Cellebrite’s UFED, a Must for Forensic Investigators!

Thursday, April 19th, 2012

The digitalization has transformed the criminal enterprise to a high tech, stealthy, global organization. Identity theft, money laundering, fraud, theft of intellectual property, etc., are a few to add in a long list of crimes happening in web 2.0. Imagine if your friend is charged with money laundering which he/she is not committed. What if you could show electronic evidence that proves his/her innocence! Sounds interesting? Cellebrite’s UFED, a mobile forensic devise, gives investigators all the tools necessary to do job efficiently, with a full complement of accessories, cables, card readers and much more, plus powerful analyzing, extraction & reporting software that can be run from any PC.

With a rapid change in technology and advanced mobile devices, BlackBerrys, Androids, iPhones are some of the smart phone we use on daily basis to take photographs,send texts and emails, update Facebook, consult maps, search the web, and the list goes on. As we do this, however, our mobile devices often are quietly making records and generating evidence of all these activities. For better or for worse, this makes mobile devices perhaps the richest source of evidence about the people that use them.

However, one of the major issues is that, because the mobile device industry is still at nascent stage, a multitude of different operating systems, communications protocols, and data storage methods are in use, and more are being developed every day such as Apple’s iOS, Google’s Android, BlackBerry OS, Microsoft’s Windows Mobile, HP’s webOS, Nokia’s Symbian OS, and many others. What is the best solution then? Cellebrite’s UFED!


Why Cellebrite’s UFED?

A few exceptional and analyzing capabilities of the Cellebrite UFED standalone mobile forensic device:

  • Portable, fast and easy to operate, facilitates a truly untethered operation even in the most remote locations.
  • Performs physical, logical, user password and file system extractions.
  • IOS physical extraction, decoding & real-time decryption.
  • Gives access to internal application data.
  • Data extraction of hidden, existing and deleted data.
  • Android & GPS devices extraction and decoding.
  • Blackberry decoding.
  • Phone internal data including IMSI history, past SIM cards used, past user lock code history

In short, Cellebrite’s UFED is designed specifically for forensic investigators. Its best used for retrieving data ( deleted and non-deleted) from mobile phones, as the UFED forensic system empowers law enforcement, computer crime and investigations to capture critical forensic data and much more. The best part is it covers all major mobile OS: IOS, Android, BlackBerry, Symbian, Windows Mobile and Palm.

Cell Phone Forensics Today is Better Than Ever No Other Tool

Tuesday, April 15th, 2008

The recent developments in cell phone technology helped in development of Cell phone forensics as a great resource for forensic examiners and hi-tech crime investigators.

Forensics has the potential to provide a wealth of information by retrieving information with relevant format which includes deleted text messages, address book entries that you have deleted, Photographs that you have taken and deleted, dialed and received calls etc.

Today Cell phones became more advanced and sophisticated in being used for inappropriate usage. Investigators realized that there was a need to develop specific tools and process to search for evidence without affecting the information and introduced to get the file system and memory data helping the individuals, while Cell phones are becoming more like desktop computers functionally. Cell phones rely on flash memory for persistent storage designed to perform a predefined tasks using embedded software. The National Institute of Standards and Technology (NIST) is the one, which developed the guidelines in cell phone forensics.

Cell phone forensics has two methods in order to collect the data; one is logical method, which acquires files and directories from the file system of the flash memory. Secondly, we can get all data from bit-by-bit copy of entire physical memory using a low level access method. Cell phone forensics can be largely divided by memory forensics and SIM forensics. Mobile phone based on GSM/WCDMA telecommunication technology stores data such as phone book, SMS message and IMSI in SIM/USIM. So SIM forensics is required to extract data from the cell phone with memory forensics. In this process of SIM forensics, a user PIN will be demanded according to access condition of elementary file in which data is stored.

The types of tools available for Cell phone examination include commercial forensic tools, device management tools, open source tool; self developed tools, diagnostic tools and hacker tools. Forensic tools are typically designed to acquire data from internal memory of handsets and removable identity modules such as SIMS found in GSM. These forensic tools support full range of acquisition and reporting functions to acquire device contents.

This secure forensics is the best solution which provides law enforcement, corporate security with logical data extraction of the content stored in the Cell phone. Investigators can now gain access to vital information in seconds without the need to wait for crime reports. For more information on forensics, visit www.Datatriage.com one of the best leading experts in the cell phone forensics field.