{"id":7725,"date":"2016-12-21T13:20:26","date_gmt":"2016-12-21T21:20:26","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=7725"},"modified":"2026-03-24T07:39:12","modified_gmt":"2026-03-24T14:39:12","slug":"vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/","title":{"rendered":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Original article published by\u00a0<strong>Vice Motherboard.<\/strong><\/em><br \/>\n<em>By Joseph Cox<\/em><br \/>\n<strong><em>This is part of a Motherboard mini-series on the proliferation of phone cracking technology, the people behind it, and who is buying it.<br \/>\n<\/em><\/strong><br \/>\nWhen cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After plugging the phone in with a cable, and a few taps of a touch-screen, the cops have now bypassed the phone\u2019s passcode. Almost like magic, they now have access to call logs, text messages, and in some cases even deleted data. State police forces and highway patrols in the US have collectively spent millions of dollars on this sort of technology to break into and extract data from mobile phones, according to documents obtained by Motherboard. Over 2,000 pages of invoices, purchase orders, communications, and other documents lay out in unprecedented detail how one company in particular has cornered the trade in mobile phone forensics equipment across the United States.<\/p>\n<p>Cellebrite, an Israel-based firm, sells tools that can pull data from most mobile phones on the market, such as contact lists, emails, and wiped messages. Cellebrite&#8217;s products can also circumvent the passcode locks or other security protections on many current mobile phones. The gear is typically used to gather evidence from a criminal suspect&#8217;s device after it has been seized, and although not many public examples of abuse are available, Cellebrite\u2019s tools have been used by <a href=\"https:\/\/theintercept.com\/2016\/12\/08\/phone-cracking-cellebrite-software-used-to-prosecute-tortured-dissident\/\" target=\"_blank\" rel=\"noopener noreferrer\">non-US authorities to prosecute dissidents<\/a>.<br \/>\nPrevious reports have focused on federal agencies&#8217; acquisition of Cellebrite tools. But as smartphones have proliferated and increasingly become the digital center of our lives, the demand and supply of mobile forensics tools has trickled down to more local bodies.<\/p>\n<p>Cellebrite has sold its wares to regional agencies in 20 states, and likely many more, according to the cache of documents acquired by Motherboard. Those items specifically include Cellebrite\u2019s range of Universal Forensic Extraction Devices (UFED); the typically laptop-sized or handheld devices for hoovering up data from phones. Some of the agencies note in the documents that they use the technology for legal searches of devices.<\/p>\n<p>Cellebrite does not publicly comment on its customers, and did not respond to a request for an interview on the company\u2019s US strategy.<\/p>\n<p>According to a spreadsheet detailing what models of phones Cellebrite can handle, the UFED can extract data from thousands of different mobile devices. It can\u2019t, however, extract the passcode on the iPhone 4s or above.<\/p>\n<p>\u201cWe use it for any and all crimes,\u201d Nate McLaren, Special Agent in Charge at the Iowa Department of Public Safety&#8217;s Cyber Crime Unit and Internet Crimes Against Children Task Force, told Motherboard in a phone call. \u201cAnywhere we think there might be a digital footprint or a digital fingerprint.\u201d<\/p>\n<p>To get a better idea of the extent mobile phone forensics technology has trickled down from the federal level, Motherboard filed public record access requests with state police forces and highway patrols in every US state, asking for records from 2010 to this year. Some agencies diverted the request to respective state Department of Public Safety or other similar institutions. Others declined to release the records, pointing to exemptions in local law; a few demanded excessively high fees for the documents to be released, and some did not respond to the requests at all. Some agencies only retained related records for five years, so provided those.<\/p>\n<p>In all, Motherboard has obtained documents from agencies in 20 states, including the Illinois State Police, Missouri State Highway Patrol, and Arizona Department of Public Safety. (The cache of documents is included at the end of this article, as well as spreadsheets created by Motherboard breaking down each agency&#8217;s expenditure.) As our investigation found, most of the agencies spent tens of thousands of dollars acquiring Cellebrite&#8217;s phone cracking and forensic UFEDs. Cellebrite sells several different versions of the UFED, which either comes as an actual device\u2014the UFED Touch, Ultimate, or Pro\u2014or a piece of software for a computer called UFED4PC.<\/p>\n<p>In short, there are two main ways Cellebrite\u2019s UFEDs extract data from devices: either in a logical form, or a physical form. \u201cLogical is what-you-see-is-what-you-get,\u201d Rene Novoa, senior manager at forensics company DriveSavers Data Recovery, told Motherboard in a phone call, referring to whatever data is immediately available on the phone. This likely includes messages, photos, or the information in databases generated by apps. Physical extraction, meanwhile, allows the retrieval of hidden or deleted material.<\/p>\n<p>Getting around many phone\u2019s passcodes is easy pickings for the UFED too. \u201cThat is sort of built into their product: We do have the ability to get past many passcodes,\u201d Novoa continued, referring to his own use of Cellebrite products. Once an investigator has broken into the phone, they can export chat messages in a conversation format and create PDF reports.<\/p>\n<p>According <a href=\"https:\/\/www.documentcloud.org\/documents\/3235503-Delaware.html#document\/p5\/a2\" target=\"_blank\" rel=\"noopener noreferrer\">to one memorandum<\/a> from the Delaware State Police Criminal Intelligence and Homeland Security Section, the UFED can be used with little to no training.<\/p>\n<p>But the vast majority of the agencies&#8217; expenditure went on renewing annual licenses for Cellebrite products. If police forces want to be able to pull data from the latest phones, they have to keep paying subscription <a href=\"https:\/\/drivesaversdatarecovery.com\/de-at\/drivesavers-pricing-and-recovery-costs\/\">costs<\/a> to the Cellebrite service. The Arizona Department of Public Safety spent around $110,000 over three years on these subscriptions alone. The Illinois State Police spent just over $45,000 on renewals, and the Iowa Department of Public Safety spent around $92,000.<\/p>\n<p>Some funds were used to trade-in one Cellebrite model for another, and to a lesser degree, some forces paid for extra training in how to use the forensics gear.<\/p>\n<p>Agencies also spent tens of thousands of dollars on other Cellebrite products,including Link Analysis, a piece of software that visualizes data pulled from phones into easy to understand graphs, allowing investigators to quickly map out relationships between multiple individuals&#8217; contacts, or a device\u2019s GPS location across time.<\/p>\n<p>Some agencies did buy equipment from other mobile phone forensics providers. There&#8217;s BlackBag, which has a particularly good reputation for extracting data from Apple devices.<a href=\"https:\/\/www.magnetforensics.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Magnet Forensics<\/a> was mentioned too, as well as <a href=\"https:\/\/paraben.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Paraben<\/a>.<\/p>\n<p>But the dominating provider throughout the documents was clearly Cellebrite, a company that still maintains <a href=\"https:\/\/theintercept.com\/2016\/10\/31\/fbis-go-hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">healthy relationships with phone manufacturers<\/a>, allowing them early access to products in order to find exploits.<\/p>\n<h2>Why Cellebrite?<\/h2>\n<p>Motherboard spoke to a half-dozen current and former members of the mobile forensics community about why they thought Cellebrite, which has been explicitly mentioned in episodes of <em>CSI:Cyber<\/em>, is so successful in the United States. Aggressive marketing, the ease of use of the product, and the range of phones that the company covers all came up multiple times.<\/p>\n<p>\u201cThey were always the flashy kid in class,\u201d Jonathan Zdziarski, a forensic scientist, told Motherboard in a phone call.<\/p>\n<p>\u201cThey made it portable. They made this thing where they can put it in the back of police cars,\u201d Jon Rajewski, director and principal investigator at the Senator Patrick Leahy Center for Digital Investigation, who has worked with law enforcement, told Motherboard in a phone call. \u201cThey made it point-and-click.\u201d<\/p>\n<p>Arguably, Cellebrite&#8217;s subscription model has also locked some customers into a buying cycle, where they simply have to keep paying the company so they can carry on breaking into phones.<\/p>\n<p>In talking about one contract, <a href=\"https:\/\/www.documentcloud.org\/documents\/3235503-Delaware.html#document\/p9\/a3\" target=\"_blank\" rel=\"noopener noreferrer\">a memorandum<\/a> obtained from the Delaware State Police reads that \u201cno other types of goods or service will satisfy the requirements of the agency and no reasonable alternative sources exist.\u201d And <a href=\"https:\/\/www.documentcloud.org\/documents\/3235523-Iowa-2.html#document\/p19\/a332476\" target=\"_blank\" rel=\"noopener noreferrer\">an email from the Iowa Department of Public Safety<\/a> reads, \u201cWe have no choice but to purchase these forensic systems from Cellebrite USA, Inc. direct.\u201d (Some forces did buy Cellebrite devices through resellers, however).<\/p>\n<p>As for other agencies, according to public records Cellebrite\u2019s US subsidiary has taken in over $2 million worth of purchase orders from the FBI since 2012. Other customers include the Office of the Inspector General, the Department of Homeland Security, and the Secret Service. Local police departments may have purchased Cellebrite devices as well.<\/p>\n<p>One reason for this proliferation of mobile forensics gear across the US, and not just specifically Cellebrite, may be linked to the country&#8217;s Regional Computer Forensics Labs, or RCFLs. These FBI-funded centres for extracting data from phones train local police too. One former FBI Special Agent with forensics experience told Motherboard that once these trained officers returned to their force, they took understanding of forensics technology with them. The agent requested anonymity as he was not authorized to speak to the press.<\/p>\n<p>\u201cThey would come in, they would do all the training, do their couple years, and then they would go back out into the field,\u201d the agent said. Instead of having to rely on RCFLs, which may have a massive backlog of devices to examine, agencies could just purchase their own gear.<\/p>\n<p>In <a href=\"https:\/\/www.documentcloud.org\/documents\/3235498-Colorado.html#document\/p3\/a2\" target=\"_blank\" rel=\"noopener noreferrer\">one 2012 document<\/a> from the Colorado State Patrol justifying the purchase of an UFED, Major M. Packard writes the force needs the device because \u201ccurrently, investigators are reliant upon partners in the FBI, ICE and DEA for access to this equipment.\u201d<\/p>\n<div class=\"article-scroll-wrapper\">\n<div class=\"article-content rich-text\">\n<p>But, perhaps the most simple explanation is that the number of smartphones that need to be analysed has shot up significantly, especially within the last four years, according to the former FBI agent.<\/p>\n<p>\u201cI would say a 100-fold increase in the amount of smartphones that we were running into and needing to process,\u201d he added.<br \/>\nNow, cybercrime units, child exploitation task forces, white collar crime centers, and ordinary highway patrol departments all use this technology, according to the documents obtained by Motherboard.<\/p>\n<p>A Public Information Officer from the New Mexico State Police told Motherboard in an email that the force uses Cellebrite devices to investigate everything from traffic accidents to homicides. An <a href=\"https:\/\/www.documentcloud.org\/documents\/3235523-Iowa-2.html#document\/p19\/a3\" target=\"_blank\" rel=\"noopener noreferrer\">email from the Iowa Division of Criminal Investigation<\/a>reads \u201cwe have an ongoing need for these forensic systems and use them every day in our criminal investigations.\u201d<\/p>\n<p>Zdziarski, the forensic scientist, put it this way: \u201cYou\u2019ve got cops and cruisers using it. The tools always trickle down.\u201d<br \/>\n<strong><em>The cache of documents obtained by Motherboard can be found <\/em><a href=\"https:\/\/www.documentcloud.org\/search\/projectid:30764-Mobile-Forensics-Document-Package\" target=\"_blank\" rel=\"noopener noreferrer\"><em>here<\/em><\/a><em>.<\/em><\/strong><\/p>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Original article published by\u00a0Vice Motherboard. By Joseph Cox This is part of a Motherboard mini-series on the proliferation of phone cracking technology, the people behind it, and who is buying it. When cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After plugging the&hellip;","protected":false},"author":30,"featured_media":48720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[51],"tags":[11461],"post_series":[],"class_list":["post-7725","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-coverage","tag-press-coverage","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-21T21:20:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T14:39:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech\",\"datePublished\":\"2016-12-21T21:20:26+00:00\",\"dateModified\":\"2026-03-24T14:39:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/\"},\"wordCount\":1711,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg\",\"keywords\":[\"press coverage\"],\"articleSection\":[\"Press Coverage\"],\"inLanguage\":\"de-AT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/\",\"name\":\"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg\",\"datePublished\":\"2016-12-21T21:20:26+00:00\",\"dateModified\":\"2026-03-24T14:39:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#breadcrumb\"},\"inLanguage\":\"de-AT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-AT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/de-at\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/","og_locale":"de_DE","og_type":"article","og_title":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech","og_url":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2016-12-21T21:20:26+00:00","article_modified_time":"2026-03-24T14:39:12+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Verfasst von":"Michelle West","Gesch\u00e4tzte Lesezeit":"8 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech","datePublished":"2016-12-21T21:20:26+00:00","dateModified":"2026-03-24T14:39:12+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/"},"wordCount":1711,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg","keywords":["press coverage"],"articleSection":["Press Coverage"],"inLanguage":"de-AT"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/","url":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/","name":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg","datePublished":"2016-12-21T21:20:26+00:00","dateModified":"2026-03-24T14:39:12+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#breadcrumb"},"inLanguage":"de-AT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/"]}]},{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2016\/12\/PC-VICE-MOTHERBOARD-US-STATE-POLICE-HAVE-SPENT-MILLIONS-ON-ISRAELI-PHONE-CRACKING-TECH-scaled-e1698929884477.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/vice-motherboard-us-state-police-have-spent-millions-on-israeli-phone-cracking-tech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Vice Motherboard: US State Police Have Spent Millions on Israeli Phone Cracking Tech"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Datenrettungsdienste","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-AT"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Datenrettung","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/de-at\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/7725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/comments?post=7725"}],"version-history":[{"count":2,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/7725\/revisions"}],"predecessor-version":[{"id":83541,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/7725\/revisions\/83541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/media\/48720"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/media?parent=7725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/categories?post=7725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/tags?post=7725"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/post_series?post=7725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}