Kenyan Authorities Accused of Using Israeli Tech to Hack Activist's Phone
Kenyan Authorities Accused of Using Israeli Tech to Hack Phone

Kenyan Authorities Accused of Using Israeli Tech to Hack Activist's Phone

A new report from Citizen Lab, a group monitoring digital threats to civil society, has alleged with high confidence that Kenyan authorities employed Israeli technology to breach the phone of prominent pro-democracy activist Boniface Mwangi while he was under arrest last year. The findings suggest the use of Cellebrite software, which could have enabled full extraction of sensitive data, including private messages, family photos, financial details, and passwords.

Activist's Personal Device Compromised

When Mwangi, who plans to run for president in 2027, had his phones returned after a controversial arrest in June, he discovered one device was no longer password-protected. This personal phone contained intimate family moments and communications with friends and mentors, leaving Mwangi feeling exposed and unsafe. He told the Guardian that he operates under constant surveillance, with his calls monitored and messages read, and believes authorities had already gathered information about his role in protest movements from other sources.

Broader Pattern of Surveillance Abuses

Citizen Lab researchers argue this incident adds to evidence that Cellebrite's technology is being misused by government clients, with the company failing to prevent such abuses. In a statement, Cellebrite emphasized it maintains a rigorous review process for misuse allegations and takes decisive action, including licence termination, when presented with credible evidence. However, they declined to comment on speculation, urging organisations to share specific concerns directly.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Amnesty International previously highlighted that the legal campaign against Mwangi, charged with unlawfully possessing ammunition related to street protests, appears part of a broader effort to intimidate lawful dissent. Mwangi was released on bond and faces ongoing court proceedings.

Global Implications and Non-State Actors

The report follows earlier findings by Citizen Lab, such as the use of FlexiSPY spyware on Kenyan film-makers' phones in police custody, linked to a BBC documentary on security force killings. Mwangi pointed to the role of non-state actors in enabling government surveillance, stating that providing access to spy on activists jeopardises lives. Similar abuses have been reported in Jordan, where Cellebrite technology allegedly targeted activists critical of Israel, as well as in Myanmar, Botswana, Serbia, and Belarus.

John Scott-Railton, a senior researcher at Citizen Lab, warned that phones hold the keys to individuals' lives, and governments should not access contents merely for dissent. He stressed that selling such technology to security services with abuse records puts journalists, activists, and conscientious speakers at significant risk.

The Kenyan police and embassy in Washington did not respond to requests for comment, leaving concerns about digital rights and surveillance in Kenya and beyond unresolved.

Pickt after-article banner — collaborative shopping lists app with family illustration