Jordan Uses Israeli Cellebrite Tool to Extract Data from Activists’ Phones
January 22, 2026
Jordanian authorities appear to be using an Israeli digital tool called Cellebrite to extract data from mobile phones of activists critical of Israel and supportive of Gaza. The Citizen Lab's multiyear investigation found that Jordan's security forces used this forensic extraction tool on civil society members, including political activists, a student organizer, and a human rights defender. Cellebrite’s technology can take photos, videos, chats, passwords, location history, web data, social media, and sometimes deleted files when the phone is in the authorities' hands.
The Citizen Lab said Jordan’s use of Cellebrite likely violates human rights treaties the country has signed, including the ICCPR, which limits political surveillance. The researchers analyzed four phones from January 2024 to June 2025 belonging to activists who had been detained or arrested. All four devices showed signs of forensic extraction by Cellebrite.
One case involved an activist whose iPhone was seized for 35 days by Jordan’s general intelligence department. In another, a student refused to give their passcode, so officers used Apple’s Face ID by holding the phone to their face, later imprisoning the student. The phone returned to the student had their passcode taped to the back. Analysis showed the phone connected to Cellebrite and a cybercrime unit in Amman.
Cellebrite told the Guardian their tool is forensic, used only with legal permission after an event, not like spyware. They claim they vet buyers to avoid misuse and investigate any misuse claims seriously. The Jordanian government did not comment.
Cellebrite has also been linked to targeting activists in Myanmar, Botswana, Serbia, and Belarus.
Read More at Theguardian →
Tags:
Jordan
Cellebrite
Mobile Phone Extraction
Activists
Digital Surveillance
Human rights
Comments