Cellebrite Advanced Services | Access And Collect Mobile Digital Evidence
Advanced Access & Collection

Cellebrite Advanced Services

Our experts provide law enforcement agencies with forensically sound, quick access to sensitive mobile digital evidence.

cas-lab

An Extension of Your Lab

We are a team of industry-leading experts with years of proven hands-on experience in law enforcement. We partner with you to overcome the toughest encryption mechanisms using cutting-edge, forensically sound methods taken directly from the Cellebrite Security Research Labs.

Located in 10 labs around the world, we help advance your most challenging cases wherever you may be.

Our Areas of Expertise

We partner with your investigative team to help solve the most complex, operational, technical and procedural forensic challenges.

  • fingerprint

    Advanced Lawful Access

    Determine or disable the Pin/Pattern/Password screen locks or passcodes on the latest Apple iOS and Google Android devices.

  • access-ti

    Advanced Collection

    Cellebrite makes the world's only decrypted physical extraction capability possible. Retrieve the full file system from all Apple and Android devices.

Start now

For more details about Cellebrite Advanced Services (CAS), and to learn if a particular model is supported, please complete and submit the form below.
Cellebrite Advanced Services are only available to law enforcement with legal authority to access phones.

cas-lab

Supported Devices

Data access and collection for the latest Apple iOS devices including all iPhone models (iPhone 4S to iPhone 12 ), iPad, iPad mini, iPad Pro, and iPod touch, running iOS 5 to iOS 14.7.1.

After-First-Unlock (AFU) access to locked iPhones up to iPhone 12, running iOS 11.3 to 14.3 (must keep device alive after seizure!)

Limitations may apply.

File-Based Encrypted (FBE) Android full file system extraction (Samsung Galaxy S10/S20/S21, Note 10/20, and all A Series (2019/2020/2021))
After-First-Unlock (AFU) data collection without needing to brute force complex passcodes (must keep device alive after seizure!)

Full-Disk Encryption (FDE) Android physical extraction (Samsung Galaxy S6/S7/S8/S9, A5/A7/A8, J1/J2/J3/J6/J7, Note 5/Note 7/Note 8/Note 9)


  • Brute force FBE and Secure Startup passcodes

  • Lawfully access, brute force, or disable screen lock passcode

  • Extract Samsung Secure Folder (Knox folder) to find evidence you may have overlooked



File-Based Encrypted (FBE) Android full file system extraction (Huawei P20, P30, Mate 20 and many others (2017 and newer))

After-First-Unlock (AFU) data collection without needing to brute force complex passcodes (must keep device alive after seizure!)

Full-Disk Encryption (FDE) Android physical extraction (Huawei P8 Lite, Mate 9, Nova 2, Nova 3, Y7, and many others)


  • Brute force FBE and Secure Startup passcodes

  • Lawfully access, brute force, or disable the screen lock passcode

  • Extract Huawei PrivateSpace to find evidence you may have overlooked

File-Based Encrypted (FBE) Android full file system extraction (Google Pixel / LG / Motorola / OnePlus / OPPO / Vivo / Xiaomi, etc.) for devices with Qualcomm and MediaTek processors
After-First-Unlock (AFU) data collection without needing to brute force complex passcodes (must keep device alive after seizure!)
Full-Disk Encryption (FDE) Android physical extraction (Alcatel, HTC, LG, Motorola, Nexus, Xiaomi, ZTE) for devices with Qualcomm and MediaTek processors


  • Brute force FBE and Secure Startup passcodes

  • Lawfully access, brute force, or disable screen lock passcode

  • Android Encrypted Container extraction to find evidence you may have overlooked