar; or even the GIFs you search for.” See https://signal.org/bigbrother/centralcalifornia-grand-jury/ (last visited Jul 26, 2021). Indeed, Signal has specifically asserted that “the broad set of personal information that is typically easy to retrieve in other apps simply doesn’t exist on Signal’s servers.” Id. This includes address of the users, their correspondence, and the name associated with each account. Id. Indeed, according to Signal, the only information that it maintains is the timestamps for when each account was created and the date that each account last connected to the Signal service. Id. Thus, the messages sent by the defendant via the Signal app are only available to the government through the defendant’s phone and the Cellebrite extraction of that phone.

To be clear: the government is generally making defendants stipulate to the accuracy of forensic reports before returning any devices (though I wonder if they have done so with Stewart Rhodes, who reportedly shared his phone and already got it back). For example, the government refused to return Vitali Gossjankowski’s laptop, which has special software tied to his hearing impairment on it, without such a stipulation. So it’s not just Freddie’s use of Signal that has led them to refuse to return the phone.

Moreover, the concern about introducing evidence against others is real. A number of prosecutors’ recent investigative moves (both specific arrests and the way they’re wiring some plea deals to others) are best explained by the difficulty posed by a crime in which hundreds of the criminals, many of them misdemeanor defendants, have important evidence against others.

But this is the use case for which Moxie’s stunt presented the real concern: someone whose phone has evidence needed to rebut his claims that the videos showing him violently attacking the Capitol aren’t really him. And that’s before any special protections DOJ started taking after Moxie promised future sabotage in a tiny percentage of Signal installs.

image_print
8 replies
  1. Vinnie Gambone says:

    https://junebugweddings.com/vendors/wedding-photographers/new-york/nyc/Aesthetic-Sabotage

    Ms Wheeler, the phrase “aesthetic sabotage” set off curiosity alarm and so I went a hunting for more insight. I am sorry to report that a certain sentinent being very close to you may be moonlighting.
    On the other hand, someone may just be glomming in on her coolness, and who could blame them? Thanks again and always for you and your cohorts work. None of us alone is as smart as all of us together.

    • Molly Pitcher says:

      So Marcy, has Junebug the Terrorist Dog taken up professional photography since moving to Ireland ? I wish my dog was that ambitious. Hairy Winston the (Border) “Terrier-ist” just demands to eat our Caesar salad and be let off the leash to beat up the Bernese Mountain Dog across the way.

  2. earlofhuntingdon says:

    How would a defendant know if the FBI had used “reliable methods” to exploit their phone or computer?

    • emptywheel says:

      It’s a bogus stip, for sure. But I suspect USG will nevertheless be able to keep the phone.

      • Spencer Dawkins says:

        I was trying to imagine situations where the stipulation wouldn’t be bogus.

        So, I spent the last week of June volunteering at a senior high camp, where I took about 500 pictures. If the camp had turned into a crime scene, I could PROBABLY stipulate that the pictures the government showed me looked like pictures I’d taken, but I probably couldn’t stipulate that I knew there weren’t any pictures on the phone that the government didn’t show me, and I probably couldn’t stipulate whether the timestamps the government used in court documents were accurate. Probably 30 percent of my pictures were of the same small group of kids on successive days, so I’m not sure I could verify that this picture of my small group kids was taken on Tuesday, and not on Thursday (even in Texas during the summer, kids wear the same sweatshirts indoors on multiple days, because of air conditioning), and I sure couldn’t swear that there were no kids in large group shots who had been edited in or out.

        Are these the kinds of reasons why the stipulation would be bogus?

        • earlofhuntingdon says:

          For starters, as a defendant, I wouldn’t know how accurately the prosecution documented the chain of custody. I would not know who analyzed the phone, how qualified they were, and what their track record of successes and failures was. I would not know how thoroughly the analysis was done, when, with what h/w and s/w, and how well either of the latter was maintained.

          I might not know how selective the government was in choosing images to use at trial, but I should know (but might not) if they were omitting exculpatory images. I would need to perform independent analysis to obtain the metadata associated with the images and to know whether any of them had been modified, and if so, when (while in my custody or theirs).

          Some of that should be delivered up before trial, but not necessarily before the government asked me to certify to this stipulation. So, I would agree that it’s bogus, and presumably designed to allow the government to keep the phone for now.

  3. WilliamOckham says:

    The government’s approach seems very problematic to me with regard to the use of this data against third parties. No one is actually qualified to make that stipulation. One of the oldest axioms of digital security is that if your adversary has physical access to your device, given time, they can do anything they want. There’s nothing (other than ethical commitments) to stop the government from altering data in a such a way that it isn’t a concern to the stipulating party, but creates legal liabilities for others being charged. The incentives are really bad for everyone involved.

    I absolutely have NO reason to assume that would happen in this case. I am not willing to extend that trust to all future prosecutors.

  4. Lawnboy says:

    Well, while were talking of phones (and phone tech), the Wow-way saga continues. The two Mikes have passed the 1000 day mark of there lock up. What a complete farce this is.

    One of them is a former diplomatic staffer and I would have thought that he could have been released by now.
    Ms Meng’s legal team have made a plea for lifting of her bail conditions stating (stuck in one of two posh mansions in West Van) ; she is a mother of three , she has life long health problems, and ……sleep apnea!!! Oh, the heart break of apnea.

    Spavor has had a hand written note delivered to his family and in it he asks for a better sleep mask bc they keep lights on all night, depriving him of sleep!
    I cant find much more bc all records are sealed.
    What did the former want from this company?
    This has got to stop.

Comments are closed.