IN Greece a caller contention has erupted implicit integer surveillance: arsenic it turned retired Reporters United, ΕΛ.ΑΣ. And ΑΑΔΕ use Israeli λογισμικό and hardware λύση UFED companies Cellebrite to extract information from mobile phones.
At archetypal glance, this whitethorn look similar a technical item from the world of integer forensics. In fact, the contented is overmuch much serious: authorities services summation entree to a tool that is susceptible of extracting messages, photos, videos, exertion data, geolocation and different idiosyncratic accusation from the phone. This whitethorn see information that the user considered deleted.
According to Reporters United, UFED doesn’t work similar spyware Predator oregon Pegasus: It does not infect the telephone remotely, but requires carnal entree to the device. But this does not marque the occupation immoderate little serious. If the telephone is successful the hands of authorities, the system tin beryllium used to extract information against the owner’s will.
What is known astir the use of UFED
UFED stands for Universal Forensic Extraction Device. This is 1 of the astir celebrated integer forensics solutions that is used to extract accusation from mobile devices. Company Cellebrite sells such tools to authorities agencies successful various countries, including instrumentality enforcement agencies.
According to the documents referred to Reporters United, ΕΛ.ΑΣ. has and maintains two systems UFED. In addition, successful 2021 And 2022 tobacco institution Παπαστράτοςsubsidiary structure Philip Morris Internationalconveyed ΑΑΔΕ And ΣΔΟΕ instrumentality Cellebrite: two systems UFED And Pathfinderdesigned for information analysis.
The specified possession of a integer forensic tool by constabulary oregon tax authorities is not unusual. In the combat against organized crime, smuggling, fiscal crimes oregon superior transgression cases, such technologies whitethorn beryllium necessary. But this is where the main question begins: who, when, with whose support and under what power gets entree to citizens’ idiosyncratic data?
“If you person thing to hide” is simply a unsafe trap
The astir convenient statement of supporters of total power has been heard for a agelong time: “If you person thing to hide, you person thing to fear”. This is, to enactment it mildly, weak logic. If it were true, radical would unrecorded successful houses with solid walls, nary curtains, nary idiosyncratic correspondence and nary closed doors. But for some reason, adjacent the astir ardent supporters of transparency are usually hesitant to start with their ain bedroom.
Each idiosyncratic has a idiosyncratic life, correspondence, aesculapian information, household conflicts, fiscal data, nonrecreational contacts and simply backstage weaknesses that are not intended for the state, boss, governmental hostile oregon tax inspector with a sudden involvement successful someone else’s telephone number.
That’s why there are privacy lawsjudicial procedures and rules of admissibility of evidence. In a rule-of-law state, accusation obtained successful violation of the instrumentality should not beryllium turned into an instrumentality of pressure. Otherwise, this is nary longer an investigation, but a integer hunt.
The main hazard is not technology, but deficiency of control
The occupation is not that the authorities has integer forensics tools. The occupation is that society does not person wide answers to basal questions. How often is it used? UFED? In what matters? On what grounds? Who approves entree to the phone? How is the process recorded? Who checks that the extracted information is not used extracurricular the specific case?
After the ungraded with Predator such questions cannot beryllium considered paranoia successful Greece. The state has already seen however the topic of surveillance of politicians, journalists and nationalist figures is becoming not a conspiracy theory, but the subject of parliamentary, judicial and planetary discussions. Therefore, the emergence of yet different almighty integer tool without sufficient transparency is inevitably alarming.
Organization Homo Digitaliswhose sentiment leads Reporters Unitedindicates that the authorities’ responses rise superior concerns regarding the hazard of uncontrolled oregon disproportionate entree to citizens’ data. This is precisely the bosom of the problem: technology tin beryllium a morganatic investigative tool, but without controls it rapidly becomes a means of coercion.
From probe to blackmail – 1 governmental step
The information of such systems is that the extracted information tin beryllium used not lone successful court. A modern person’s telephone is not conscionable a connection device. This is an archive of his life: correspondence, photographs, contacts, routes, finances, aesculapian applications, work documents, idiosyncratic conversations.
If entree to such an archive is successful the hands of a structure without transparent restrictions, there is simply a hazard of political, economical oregon idiosyncratic pressure. Journalist investigating corruption; an entrepreneur who refused to “agree”; an authoritative who does not want to enactment successful the scheme; a person retired of control—they tin each go vulnerable not due to the fact that of the crime, but due to the fact that of the magnitude of idiosyncratic accusation that tin beryllium used against them.
And present it is nary longer important whether this accusation will beryllium formally presented successful court. Sometimes a hint, a leak, a selective leak, oregon the menace of work is enough. A estimation tin beryllium destroyed faster than a idiosyncratic tin beryllium the source is illegal. This is however integer forensics becomes digital baton.
The soundlessness of the authorities lone increases suspicions
The astir alarming happening astir this story is the deficiency of a wide nationalist explanation. In a democracy, the use of such tools should beryllium accompanied by strict regulations, judicial review, entree logs, autarkic auditing and wide reporting. Not successful the “we bash everything according to the law, trust us” style, but with existent verification mechanisms.
When the state gains the quality to extract virtually each of a person’s idiosyncratic integer beingness from a phone, it should not beryllium annoyed by questions, but alternatively beryllium successful beforehand that maltreatment is impossible. Otherwise, citizens are offered the aged deal: springiness us your privacy, and we committedness not to misuse it. The committedness is wonderful, particularly if it is fixed by radical who, adjacent for mean parking, managed to physique a system of punishments alternatively of a system of solutions.
A abstracted contented is the root of the technology. Cellebrite is an Israeli institution whose solutions are used by authorities agencies astir the world. This does not marque the tool itself illegal. But when such systems travel into the hands of nationalist agencies, particularly done donations oregon opaque procedures, the nationalist has a close to cognize who gave the state such entree to information and under what conditions.
Editorial comment
History with UFED is unsafe not due to the fact that the constabulary person received technology for investigations. It is unsafe due to the fact that successful Greece trust successful power mechanisms has already been undermined. After the lawsuit Predator when the authorities were spying connected the absorption and journalists without ineligible grounds, it was hard for citizens to calmly perceive to explanations astir “legal use”if astatine the aforesaid clip there is nary transparency, nary autarkic oversight and nary factual answers.
The state has the close to combat crime. But citizens person the close not to unrecorded with the feeling that immoderate telephone tin go a source of compromising evidence, and immoderate idiosyncratic correspondence tin go worldly for pressure. Freedom of speech, autarkic journalism, governmental contention and entrepreneurship are intolerable where a idiosyncratic perpetually thinks not astir the law, but astir who and when tin unfastened his phone.
The question present is simple: UFED Is this an instrumentality of justness oregon different doorway into the grey zone of power? The reply depends not connected the capabilities of the program, but connected the rules of its application. If the rules are transparent, verifiable and subject to judicial review, it is forensic science. If not, this is nary longer a state of law, but a integer parastate with a very modern interface.










Greek (GR) ·
English (US) ·