Lawful access to digital evidence on a device, either through consent or a wa...
Read full termAccount package is an export file in .ucae format that contains user credentials, tok...
Read full term
Relevant insights that directly impact an investigation by identifying critic...
Read full termThis cable is 150 cm in length and allows for the easy and accessible placement of th...
Read full termWhen extracting a rooted device, the operating system version is not a limitation and...
Read full termADB (Android Debug Bridge) is a built-in communication mechanism originally designed ...
Read full term
The Additional Report Field helps the digital examiner add, delete or choose ...
Read full term
Advanced ADB refers to a physical extraction method, where ADB is used to fac...
Read full term
The Advanced ADB (Generic) process is similar to the ADVANCED ADB mentioned h...
Read full term
Advanced Logical Extraction is an extraction method that combines both the lo...
Read full term
Choose between “Any of these terms” or “All of these terms” as search...
Read full term
The meaning of AFU (After First Unlock) iPhone is that the device has been un...
Read full termThe functional areas and departments within an agency (field, station, and lab operat...
Read full term
Airplane mode, Offline mode, or Standalone mode are settings that when activa...
Read full term
In a situation where an officer doesn’t have access to a Faraday box or bag...
Read full term
Allocated Space is the area on a device’s memory that stores data in an org...
Read full term
Android Backup supports Android devices running OS version 4.1 and later.
It...
Read full term
The Android Backup APK Downgrade Extraction method focuses on specifically su...
Read full term
Specifies how apps and firmware on a mobile device should interact with one a...
Read full term
APK is an Android application package file.
Each Android application is comp...
Read full term
AppGenie is a heuristic engine that can perform automatic analysis of any app...
Read full term
Apple File Conduit is a service that is used by computer applications such as...
Read full term
Apple ID is an authentication method used by Apple for iPhone, iPad, Mac and ...
Read full term
Cryptocurrency ATMs facilitate the conversion of physical cash into cryptocur...
Read full termSupports all file types of lab submission attachments, such as Legal Authority / Scop...
Read full term
A chronological digital record of all interactions of stakeholders and platfo...
Read full term
A social media profile that you can use to extract public data.
Note: Avatar...
Read full term
Before First Unlock devices are those that have been turned off or rebooted a...
Read full term
The term BFU (Before First Unlock) Android extraction refers to devices that ...
Read full term
The term BFU (Before First Unlock) Extraction refers to devices that have bee...
Read full term
BFU (Before First Unlock) iPhone relates to devices that have been turned off...
Read full term
A small piece of code that is inserted into the RAM during start-up.
In the ...
Read full termA device that cannot function in any capacity (such as a device with damaged firmware...
Read full term
Basic service set identifiers (BSSID) are used to describe sections of a wire...
Read full term
Temporarily unlocks the screen (one-time).
This action allows a single and i...
Read full term
CDRs are cellphone and cell tower data logs that can be leveraged in a digita...
Read full termMemorializes the “contract with the customer” creating a countersigned Submission...
Read full term
Decodes additional location data from unallocated space and unsupported datab...
Read full term
The process of finding data contained within the hexadecimal code, apart from...
Read full term
Enable the Cases discovery tool to sync cases and/or evidence from another da...
Read full term
The administration and control of evidence related to an event, which is used...
Read full term
These networks connect using different methods to allow multiple callers acce...
Read full term
Call Detail Record (CDR) files refers to evidence provided directly by mobile...
Read full termCell Phone Forensic Software focuses on the collection of data from cell phones and o...
Read full termThis is software that focuses on the collection of data from cell phones and other mo...
Read full termCell Phone Forensics Tools are part of a highly disciplined and scientific process th...
Read full term
Is a division of Cellebrite Services that offers advanced digital forensic la...
Read full termCellebrite delivers the world’s leading software suite to manage Digital Intelligen...
Read full termIs an agencies’ current level of ability to master both technological capabilities ...
Read full termIs an interactive, online tool for agencies to self-identify the level of their curre...
Read full termAre the four potential placements on the DI Readiness Matrix. These include the matur...
Read full termHelp you achieve your investigative and intelligence mission of gaining trusted insig...
Read full termAllow first responders to collect digital evidence at the crime scene and feed those ...
Read full termAllow investigators and agency heads to gather intelligence, respond to incidents, ma...
Read full termAccess the most devices/sources of digital data and applications and enable digital f...
Read full termEliminates the time-consuming and manual review of digital data. It is a force multip...
Read full termDelivers access to all iOS and high-end Android devices to unlock and extract crucial mobile device evidence.
Read full termProvides advisory, consultative, and technological support for agencies on their jour...
Read full term
The Cellebrite UFED kit contains a device adapter that attaches to your PC's ...
Read full termCellphone encryption has become an important part of everyone's daily life.
Most, if...
Read full term
A chain is a set of plug-ins grouped together, which is used to process the e...
Read full termThe Chain Manager option in Physical Analyzer displays the Chain Manager window. It a...
Read full term
The forensically sound procedure of digitally documenting the custody, contro...
Read full term
Child abuse material includes forums and sites operating on the dark web whic...
Read full term
Obtain data straight from the mobile device’s memory chip. The chip is deta...
Read full term
A client is used during logical extractions. The client is a very small appli...
Read full term
Cellebrite UFED Cloud allows you to lawfully extract, preserve and analyze pu...
Read full term
This category represents the received value from the issuance of new coins.
...
Read full term
Gain insight into a person of interest’s map of connections leveraging the ...
Read full term
Cookies are basically text files that are saved to a user's device (computer,...
Read full term
Darknet markets are commercial websites that operate on the dark web, which c...
Read full term
This option in Physical Analyzer can be used by the digital examiner to adjus...
Read full term
A data source is a location or system from which data can be retrieved. It ca...
Read full termThe process of ensuring that the data quality and inventory from an extraction is cor...
Read full termDecentralized exchanges are services that facilitate cryptocurrency and token trades ...
Read full term
The process of translating raw hexadecimal data into an easily readable forma...
Read full term“Decoding” refers to the conversion of unstructured data into structured data. ...
Read full termThe process of identifying similar data across multiple devices and datasets and cons...
Read full term
This process is designed for Android devices that have Qualcomm chipsets. Thi...
Read full termIn case of a drained or absent battery, the device power-up cable powers the device i...
Read full termDigital Forensics and Incident Response (DFIR) is a quickly developing area that call...
Read full term
Dictionary files are generated over time, by learning and suggesting changes ...
Read full termThe process of using technology to lawfully collect digital artifacts from devices (b...
Read full termWhen the digital investigation workflow becomes clogged with devices and massive volu...
Read full termDigital data can be extracted in three ways: physical extraction, logical extraction,...
Read full termDigital forensic examinations involve the recovery and analysis of evidence from a di...
Read full termAny information related to an investigation that is created, stored or transmitted di...
Read full termThe digital administration and control of evidence related to an event used to prove ...
Read full termA branch of forensic science encompassing the recovery and investigation of material ...
Read full termMakes digital data accessible for integration within an investigation in order to rev...
Read full termThe steps a customer must take to implement their DI strategy based on their individual pain-points and current/future needs.
Read full termEncompasses staff talent, professional development, collaboration, and measurement ne...
Read full termTwo pillars for accessing/collecting the digital evidence and managing/investigating the case.
Read full termHardware or software technology that enables the access, extraction, and analysis of digital data to solve an investigation.
Read full termThe solution framework defined by understanding where agencies are in their journey a...
Read full termTechnology stacks consisting of existing tools and systems in the field, at the inves...
Read full termAn agencies’ process of accelerating their DI Readiness to adapt and adjust to modern developments and digital challenges.
Read full termThe monitoring, supervision, and control of the sequential events surrounding digital evidence from the investigation scene to the courtroom.
Read full termAllows first responders and investigators to access, selectively extract, and analyze data from digital devices at the crime scene.
Read full termDisables passcode requirement for screen unlocking.
After this action, the examiner ...
Read full term
Is a software copy protection device that plugs into the USB port of the comp...
Read full termDust refers to the fractional values of a unit of cryptocurrency. These values often ...
Read full term
EDL (Emergency Download Mode) is a special boot mode in Qualcomm Android phon...
Read full termCaptures detailed records of each action and transaction involving a piece of evidenc...
Read full term
Registered activity of any kind, including: Files, SMS, Instant Messages, pho...
Read full termOptions to complete manual audits by selecting an evidence storage location or by aut...
Read full term
Exchanges allow users to buy, sell, and trade cryptocurrency.
They represent...
Read full term
The process of obtaining mobile device data and storing it in an approved loc...
Read full termFiles used to capture forensic evidence from mobile devices. This includes mobile pho...
Read full term
The Faceted filters in the Filters pane will filter the data based on your ch...
Read full term
File System in Physical Analyzer refers to the high-level reference to the co...
Read full term
Extracts files embedded in the memory of a mobile device. Retrieve the artifa...
Read full term
File system extraction is a type of forensic analysis that involves extractin...
Read full term
Certain file types are identified and tagged in the extracted data. There are...
Read full term
Newer mobile devices have a fingerprint sensor built into the home button. Th...
Read full term
Forensic Phone Software is used to access, recover and analyze digital eviden...
Read full term
This extraction method will perform a physical extraction while the device is...
Read full term
Extracted data is said to be forensically sound if it was collected, analyzed...
Read full term
Financially motivated shops selling different types of data including, PII (P...
Read full term
Extracts a copy of all existing files from a privileged context (root).
Cell...
Read full term
The process of organizing structured and unstructured data in a coherent way ...
Read full term
Fuzzy Model Plugin helps identify and parse databases commonly associated wit...
Read full term
This settings option within Physical Analyzer lets the examiner adjust option...
Read full term
The distance calculated between points which are defined by geographical coor...
Read full term
The Global Positioning System (GPS), is a satellite-based radio navigation sy...
Read full term
The Graphics Processing Unit (GPU) is a specialized processor that can rapidl...
Read full termGSM is an international telecommunications standard for the transmission of voice and data between cell phones and other mobile devices.
Read full termThe Guardian Examiner Portal provides an optimized workflow for the lab through the a...
Read full termThe Investigator Portal allows an investigator to create a submission of new evidence...
Read full term
Upload hash databases to compare them against the hash values in your cases. ...
Read full term
This option in Physical Analyzer lets the digital examiner set various option...
Read full term
A high-risk exchange is an exchange that meets one of the following criteria:...
Read full term
The high-risk jurisdiction category comprises cryptocurrency services that ar...
Read full term
Hosted wallets are an alternative to core wallets (full node wallets).
Walle...
Read full termFile system extraction is a type of forensic analysis that involves extracting data f...
Read full term
An Integrated Circuit Card Identifier is a GSM identifier.
Cellebrite UFED ...
Read full term
A unique ID associated with a person, e.g., a phone number, social media prof...
Read full term
Individuals and/or organizations that operate directly or indirectly in vario...
Read full term
As part of the decoding process, UFED Physical Analyzer can calculate hash va...
Read full term
Upload an image or select one from within the digital evidence, and the syste...
Read full term
International Mobile Equipment Identifier. GSM identifier.
Cellebrite UFED ...
Read full termIMEI Forensics relates to IMEI (International Mobile Station Equipment) numbers which...
Read full term
International Mobile Subscriber Identity. GSM identifier.
Cellebrite UFED ...
Read full term
The Infrastructure as a Service category comprises all infrastructure surroun...
Read full term
An ICO (Initial Coin Offering) is a means of crowdfunding for new cryptocurre...
Read full term
InteractionC is a database, common to apple devices that tracks the interacti...
Read full termUses artificial intelligence (AI)–driven solutions in the lab during an investigati...
Read full termAutomate and remain compliant with the agency fee schedule and invoice generation bas...
Read full term
Different from retina scans, an iris scan is a form of biometric identificati...
Read full term
A jailbroken iOS device or a rooted Android device is one whose owner has tak...
Read full term
JTAG (Joint Test Action Group) is an advanced method of data extraction that ...
Read full term
The user taps certain locations on the screen in a certain order to gain acce...
Read full termThe knowledgeC database stores an event log of multiple processes that run within an ...
Read full termThis intuitive dashboard provides examiners, reviewers, and lab managers with the dat...
Read full term
Last Backup Computer Name is the Name/ID of the computer on which the device ...
Read full term
Integrated Circuit Card Identifier(19-20 characters) refers to the unique ser...
Read full term
The process of overcoming barriers to data contained on a device. This can be...
Read full term
Lending Contract is one of the biggest uses for smart contracts and DeFi (Dec...
Read full term
An indication of communication based on single or multiple communication even...
Read full term
Location data is data stored within the mobile device from different sources ...
Read full termCritical data based on specified, provided criteria. Example: How many weapons and wh...
Read full term
Produces a copy of logical data existing on the device, and is normally acces...
Read full termThe term Logical Extraction Forensics is usually used in digital forensics to indicat...
Read full termMAC Address is a media access control address that functions as a unique identifier a...
Read full term
Physical Analyzer opens the Malware Scanner sub-menu, from where you can run ...
Read full termAdvanced file processing of JPG, NEF, and TIFF - all formats. Metadata is decoded and...
Read full term
Markers signify the location where a person's device was registered.
The col...
Read full term
Cellebrite Pathfinder recognizes when a media file contains a media analytics...
Read full term
Mobile Equipment Identity (MEID) is the CDMA equivalent of the International ...
Read full term
Merchant services are authorized financial services that enable businesses t...
Read full term
Mobile ID Number (MIN) is often compared to the International Mobile Subscrib...
Read full term
Mining is the process by which cryptocurrency is generated.
Mining is used f...
Read full term
Mining pools are special services where miners can pool their resources - typ...
Read full term
Mixers are websites or software used to create a disconnection between a user...
Read full termMobile Forensics is the process of accessing, recovering and analyzing digital eviden...
Read full termMobile Forensics Tools are used for accessing, recovering and analyzing digital evide...
Read full termMobile Phone Forensics Software is used to access, recover and analyze digital eviden...
Read full term
The Model option in Physical Analyzer lets the digital examiner choose colors...
Read full term
Mobile Station International Subscriber Dialing Number. This is a GSM identif...
Read full termThe MSISDN (Mobile Station International Subscriber Directory Number) aims to convey ...
Read full term
A MultiSIM Adapter is a small-size adaptor that enables reading, data extract...
Read full term
Optical Character Recognition is a tool used to extract text from images cate...
Read full termAllows the examiner to follow the laboratory workflow. The system includes prebuilt w...
Read full termThis category is used when the entity does not represent a widely popular field of o...
Read full term
Peer-to-peer (P2P) exchanges are online sites that facilitate the buying, sel...
Read full termExtracts a copy of certain available files.
In the iOS context, this produces an iTu...
Read full termPhone Forensic Software is used to access, recover and analyze digital evidence in a ...
Read full termPhone Forensics Software is used to access, recover and analyze digital evidence in a...
Read full term
Produces a low-level bit-by-bit copy of the phone’s storage device (flash m...
Read full termPhysical extraction forensics relates to a more complex type of extraction than logic...
Read full term
The plug-ins menu option in Physical Analyzer allows the user to add/remove p...
Read full term
The area in UFED Physical Analyzer that displays the extracted information st...
Read full term
An ecosystem of information and data sharing between domestic and internation...
Read full term
Protocol privacy applies to the two shielded pools built into the Zcash block...
Read full term
Cellebrite Physical Analyzer lets you work interactively with the Python shel...
Read full termAutomate daily activities by replacing manual data entry with scannable barcodes for ...
Read full term
Qualcomm Emergency Download Mode (EDL) is a special boot mode in the company...
Read full term
Ransomware is special malware designed to encrypt a victim's computer data an...
Read full termReconstructs webpages, from cache files. You can view websites content offline with content from the browser cache (when available).
Read full term
A report of selected analyzed data that can be generated by Physical Analyzer...
Read full term
The Report Defaults option within the general settings in Physical Analyzer l...
Read full term
A process that allows users of cell phones and other devices running the Andr...
Read full term
Scams can impersonate a variety of services, including exchanges, mixers, ICO...
Read full term
Selective Extraction Forensics, as its name suggests, is the science and proc...
Read full termEnables smooth collaboration with all relevant stakeholders (Intra-Agency and Inter-A...
Read full termSignature databases are structured sets of collected signatures from a group of indiv...
Read full term
A subscriber identity module or subscriber identification module (SIM), widel...
Read full term
This method is designed for Android devices that include the “November 2016...
Read full term
Some cryptocurrency types have built-in functionality for smart contracts.
S...
Read full term
Trusted locations leave the device unlocked for up to four hours when it is t...
Read full termSmartphone Forensics Tools are part of a highly disciplined and scientific process th...
Read full term
A database file format often used for data storage.
Commonly used for the st...
Read full term
Visually decode additional data from databases, particularly from unfamiliar ...
Read full term
The state of a file indicates whether it is intact, deleted by the user, or h...
Read full term
Stolen funds comprise instances of hacked exchanges and services.
Attackers ...
Read full termA wizard-driven process guides the user step-by-step through the evidence submission ...
Read full termThe Type Allocation Code (TAC) is the initial eight-digit portion of the 15-digit IME...
Read full term
A digital investigator can apply a tag to flag events for future reference. E...
Read full termWork is reviewed, best practices are followed, and compliance is met. Technical Revie...
Read full termForensic narrative reports automatically include most of the necessary information, s...
Read full term
Terrorist financing pertains to the funding of designated terrorist groups a...
Read full termText analytics is the process of analyzing the data to extract relevant information, ...
Read full term
Timeline Graph is an illustration of analyzed data in chronological order, re...
Read full term
The Timestamp feature in Physical Analyzer is used to refer to the exact time...
Read full term
Tokens are blockchain-based assets that can be sent and received using a wall...
Read full term
TOM TOM refers to GPS devices that can be used independently of any mobile de...
Read full term
Trace Window is an option available within the Physical Analyzer under the ...
Read full term
This category refers to any value sent by the entity that is later received b...
Read full term
This option in Physical Analyzer helps the examiner to examine or analyze dat...
Read full termReferred to as two-step verification or dual-factor authentication, is a security pro...
Read full term
Types of data used to categorize events. Extracted digital forensic data can ...
Read full term
Once the logical file system and physical extractions are complete, UFED gene...
Read full term
Universal Forensic Extraction Device Report
Cellebrite UFED – The Industry Standard for Lawfully Accessing and Collecting Digital Data
Read full termThe UFDR Web Viewer intuitive user interface provides a view into data collected from...
Read full term
UFED generates a UFDX file when there are multiple extractions for a device. ...
Read full term
Universal Forensic Extraction Device.
Cellebrite UFED – The Industry Standard for Lawfully Accessing and Collecting Digital Data.
Read full termThe UFED Chinex kit is the solution to complete a physical extraction and decoding of...
Read full term
The UFED kit includes connection cables and tips. These are used to connect m...
Read full term
A multi-format card reader that provides either read-only or read-write acces...
Read full term
A ruggedized mobile forensic solution, purpose-designed for users to perform ...
Read full term
Removes the iPhone is Disabled message to enable screen unlocking.
Usually...
Read full term
The area on a device’s memory outside the defined file system that is avail...
Read full term
This category refers to currently unidentified clusters that show the behavi...
Read full term
This category refers to a sent value that is held in balances that are not pa...
Read full term
This category represents the indirect exposure from the most recent transfers...
Read full termAllows the administrator to categorize users, which authorizes user-specific levels o...
Read full term
During the validation stage, UFED Cloud checks the validity of the credential...
Read full term
The Virtual Analyzer enables you to view your data as if you were using the o...
Read full termVoice lock is a mobile phone feature where the user speaks to unlock the device, so t...
Read full term
A list of keywords used to comb data for important and relevant information. ...
Read full term
Web Bookmarks refer to the web searches saved or bookmarked by the user.
Cel...
Read full term
Web History refers to the browsing history or the list of searched-for/visite...
Read full term
By clicking this option under Help in Physical Analyzer, you can get a Zip fi...
Read full termOther
This category is used when the entity does not represent a widely popular field of operation or is a particular type of operation or entity.
This could be donation addresses, social network bots, or seized funds, among others.
This category does not have any inherent risk but may contain risky entities.
Cellebrite Crypto Solutions - Comprehensive Investigative Crypto Solutions