Displaying page
  Lawful access to digital evidence on a device, either through consent or a wa...
Read full term
Account package is an export file in .ucae format that contains user credentials, tok...
Read full term
  Relevant insights that directly impact an investigation by identifying critic...
Read full term
This cable is 150 cm in length and allows for the easy and accessible placement of th...
Read full term
When extracting a rooted device, the operating system version is not a limitation and...
Read full term
ADB (Android Debug Bridge) is a built-in communication mechanism originally designed ...
Read full term
  The Additional Report Field helps the digital examiner add, delete or choose ...
Read full term
  Advanced ADB refers to a physical extraction method, where ADB is used to fac...
Read full term
  The Advanced ADB (Generic) process is similar to the ADVANCED ADB mentioned h...
Read full term
  Advanced Logical Extraction is an extraction method that combines both the lo...
Read full term
  Choose between “Any of these terms” or “All of these terms” as search...
Read full term
  The meaning of AFU (After First Unlock) iPhone is that the device has been un...
Read full term
The functional areas and departments within an agency (field, station, and lab operat...
Read full term
  Airplane mode, Offline mode, or Standalone mode are settings that when activa...
Read full term
  In a situation where an officer doesn’t have access to a Faraday box or bag...
Read full term
  Allocated Space is the area on a device’s memory that stores data in an org...
Read full term
  Android Backup supports Android devices running OS version 4.1 and later. It...
Read full term
  The Android Backup APK Downgrade Extraction method focuses on specifically su...
Read full term
  Specifies how apps and firmware on a mobile device should interact with one a...
Read full term
  APK is an Android application package file. Each Android application is comp...
Read full term
  AppGenie is a heuristic engine that can perform automatic analysis of any app...
Read full term
  Apple File Conduit is a service that is used by computer applications such as...
Read full term
  Apple ID is an authentication method used by Apple for iPhone, iPad, Mac and ...
Read full term
  Cryptocurrency ATMs facilitate the conversion of physical cash into cryptocur...
Read full term
Supports all file types of lab submission attachments, such as Legal Authority / Scop...
Read full term
  A chronological digital record of all interactions of stakeholders and platfo...
Read full term
  A social media profile that you can use to extract public data. Note: Avatar...
Read full term
  Before First Unlock devices are those that have been turned off or rebooted a...
Read full term
  The term BFU (Before First Unlock) Android extraction refers to devices that ...
Read full term
  The term BFU (Before First Unlock) Extraction refers to devices that have bee...
Read full term
  BFU (Before First Unlock) iPhone relates to devices that have been turned off...
Read full term
  A small piece of code that is inserted into the RAM during start-up. In the ...
Read full term
A device that cannot function in any capacity (such as a device with damaged firmware...
Read full term
  Basic service set identifiers (BSSID) are used to describe sections of a wire...
Read full term
  Temporarily unlocks the screen (one-time). This action allows a single and i...
Read full term
  CDRs are cellphone and cell tower data logs that can be leveraged in a digita...
Read full term
Memorializes the “contract with the customer” creating a countersigned Submission...
Read full term
  Decodes additional location data from unallocated space and unsupported datab...
Read full term
  The process of finding data contained within the hexadecimal code, apart from...
Read full term
  Enable the Cases discovery tool to sync cases and/or evidence from another da...
Read full term
  The administration and control of evidence related to an event, which is used...
Read full term
  These networks connect using different methods to allow multiple callers acce...
Read full term
  Call Detail Record (CDR) files refers to evidence provided directly by mobile...
Read full term
Cell Phone Forensic Software focuses on the collection of data from cell phones and o...
Read full term
This is software that focuses on the collection of data from cell phones and other mo...
Read full term
Cell Phone Forensics Tools are part of a highly disciplined and scientific process th...
Read full term
  Is a division of Cellebrite Services that offers advanced digital forensic la...
Read full term
Cellebrite delivers the world’s leading software suite to manage Digital Intelligen...
Read full term
Is an agencies’ current level of ability to master both technological capabilities ...
Read full term
Is an interactive, online tool for agencies to self-identify the level of their curre...
Read full term
Are the four potential placements on the DI Readiness Matrix. These include the matur...
Read full term
Help you achieve your investigative and intelligence mission of gaining trusted insig...
Read full term
Allow first responders to collect digital evidence at the crime scene and feed those ...
Read full term
Allow investigators and agency heads to gather intelligence, respond to incidents, ma...
Read full term
Access the most devices/sources of digital data and applications and enable digital f...
Read full term
Eliminates the time-consuming and manual review of digital data. It is a force multip...
Read full term
Delivers access to all iOS and high-end Android devices to unlock and extract crucial mobile device evidence.
Read full term
Provides advisory, consultative, and technological support for agencies on their jour...
Read full term
  The Cellebrite UFED kit contains a device adapter that attaches to your PC's ...
Read full term
Cellphone encryption has become an important part of everyone's daily life. Most, if...
Read full term
  A chain is a set of plug-ins grouped together, which is used to process the e...
Read full term
The Chain Manager option in Physical Analyzer displays the Chain Manager window. It a...
Read full term
  The forensically sound procedure of digitally documenting the custody, contro...
Read full term
  Child abuse material includes forums and sites operating on the dark web whic...
Read full term
  Obtain data straight from the mobile device’s memory chip. The chip is deta...
Read full term
  A client is used during logical extractions. The client is a very small appli...
Read full term
  Cellebrite UFED Cloud allows you to lawfully extract, preserve and analyze pu...
Read full term
  This category represents the received value from the issuance of new coins. ...
Read full term
  Gain insight into a person of interest’s map of connections leveraging the ...
Read full term
  Cookies are basically text files that are saved to a user's device (computer,...
Read full term
  Darknet markets are commercial websites that operate on the dark web, which c...
Read full term
  This option in Physical Analyzer can be used by the digital examiner to adjus...
Read full term
  A data source is a location or system from which data can be retrieved. It ca...
Read full term
The process of ensuring that the data quality and inventory from an extraction is cor...
Read full term
Decentralized exchanges are services that facilitate cryptocurrency and token trades ...
Read full term
  The process of translating raw hexadecimal data into an easily readable forma...
Read full term
“Decoding” refers to the conversion of unstructured data into structured data. ...
Read full term
The process of identifying similar data across multiple devices and datasets and cons...
Read full term
  This process is designed for Android devices that have Qualcomm chipsets. Thi...
Read full term
In case of a drained or absent battery, the device power-up cable powers the device i...
Read full term
Digital Forensics and Incident Response (DFIR) is a quickly developing area that call...
Read full term
  Dictionary files are generated over time, by learning and suggesting changes ...
Read full term
The process of using technology to lawfully collect digital artifacts from devices (b...
Read full term
When the digital investigation workflow becomes clogged with devices and massive volu...
Read full term
Digital data can be extracted in three ways: physical extraction, logical extraction,...
Read full term
Digital forensic examinations involve the recovery and analysis of evidence from a di...
Read full term
Any information related to an investigation that is created, stored or transmitted di...
Read full term
The digital administration and control of evidence related to an event used to prove ...
Read full term
A branch of forensic science encompassing the recovery and investigation of material ...
Read full term
Makes digital data accessible for integration within an investigation in order to rev...
Read full term
The steps a customer must take to implement their DI strategy based on their individual pain-points and current/future needs.
Read full term
Encompasses staff talent, professional development, collaboration, and measurement ne...
Read full term
Two pillars for accessing/collecting the digital evidence and managing/investigating the case.
Read full term
Hardware or software technology that enables the access, extraction, and analysis of digital data to solve an investigation.
Read full term
The solution framework defined by understanding where agencies are in their journey a...
Read full term
Technology stacks consisting of existing tools and systems in the field, at the inves...
Read full term
An agencies’ process of accelerating their DI Readiness to adapt and adjust to modern developments and digital challenges.
Read full term
The monitoring, supervision, and control of the sequential events surrounding digital evidence from the investigation scene to the courtroom.
Read full term
Allows first responders and investigators to access, selectively extract, and analyze data from digital devices at the crime scene.
Read full term
Disables passcode requirement for screen unlocking. After this action, the examiner ...
Read full term
  Is a software copy protection device that plugs into the USB port of the comp...
Read full term
Dust refers to the fractional values of a unit of cryptocurrency. These values often ...
Read full term
  EDL (Emergency Download Mode) is a special boot mode in Qualcomm Android phon...
Read full term
Captures detailed records of each action and transaction involving a piece of evidenc...
Read full term
  Variables used in the case e.g., URL, Person, Location.
Read full term
  Registered activity of any kind, including: Files, SMS, Instant Messages, pho...
Read full term
Options to complete manual audits by selecting an evidence storage location or by aut...
Read full term
  Exchanges allow users to buy, sell, and trade cryptocurrency. They represent...
Read full term
  The process of obtaining mobile device data and storing it in an approved loc...
Read full term
Files used to capture forensic evidence from mobile devices. This includes mobile pho...
Read full term
  The Faceted filters in the Filters pane will filter the data based on your ch...
Read full term
  File System in Physical Analyzer refers to the high-level reference to the co...
Read full term
  Extracts files embedded in the memory of a mobile device. Retrieve the artifa...
Read full term
  File system extraction is a type of forensic analysis that involves extractin...
Read full term
  Certain file types are identified and tagged in the extracted data. There are...
Read full term
  Newer mobile devices have a fingerprint sensor built into the home button. Th...
Read full term
  Forensic Phone Software is used to access, recover and analyze digital eviden...
Read full term
  This extraction method will perform a physical extraction while the device is...
Read full term
  Extracted data is said to be forensically sound if it was collected, analyzed...
Read full term
  Financially motivated shops selling different types of data including, PII (P...
Read full term
  Extracts a copy of all existing files from a privileged context (root). Cell...
Read full term
  The process of organizing structured and unstructured data in a coherent way ...
Read full term
  Fuzzy Model Plugin helps identify and parse databases commonly associated wit...
Read full term
  This settings option within Physical Analyzer lets the examiner adjust option...
Read full term
  The distance calculated between points which are defined by geographical coor...
Read full term
  The Global Positioning System (GPS), is a satellite-based radio navigation sy...
Read full term
  The Graphics Processing Unit (GPU) is a specialized processor that can rapidl...
Read full term
GSM is an international telecommunications standard for the transmission of voice and data between cell phones and other mobile devices.
Read full term
The Guardian Examiner Portal provides an optimized workflow for the lab through the a...
Read full term
The Investigator Portal allows an investigator to create a submission of new evidence...
Read full term
  Upload hash databases to compare them against the hash values in your cases. ...
Read full term
  This option in Physical Analyzer lets the digital examiner set various option...
Read full term
  A high-risk exchange is an exchange that meets one of the following criteria:...
Read full term
  The high-risk jurisdiction category comprises cryptocurrency services that ar...
Read full term
  Hosted wallets are an alternative to core wallets (full node wallets). Walle...
Read full term
File system extraction is a type of forensic analysis that involves extracting data f...
Read full term
  An Integrated Circuit Card Identifier is a GSM identifier. Cellebrite UFED ...
Read full term
  A unique ID associated with a person, e.g., a phone number, social media prof...
Read full term
  Individuals and/or organizations that operate directly or indirectly in vario...
Read full term
  As part of the decoding process, UFED Physical Analyzer can calculate hash va...
Read full term
  Upload an image or select one from within the digital evidence, and the syste...
Read full term
  International Mobile Equipment Identifier. GSM identifier. Cellebrite UFED ...
Read full term
IMEI Forensics relates to IMEI (International Mobile Station Equipment) numbers which...
Read full term
  International Mobile Subscriber Identity. GSM identifier. Cellebrite UFED ...
Read full term
  The Infrastructure as a Service category comprises all infrastructure surroun...
Read full term
  An ICO (Initial Coin Offering) is a means of crowdfunding for new cryptocurre...
Read full term
  InteractionC is a database, common to apple devices that tracks the interacti...
Read full term
Uses artificial intelligence (AI)–driven solutions in the lab during an investigati...
Read full term
Automate and remain compliant with the agency fee schedule and invoice generation bas...
Read full term
  Different from retina scans, an iris scan is a form of biometric identificati...
Read full term
  A jailbroken iOS device or a rooted Android device is one whose owner has tak...
Read full term
  JTAG (Joint Test Action Group) is an advanced method of data extraction that ...
Read full term
  The user taps certain locations on the screen in a certain order to gain acce...
Read full term
The knowledgeC database stores an event log of multiple processes that run within an ...
Read full term
This intuitive dashboard provides examiners, reviewers, and lab managers with the dat...
Read full term
  Last Backup Computer Name is the Name/ID of the computer on which the device ...
Read full term
  Integrated Circuit Card Identifier(19-20 characters) refers to the unique ser...
Read full term
  The process of overcoming barriers to data contained on a device. This can be...
Read full term
  Lending Contract is one of the biggest uses for smart contracts and DeFi (Dec...
Read full term
  An indication of communication based on single or multiple communication even...
Read full term
  Location data is data stored within the mobile device from different sources ...
Read full term
Critical data based on specified, provided criteria. Example: How many weapons and wh...
Read full term
  Produces a copy of logical data existing on the device, and is normally acces...
Read full term
The term Logical Extraction Forensics is usually used in digital forensics to indicat...
Read full term
MAC Address is a media access control address that functions as a unique identifier a...
Read full term
  Physical Analyzer opens the Malware Scanner sub-menu, from where you can run ...
Read full term
Advanced file processing of JPG, NEF, and TIFF - all formats. Metadata is decoded and...
Read full term
  Markers signify the location where a person's device was registered. The col...
Read full term
  Cellebrite Pathfinder recognizes when a media file contains a media analytics...
Read full term
  Mobile Equipment Identity (MEID) is the CDMA equivalent of the International ...
Read full term
  Merchant services are authorized financial services that enable businesses t...
Read full term
  Mobile ID Number (MIN) is often compared to the International Mobile Subscrib...
Read full term
  Mining is the process by which cryptocurrency is generated. Mining is used f...
Read full term
  Mining pools are special services where miners can pool their resources - typ...
Read full term
  Mixers are websites or software used to create a disconnection between a user...
Read full term
Mobile Forensics is the process of accessing, recovering and analyzing digital eviden...
Read full term
Mobile Forensics Tools are used for accessing, recovering and analyzing digital evide...
Read full term
Mobile Phone Forensics Software is used to access, recover and analyze digital eviden...
Read full term
  The Model option in Physical Analyzer lets the digital examiner choose colors...
Read full term
  Mobile Station International Subscriber Dialing Number. This is a GSM identif...
Read full term
The MSISDN (Mobile Station International Subscriber Directory Number) aims to convey ...
Read full term
  A MultiSIM Adapter is a small-size adaptor that enables reading, data extract...
Read full term
  Optical Character Recognition is a tool used to extract text from images cate...
Read full term
Allows the examiner to follow the laboratory workflow. The system includes prebuilt w...
Read full term
This category is used when the entity does not represent a widely popular field of o...
Read full term
  Peer-to-peer (P2P) exchanges are online sites that facilitate the buying, sel...
Read full term
Extracts a copy of certain available files. In the iOS context, this produces an iTu...
Read full term
Phone Forensic Software is used to access, recover and analyze digital evidence in a ...
Read full term
Phone Forensics Software is used to access, recover and analyze digital evidence in a...
Read full term
  Produces a low-level bit-by-bit copy of the phone’s storage device (flash m...
Read full term
Physical extraction forensics relates to a more complex type of extraction than logic...
Read full term
  The plug-ins menu option in Physical Analyzer allows the user to add/remove p...
Read full term
  The area in UFED Physical Analyzer that displays the extracted information st...
Read full term
  An ecosystem of information and data sharing between domestic and internation...
Read full term
  Protocol privacy applies to the two shielded pools built into the Zcash block...
Read full term
  Cellebrite Physical Analyzer lets you work interactively with the Python shel...
Read full term
Automate daily activities by replacing manual data entry with scannable barcodes for ...
Read full term
  Qualcomm Emergency Download Mode (EDL) is a special boot mode in the company...
Read full term
  Ransomware is special malware designed to encrypt a victim's computer data an...
Read full term
Reconstructs webpages, from cache files. You can view websites content offline with content from the browser cache (when available).
Read full term
  A report of selected analyzed data that can be generated by Physical Analyzer...
Read full term
  The Report Defaults option within the general settings in Physical Analyzer l...
Read full term
  A process that allows users of cell phones and other devices running the Andr...
Read full term
  Scams can impersonate a variety of services, including exchanges, mixers, ICO...
Read full term
  Selective Extraction Forensics, as its name suggests, is the science and proc...
Read full term
Enables smooth collaboration with all relevant stakeholders (Intra-Agency and Inter-A...
Read full term
Signature databases are structured sets of collected signatures from a group of indiv...
Read full term
  A subscriber identity module or subscriber identification module (SIM), widel...
Read full term
  This method is designed for Android devices that include the “November 2016...
Read full term
  Some cryptocurrency types have built-in functionality for smart contracts. S...
Read full term
  Trusted locations leave the device unlocked for up to four hours when it is t...
Read full term
Smartphone Forensics Tools are part of a highly disciplined and scientific process th...
Read full term
  A database file format often used for data storage. Commonly used for the st...
Read full term
  Visually decode additional data from databases, particularly from unfamiliar ...
Read full term
  The state of a file indicates whether it is intact, deleted by the user, or h...
Read full term
  Stolen funds comprise instances of hacked exchanges and services. Attackers ...
Read full term
A wizard-driven process guides the user step-by-step through the evidence submission ...
Read full term
The Type Allocation Code (TAC) is the initial eight-digit portion of the 15-digit IME...
Read full term
  A digital investigator can apply a tag to flag events for future reference. E...
Read full term
Work is reviewed, best practices are followed, and compliance is met. Technical Revie...
Read full term
Forensic narrative reports automatically include most of the necessary information, s...
Read full term
  Terrorist financing pertains to the funding of designated terrorist groups a...
Read full term
Text analytics is the process of analyzing the data to extract relevant information, ...
Read full term
  Timeline Graph is an illustration of analyzed data in chronological order, re...
Read full term
  The Timestamp feature in Physical Analyzer is used to refer to the exact time...
Read full term
  Tokens are blockchain-based assets that can be sent and received using a wall...
Read full term
Username and password data as saved on a Windows computer.
Read full term
  TOM TOM refers to GPS devices that can be used independently of any mobile de...
Read full term
  Trace Window is an option available within the Physical Analyzer under the ...
Read full term
  This category refers to any value sent by the entity that is later received b...
Read full term
  This option in Physical Analyzer helps the examiner to examine or analyze dat...
Read full term
Referred to as two-step verification or dual-factor authentication, is a security pro...
Read full term
  Types of data used to categorize events. Extracted digital forensic data can ...
Read full term
  Once the logical file system and physical extractions are complete, UFED gene...
Read full term
  Universal Forensic Extraction Device Report Cellebrite UFED – The Industry Standard for Lawfully Accessing and Collecting Digital Data
Read full term
The UFDR Web Viewer intuitive user interface provides a view into data collected from...
Read full term
  UFED generates a UFDX file when there are multiple extractions for a device. ...
Read full term
  Universal Forensic Extraction Device. Cellebrite UFED – The Industry Standard for Lawfully Accessing and Collecting Digital Data.
Read full term
The UFED Chinex kit is the solution to complete a physical extraction and decoding of...
Read full term
  The UFED kit includes connection cables and tips. These are used to connect m...
Read full term
  A multi-format card reader that provides either read-only or read-write acces...
Read full term
  A ruggedized mobile forensic solution, purpose-designed for users to perform ...
Read full term
  Removes the iPhone is Disabled message to enable screen unlocking. Usually...
Read full term
  The area on a device’s memory outside the defined file system that is avail...
Read full term
  This category refers to currently unidentified clusters that show the behavi...
Read full term
  This category refers to a sent value that is held in balances that are not pa...
Read full term
  This category represents the indirect exposure from the most recent transfers...
Read full term
Allows the administrator to categorize users, which authorizes user-specific levels o...
Read full term
  During the validation stage, UFED Cloud checks the validity of the credential...
Read full term
  The Virtual Analyzer enables you to view your data as if you were using the o...
Read full term
Voice lock is a mobile phone feature where the user speaks to unlock the device, so t...
Read full term
  A list of keywords used to comb data for important and relevant information. ...
Read full term
  Web Bookmarks refer to the web searches saved or bookmarked by the user. Cel...
Read full term
  Web History refers to the browsing history or the list of searched-for/visite...
Read full term
  By clicking this option under Help in Physical Analyzer, you can get a Zip fi...
Read full term

Case Management - Digital Forensics

 

The administration and control of evidence related to an event, which is used to prove the circumstances of the event. Evidence can be tested by independent parties to confidently show that the evidence collected is related to the event.