DFU Talks

The latest series from Cellebrite covering everything from the basics of building a Digital Forensics Unit (DFU) to detailed strategies to tackle specific aspect of digital investigations. Technology and the nature of crimes are ever-evolving so don’t just keep up—stay two steps ahead.

Analyzing Android

  • Latest Installment

    Part 3: Open-Source Ecosystem and On-Device Location Data

    Explore the Android features and best practices that improve the impact of your digital forensics investigations. In the final installment of DFU Talks: Analyzing Android, Jared Barnhart and Josh Hickman talk about how Android’s open-source nature makes investigations easier. Also, learn how Google’s on-device location history provides you with comprehensive data for your investigations.

  • Part 2: Rooting Android and the Digital Wellbeing App

    Discover how to gain better insights into the Android devices you’re working with. In this second installment of DFU Talks: Analyzing Android, Jared Barnhart and Josh Hickman discuss the ease of rooting Android and its limitations. Plus, learn about the wealth of user behavior data you can get from the Android Digital Wellbeing app.

    There’s another episode to come and be sure to catch all three to get your cheat sheet at the end!

  • Part 1: Code Search and Unknown Trackers

    Uncover the secrets of Android artifacts and their crucial role in investigations. In this first installment of DFU Talks: Analyzing Android, Jared Barnhart and Josh Hickman discuss the importance of the Android Code Search Repository in identifying new codes. Also, learn how the personalsafety_db file keeps track of AirTags and other Bluetooth trackers following a device.

    We have more episodes to come and be sure to catch all three to get your cheat sheet at the end!

Analyzing iOS

  • Part 1: iOS Intents

    Uncover the hidden world of iOS artifacts and the crucial role these digital traces play in investigations. In this first instalment of DFU Talks: Analyzing iOS, Jared Barnhart and Ian Whiffin showcase app intents and Photos.sqlite and how they reveal user behavior and device usage patterns.

  • Part 2: iOS: Harvested Data and Predicted Activity

    Don’t let inexact or misleading location data affect your investigations. In this second installment of DFU Talks: Analyzing iOS, Jared Barnhart and Ian Whiffin talk harvested data and predicted activity—and what to watch out for to prevent inaccurate outcomes. Learn about how user behavior can affect the accuracy of location data too.

  • Part 3: iOS: Top Files

    Explore two important treasure troves of information on iOS devices that can wield more impactful evidence. In the final installment of ‘Analyzing iOS’, Jared Barnhart and Ian Whiffin dive into the ‘hearts’ of iOS—Biome and KnowledgeC—and explore the wealth of data you stand to gain and leverage for stronger cases.

    Bonus: Get an exclusive cheat sheet that covers the full three-part series.

Cellular Tech Terms

  • Part 1: Acquisition Terms

    Learn key device acquisition terms and start building the foundation you need to see exponential results in your examinations. Join Jared Barnhart as he dives deep into key terms and provides crucial insights you can easily leverage!

  • Part 2: Cellular and Wi-Fi Terms

    Learn more key terms to strengthen your digital forensics foundation—this time pertaining to cellular and Wi-Fi. Join Jared Barnhart as he dives deep into key cellular and Wi-Fi terms and provides crucial insights you can easily leverage!

  • Part 3: Analysis and Reporting Terms

    Gain crucial terms to strengthen your digital forensics foundation—this time pertaining to analysis and reporting. Join Jared Barnhart in the third part of this miniseries as he dives deep into associated top terms and provides leverageable insights.

DFU Best Practices

  • Part 1: Device Collection

    Uncompromised investigations begin with a meticulous device collection process. Watch as Jared Barnhart dives into precise strategies for documenting collections, preserving physical evidence, managing device states, and safeguarding data integrity in the latest installment of DFU Talks.

  • Part 2: Mobile Device Forensics Extractions

    Jared Barnhart explores methodologies and crucial steps in mobile device extractions. Discover his expert-guided practices for precise data extraction, covering device identification, data verification, and more. Elevate your forensic procedures with this latest DFU Talks installment designed to ensure data integrity and streamline your extraction process.

  • Part 3: Analysis Best Practices

    From essential pre-analysis preparation to nuanced methodologies, Jared Barnhart offers a deep dive into the world of device analysis in this latest installment of DFU Talks. Discover key insights to help you get the best outcomes out of your digital examinations.

  • Part 4: Reporting Best Practices

    Break through the complexities of digital forensics reporting and ensure heightened precision. In the final part of our DFU Best Practices miniseries, join Jared Barnhart as he dives deep into key insights, considerations and strategies—from preparation to testifying—to boost your reporting quality and capabilities.

Starting a Digital Forensics Lab

Tips for Establishing a DF Lab

As digital evidence becomes increasingly pivotal in law enforcement investigations, a dedicated digital forensics lab and understanding how to properly establish one is becoming essential. But where do you start? Watch as Jared Barnhart along with special guests Christopher Collins (Detective Sergeant, Lake Jackson PD) and Jesse Lindmar (Forensic Scientist Section Supervisor, Virginia DFS) delve deeper.

Mobile Forensics: Preparing for the Courtroom

  • Part 1: Mobile Forensics Evidence

    In the first part of our Preparing the Courtroom episode, discover how to lawfully access and extract mobile forensics evidence—and present the data to the court in a manner that is precise, simple, and concise.

  • Part 2: Explaining Timestamps and Time Zones in Mobile Forensics

    In mobile device forensics, a key priority is gaining detailed understanding of timestamps and their associated time zones. This knowledge plays a critical role in ensuring accurate event sequencing, especially in cases involving multiple time zones—increasing the reliability of investigations.

  • Part 3: Mobile Forensics: Reporting and Talking to a Jury

    In a courtroom setting, it’s crucial that the jury easily understands the digital evidence at hand. In the final part of Preparing for the Courtroom, Cellebrite’s Digital Intelligence Specialist Jared Barnhart provides a strategic approach to ensure that complex information is presented in a clear and compelling manner.

Bonus: Download an exclusive cheat sheet after watching each video.

For more information on Cellebrite solutions, get in touch with us.

Mobile Forensics Evidence



In the first part of our Preparing the Courtroom episode, discover how to lawfully access and extract mobile forensics evidence—and present the data to the court in a manner that is precise, simple, and concise.

Bonus: Download an exclusive cheat sheet after watching the video.

For more information on Cellebrite solutions, get in touch with us.

Get in Touch