Cutting Edge Cellebrite Forensic Tools Used by Law Enforcement

Best Practices for Mobile Security in BYOD
March 24, 2014
To our valued Montgomery County attorneys and their respective clients:
April 8, 2014
Show all

Cutting Edge Cellebrite Forensic Tools Used by Law Enforcement

Relaxing in your entertainment room, you watch on your flatscreen TV, as the incredible forensics team on CSI uses their even more incredible software to retrieve all of Sarah’s deleted emails, texts and internal application data from her cell phone, after figuring out her passcode. The results play across 3D displays in front of the actors.

“So, deleted is never really deleted, huh?”

“I keep telling you guys that, but nobody believes me.”

Cool software, but real life forensics doesn’t work like that, right?


The software used to show off the CSI team’s detection skills is available now at Cellebrite. It’s used by real life law enforcement and other forensic professionals, and you can use it too.

Cellebrite UFED Software Is Used by Law Enforcement

Law enforcement officers in the Michigan State Police already have Cellebrite units in the field, and this has garnered more than a little attention. It will be a bit odd when you get pulled over for speeding and the officer asks for your license, proof of registration and…. your cell phone.

The Cellebrite Universal Forensics Extraction device is also known as UFED. Police can use it to capture your phone’s passcode and any deleted data, including videos, phone book entries, images, text messages and call history.  They will also be able to access internal application data (just like they said on CSI), as well as the past SIM cards used in the device and the past lock code history.

This cutting edge tool is mobile, powerful and actually ahead of its time as far as law enforcement agencies are concerned.

Cellebrite and Bitdefender Deliver Comprehensive Malware Detection

Cellebrite and Bitdefender are working in a partnership to provide technological breakthroughs in mobile forensics. They are used by corporate security professionals and military forces in over 60 countries, as well as by police departments.

Mobile malware is ever increasing, and law enforcement warns about Blackberry® and Android™ cyber-attacks. The antimalware technology of Bitdefender is implemented in Cellebrite’s UFED Analyzer software. The software analyzes physical and file system extractions and provides a comprehensive malware report.

Their solution helps investigators in forensic examinations as they pinpoint whether malware was used to aid in the commission of a crime. Fraud investigators can see if malware was used to exploit credit card or bank account information, or to commit security fraud.

This solution also helps in providing a sense of security for victims of harassment or stalking. The mobile spyware tells law enforcement whether spyware is in use for the purpose of stalking or harassment. Security professionals can examine mobile devices for evidence that intellectual property or trade secrets were stolen.

The use of mobile devices is still on the increase, and there are challenges that result from tougher methods of encryption. More than one area demands the attention of professionals in mobile forensics.

As the mobile industry evolves further, it will become critical that law enforcement and businesses invest in the proper training methods, and ensure that their security budgets will allow for them to meet a growing demand for data extraction and device analysis, as noted in Business Wire.

The UFED developed by Cellebrite provides solutions on the cutting edge for file system, logical and physical extraction of passwords and data from many legacy and feature phones. UFED is also effective for tablets, portable GPS devices and smartphones.

The physical extraction capabilities extend to all the popular platforms in the world, including iOS, Blackberry®, Android™, Nokia®, Windows Mobile ®, Palm, Symbian and more. UFED can extract vital data for evidence, including phonebook entries, call logs, text messages, audio and video files, pictures and information including ESN, IMEI, IMSI and ICCID information, along with other information.