Lawful access to digital evidence on a device, either through consent or a wa...
Account package is an export file in .ucae format that contains user credentials, tok...
In digital forensics, acquisition is the process of collecting forensically justifiab...
Relevant insights that directly impact an investigation by identifying critic...
This cable is 150 cm in length and allows for the easy and accessible placement of th...
When extracting a rooted device, the operating system version is not a limitation and...
ADB (Android Debug Bridge) is a built-in communication mechanism originally designed ...
The Additional Report Field helps the digital examiner add, delete or choose ...
Advanced ADB refers to a physical extraction method, where ADB is used to fac...
The Advanced ADB (Generic) process is similar to the ADVANCED ADB mentioned h...
Advanced Logical Extraction is an extraction method that combines both the lo...
Choose between “Any of these terms” or “All of these terms” as search...
The meaning of AFU (After First Unlock) iPhone is that the device has been un...
The functional areas and departments within an agency (field, station, and lab operat...
Airplane mode, Offline mode, or Standalone mode are settings that when activa...
In a situation where an officer doesn’t have access to a Faraday box or bag...
Allocated Space is the area on a device’s memory that stores data in an org...
Android Backup supports Android devices running OS version 4.1 and later.It...
The Android Backup APK Downgrade Extraction method focuses on specifically su...
Specifies how apps and firmware on a mobile device should interact with one a...
APK is an Android application package file.Each Android application is comp...
AppGenie is a heuristic engine that can perform automatic analysis of any app...
Apple File Conduit is a service that is used by computer applications such as...
Apple ID is an authentication method used by Apple for iPhone, iPad, Mac and ...
Some applications may utilize their own encryption or obfuscation to secure t...
Cryptocurrency ATMs facilitate the conversion of physical cash into cryptocur...
Supports all file types of lab submission attachments, such as Legal Authority / Scop...
A chronological digital record of all interactions of stakeholders and platfo...
The system constructs digital persons based on their identifiers. For example, when u...
A social media profile that you can use to extract public data.Note: Avatar...
Before First Unlock devices are those that have been turned off or rebooted a...
The term BFU (Before First Unlock) Android extraction refers to devices that ...
The term BFU (Before First Unlock) Extraction refers to devices that have bee...
BFU (Before First Unlock) iPhone relates to devices that have been turned off...
A small piece of code that is inserted into the RAM during start-up.In the ...
A device that cannot function in any capacity (such as a device with damaged firmware...
Basic service set identifiers (BSSID) are used to describe sections of a wire...
Temporarily unlocks the screen (one-time).This action allows a single and i...
CAID sources images from police and NCA. Images are assigned unique identifiers – c...
CDRs are cellphone and cell tower data logs that can be leveraged in a digita...
Memorializes the “contract with the customer” creating a countersigned Submission...
Decodes additional location data from unallocated space and unsupported datab...
The process of finding data contained within the hexadecimal code, apart from...
Enable the Cases discovery tool to sync cases and/or evidence from another da...
The administration and control of evidence related to an event, which is used to ...
Software designed to document a case investigative lifecycle and make case informatio...
These networks connect using different methods to allow multiple callers acce...
Call Detail Record (CDR) files refers to evidence provided directly by mobile...
Software designed to extract, analyze and decode data from a range of mobile devices ...
Cell Phone Forensic Software for Law Enforcement, also known as Cell Phone Forensic S...
Cell Phone Forensic Software focuses on the collection of data from cell phon...
Cell Phone Forensics Tools are part of a highly disciplined and scientific process th...
Cellebrite Advanced Services (CAS) offers customers the ability to recover valuable evidence from heavily damaged, locked, or encrypted devices.
Is a division of Cellebrite Services that offers advanced digital forensic la...
Cellebrite delivers the world’s leading software suite to manage Digital Intelligen...
Is an agencies’ current level of ability to master both technological capabilities ...
Is an interactive, online tool for agencies to self-identify the level of their curre...
Are the four potential placements on the DI Readiness Matrix. These include the matur...
Help you achieve your investigative and intelligence mission of gaining trusted insig...
Allow first responders to collect digital evidence at the crime scene and feed those ...
Allow investigators and agency heads to gather intelligence, respond to incidents, ma...
Access the most devices/sources of digital data and applications and enable digital f...
Eliminates the time-consuming and manual review of digital data. It is a force multip...
Delivers access to all iOS and high-end Android devices to unlock and extract crucial mobile device evidence.
Provides advisory, consultative, and technological support for agencies on their jour...
Enables users to deploy extraction capabilities on Windows based tablets, laptops, an...
The Cellebrite UFED kit contains the Quantum Link (device adapter) that attac...
Enables the simplified extraction of mobile device data. Depending on the license pur...
Cellphone encryption has become an important part of everyone's daily life.Most, if...
A chain is a set of plug-ins grouped together, which is used to process the e...
The Chain Manager option in Physical Analyzer displays the Chain Manager window. It a...
In digital forensics, chain of custody refers to the chronological documentat...
The Chats view surfaces conversation topics. Much like Cellebrite Pathfinderâ...
Child abuse material includes forums and sites operating on the dark web whic...
Obtain data straight from the mobile deviceâs memory chip. The chip is deta...
A client is used during logical extractions. The client is a very small appli...
Cellebrite UFED Cloud allows you to lawfully extract, preserve and analyze pu...
Not specific to Law Enforcement Agencies but can be raised as part of their s...
This category represents the received value from the issuance of new coins....
Operated by dispatch centers and 911 operators for data management, intake, & pri...
Gain insight into a person of interestâs map of connections leveraging the ...
Cookies are basically text files that are saved to a user's device (computer,...
Darknet markets are commercial websites that operate on the dark web, which c...
Cellebrite Physical Analyzer can utilize external data sources, provided by C...
This option in Physical Analyzer can be used by the digital examiner to adjus...
A data source is a location or system from which data can be retrieved. It ca...
The process of ensuring that the data quality and inventory from an extraction is cor...
Decentralized exchanges are services that facilitate cryptocurrency and token trades ...
The process of translating raw hexadecimal data into an easily readable forma...
âDecodingâ refers to the conversion of unstructured data into structured data. â...
The process of identifying similar data across multiple devices and datasets and cons...
Decrypt WhatsApp Database refers to the process of unlocking the encrypted da...
This process is designed for Android devices that have Qualcomm chipsets. Thi...
Deleted data may sometimes be recoverable depending on the level of extractio...
In case of a drained or absent battery, the device power-up cable powers the device i...
Digital Forensics and Incident Response (DFIR) is a quickly developing area that call...
Dictionary files are generated over time, by learning and suggesting changes ...
The process of using technology to lawfully collect digital artifacts from devices (b...
When the digital investigation workflow becomes clogged with devices and massive volu...
Digital data can be extracted in three ways: physical extraction, logical extraction,...
ÂA digital device is any kind of electronic equipment that stores, processes, tran...
Digital forensic examinations involve the recovery and analysis of evidence from a di...
With the increasing use of technology, almost all criminal activity has a dig...
ÂThe digital administration and control of evidence related to an event used to pr...
The process of exchanging digital data that can be used as evidence in cases....
Digital forensicsâthe process of extracting, analyzing, and decoding digita...
ÂDigital forensics is a branch of forensic science encompassing the recovery and i...
A Digital Forensics Blog serves as a valuable platform for digital investigat...
A Digital Forensics Company plays a critical role in modern-day investigation...
ÂDigital forensics examination tools are pieces of software and physical devices t...
A Digital Forensics Podcast serves as a dynamic and informative platform that empower...
A Digital Forensics Webinar is a powerful tool that equips digital investigat...
Digital intelligence is critical to make digital data accessible for integration with...
The steps a customer must take to implement their DI strategy based on their individual pain-points and current/future needs.
Encompasses staff talent, professional development, collaboration, and measurement ne...
Two pillars for accessing/collecting the digital evidence and managing/investigating the case.
Hardware or software technology that enables the access, extraction, and analysis of digital data to solve an investigation.
The solution framework defined by understanding where agencies are in their journey a...
Technology stacks consisting of existing tools and systems in the field, at the inves...
An agenciesâ process of accelerating their DI Readiness to adapt and adjust to modern developments and digital challenges.
The monitoring, supervision, and control of the sequential events surrounding digital evidence from the investigation scene to the courtroom.
Allows first responders and investigators to access, selectively extract, and analyze data from digital devices at the crime scene.
Disables passcode requirement for screen unlocking.After this action, the examiner ...
Is a software copy protection device that plugs into the USB port of the comp...
Dust refers to the fractional values of a unit of cryptocurrency. These values often ...
EDL (Emergency Download Mode) is a special boot mode in Qualcomm Android phon...
Captures detailed records of each action and transaction involving a piece of evidenc...
Enterprise-ready cloud deployment refers to a software and services model tha...
Electronic Serial Number; Found on CDMA devices and is 11 digits in length and contains both letters and numbers.
Registered activity of any kind, including: Files, SMS, Instant Messages, pho...
Options to complete manual audits by selecting an evidence storage location or by aut...
Evidence management refers to how evidence is handled by relevant law enforcement sta...
Exchanges allow users to buy, sell, and trade cryptocurrency.They represent...
Files used to capture forensic evidence from mobile devices. This includes mobile pho...
The process of obtaining mobile device data and storing it in an approved loc...
ÂApple introduced encryption to iOS devices with the iPhone 4S in 2013. Since then...
Use faceted filters to âslice-and-diceâ the data and explore your c...
File Based Encryption refers to a method where every file on the partition ha...
File System in Physical Analyzer refers to the high-level reference to the co...
Extracts files embedded in the memory of a mobile device. Retrieve the artifa...
File system extraction is a type of forensic analysis that involves extractin...
Certain file types are identified and tagged in the extracted data. There are...
Physical Analyser has built-in tools for viewing many native file types such ...
Newer mobile devices have a fingerprint sensor built into the home button. Th...
ÂFISMA, or the Federal Information Security Management Act, is a United States leg...
Forensic Acquisition Tools, also known as forensic acquisition solutions or f...
Forensic Examination Tools, also known as forensic examination solutions or forensic ...
This extraction method will perform a physical extraction while the device is...
Extracted data is said to be forensically sound if it was collected, analyzed...
Financially motivated shops selling different types of data including, PII (P...
Full Disk Encryption refers to the entire partition being encrypted with the ...
In the field of digital forensics, Full File System Extraction (FFS) stands a...
The process of organizing structured and unstructured data in a coherent way ...
Fuzzy Model Plugin helps identify and parse databases commonly associated wit...
This settings option within Physical Analyzer lets the examiner adjust option...
The distance calculated between points which are defined by geographical coor...
The Global Positioning System (GPS), is a satellite-based radio navigation sy...
The Graphics Processing Unit (GPU) is a specialized processor that can rapidl...
GSM is an international telecommunications standard for the transmission of voice and data between cell phones and other mobile devices.
The Guardian Examiner Portal provides an optimized workflow for the lab through the a...
The Investigator Portal allows an investigator to create a submission of new evidence...
Upload hash databases to compare them against the hash values in your cases. ...
Hashing is a one-way cryptographic algorithm performed on data that results i...
This option in Physical Analyzer lets the digital examiner set various option...
A high-risk exchange is an exchange that meets one of the following criteria:...
The high-risk jurisdiction category comprises cryptocurrency services that ar...
Hosted wallets are an alternative to core wallets (full node wallets).Walle...
File system extraction is a type of forensic analysis that involves extracting data f...
An Integrated Circuit Card Identifier is a GSM identifier.Cellebrite UFEDÂ...
A unique ID associated with a person, e.g., a phone number, social media prof...
Individuals and/or organizations that operate directly or indirectly in vario...
As part of the decoding process, UFED Physical Analyzer can calculate hash va...
Upload an image or select one from within the digital evidence, and the syste...
International Mobile Equipment Identifier. GSM identifier.Cellebrite UFEDÂ...
IMEI Forensics relates to IMEI (International Mobile Station Equipment) numbers which...
International Mobile Subscriber Identity. GSM identifier.Cellebrite UFEDÂâ...
The Infrastructure as a Service category comprises all infrastructure surroun...
An ICO (Initial Coin Offering) is a means of crowdfunding for new cryptocurre...
InteractionC is a database, common to apple devices that tracks the interacti...
A hybrid solution that streamlines all investigative workflow processes acros...
Uses artificial intelligence (AI)âdriven solutions in the lab during an investigati...
In Cellebrite Pathfinder you can prepare an investigative report to summarize...
An investigative workflow is a set of steps or processes that investigators f...
Automate and remain compliant with the agency fee schedule and invoice generation bas...
The process of extracting and analyzing data from iPhones to retrieve potentially inc...
Different from retina scans, an iris scan is a form of biometric identificati...
A jailbroken iOS device or a rooted Android device is one whose owner has tak...
JTAG (Joint Test Action Group) is an advanced method of data extraction that ...
The user taps certain locations on the screen in a certain order to gain acce...
The knowledgeC database stores an event log of multiple processes that run within an ...
Tools dedicated to lab managers, either digital forensic or traditional. These allow management and tracking of evidence and processes.
This intuitive dashboard provides examiners, reviewers, and lab managers with the dat...
Last Backup Computer Name is the Name/ID of the computer on which the device ...
Integrated Circuit Card Identifier(19-20 characters) refers to the unique ser...
The process of overcoming barriers to data contained on a device. This can be...
Lending Contract is one of the biggest uses for smart contracts and DeFi (Dec...
An indication of communication based on single or multiple communication even...
Location data is data stored within the mobile device from different sources ...
Critical data based on specified, provided criteria. Example: How many weapons and wh...
Produces a copy of logical data existing on the device, and is normally acces...
The term Logical Extraction Forensics is usually used in digital forensics to indicat...
MAC Address is a media access control address that functions as a unique identifier a...
Physical Analyzer opens the Malware Scanner sub-menu, from where you can run ...
Advanced file processing of JPG, NEF, and TIFF - all formats. Metadata is decoded and...
Track a suspectâs whereabouts, find case related hotspots, and establish meetings, ...
Markers signify the location where a person's device was registered.The col...
Cellebrite Pathfinder recognizes when a media file contains a media analytics...
Mobile Equipment Identity (MEID) is the CDMA equivalent of the International ...
Merchant services are authorized ï¬nancial services that enable businesses t...
Mobile ID Number (MIN) is often compared to the International Mobile Subscrib...
Mining is the process by which cryptocurrency is generated.Mining is used f...
Mining pools are special services where miners can pool their resources - typ...
Mixers are websites or software used to create a disconnection between a user...
Mobile Forensics is the process of accessing, recovering and analyzing digital eviden...
Mobile Forensics Software is used to access, recover and analyze digital evid...
Mobile Forensics Tools are used for accessing, recovering and analyzing digital evide...
The Model option in Physical Analyzer lets the digital examiner choose colors...
Mobile Station International Subscriber Dialing Number. This is a GSM identif...
The MSISDN (Mobile Station International Subscriber Directory Number) aims to convey ...
A MultiSIM Adapter is a small-size adaptor that enables reading, data extract...
Optical Character Recognition is a tool used to extract text from images cate...
Allows the examiner to follow the laboratory workflow. The system includes prebuilt w...
A digital data repository, typically for multimedia (e.g., video), enables the retent...
This category is used when the entity does not represent a widely popular ï¬eld of o...
The owner of the device that is the subject of the investigation.Ever...
Peer-to-peer (P2P) exchanges are online sites that facilitate the buying, sel...
Parsing is the process of taking the readable data (after any necessary decod...
Extracts a copy of certain available files.In the iOS context, this produces an iTu...
Participants in a conversation. For example, communications such as instant messaging, emails, etc.
Persons are the digital persons compiled from the identifiers in the case evidence. T...
Phone Forensic Software is used to access, recover and analyze digital evidence in a ...
Phone Forensics Software refers to specialized tools designed to extract, ana...
Forensic Phone Software is used to access, recover and analyze digital eviden...
Photo DNA is a Microsoft-developed technology that is used to detect and stop the pro...
Produces a low-level bit-by-bit copy of the phoneâs storage device (flash m...
Physical extraction forensics relates to a more complex type of extraction than logic...
The plug-ins menu option in Physical Analyzer allows the user to add/remove p...
The area in UFED Physical Analyzer that displays the extracted information st...
An ecosystem of information and data sharing between domestic and internation...
Tracking and management of physical property taken into the custody of law enforcemen...
Protocol privacy applies to the two shielded pools built into the Zcash block...
Cellebrite Physical Analyzer lets you work interactively with the Python shel...
Automate daily activities by replacing manual data entry with scannable barcodes for ...
Qualcomm Emergency Download Mode (EDL) is a special boot mode in the companyâ...
Ransomware is special malware designed to encrypt a victim's computer data an...
Reconstructs webpages, from cache files. You can view websites content offline with content from the browser cache (when available).
An agency-wide system of record that documents incidents and the related agency activ...
Authorized users of Cellebrite Pathfinder can tag events containing sensitive...
A report of selected analyzed data that can be generated by Physical Analyzer...
The Report Defaults option within the general settings in Physical Analyzer l...
A process that allows users of cell phones and other devices running the Andr...
Scams can impersonate a variety of services, including exchanges, mixers, ICO...
Secure evidence management is the administration and control of evidence related to a...
Selective Extraction Forensics, as its name suggests, is the science and proc...
Enables smooth collaboration with all relevant stakeholders (Intra-Agency and Inter-A...
Signature databases are structured sets of collected signatures from a group of indiv...
A subscriber identity module or subscriber identification module (SIM), widel...
This method is designed for Android devices that include the âNovember 2016...
Some cryptocurrency types have built-in functionality for smart contracts.S...
Trusted locations leave the device unlocked for up to four hours when it is t...
Smartphone Forensics Tools are part of a highly disciplined and scientific process th...
A database file format often used for data storage.Commonly used for the st...
Visually decode additional data from databases, particularly from unfamiliar ...
The state of a file indicates whether it is intact, deleted by the user, or h...
Stolen funds comprise instances of hacked exchanges and services.Attackers ...
A wizard-driven process guides the user step-by-step through the evidence submission ...
The Type Allocation Code (TAC) is the initial eight-digit portion of the 15-digit IME...
A digital investigator can apply a tag to flag events for future reference. E...
Work is reviewed, best practices are followed, and compliance is met. Technical Revie...
Forensic narrative reports automatically include most of the necessary information, s...
Terrorist ï¬nancing pertains to the funding of designated terrorist groups a...
Text analytics is the process of analyzing the data to extract relevant infor...
Timeline Graph is an illustration of analyzed data in chronological order, re...
The Timestamp feature in Physical Analyzer is used to refer to the exact time...
Tokens are blockchain-based assets that can be sent and received using a wall...
TOM TOM refers to GPS devices that can be used independently of any mobile de...
Topic identification is the cutting edge of textual analysis. Building on Tex...
Trace Window is an option available within the Physical Analyzer under the â...
This category refers to any value sent by the entity that is later received b...
This option in Physical Analyzer helps the examiner to examine or analyze dat...
Referred to as two-step verification or dual-factor authentication, is a security pro...
Types of data used to categorize events. Extracted digital forensic data can ...
Once the logical file system and physical extractions are complete, UFED gene...
Universal Forensic Extraction Device ReportCellebrite UFEDÂâ The Industry Standard for Lawfully Accessing and Collecting Digital Data
The UFDR Web Viewer intuitive user interface provides a view into data collected from...
UFED generates a UFDX file when there are multiple extractions for a device. ...
Universal Forensic Extraction Device.Cellebrite UFED â The Industry Standard for Lawfully Accessing and Collecting Digital Data.
The UFED Chinex kit is the solution to complete a physical extraction and decoding of...
The UFED kit includes connection cables and tips. These are used to connect m...
A multi-format card reader that provides either read-only or read-write acces...
A ruggedized mobile forensic solution, purpose-designed for users to perform ...
Removes theÂiPhone is DisabledÂmessage to enable screen unlocking.Usually...
The area on a deviceâs memory outside the defined file system that is avail...
This category refers to currently unidentiï¬ed clusters that show the behavi...
This category refers to a sent value that is held in balances that are not pa...
This category represents the indirect exposure from the most recent transfers...
Allows the administrator to categorize users, which authorizes user-specific levels o...
During the validation stage, UFED Cloud checks the validity of the credential...
The Virtual Analyzer enables you to view your data as if you were using the o...
Voice lock is a mobile phone feature where the user speaks to unlock the device, so t...
A list of keywords used to comb data for important and relevant information. ...
Web Bookmarks refer to the web searches saved or bookmarked by the user.Cel...
Web History refers to the browsing history or the list of searched-for/visite...
By clicking this option under Help in Physical Analyzer, you can get a Zip fi...