Link Analysis: Identify connections between suspects, victims, and others in less time
On July 1, learn how field investigators use UFED Link Analysis to rapidly visualize key relationships between entities and identify the connections and communication methods between multiple mobile devices. Join Cellebrite Forensics Solutions Specialist Lee Papathanasiou for a 60-minute live webinar that details how link analysis methodology:
- Helps you visualize communication links using multiple mobile devices’ rich data sets, including mutual contacts, calls, SMSs, MMS, emails, chats, application transactions, Bluetooth devices, locations, and more.
- Filters data by time, date, number of contact times, and categories, and drills down to specific events.
- Pinpoints whether entities were at the same place at the same time.
- Allows you to share findings with colleagues and other investigators.
The webinar, including a Q&A session, will present real world use case scenarios from a wide range of crime categories. The session will also touch on key practical features of UFED Link Analysis, including timelines, advanced filters, and much more.
Bypassing Locked Devices: Learn How to Tackle One of the Biggest Challenges in Mobile Forensics
Pattern locks and passwords are becoming increasingly sophisticated and hard to crack, even for forensic examiners. Attempting to gain access to a locked device, especially with a complex pattern lock or passcode, is often only possible by using advanced forensic tools and techniques.
Don’t remain locked out from your evidence. Join Cellebrite’s forensic technical director, Yuval Ben-Moshe, for this 45-minute live webinar to learn about the UFED’s unrivaled ability to bypass locked phones without jailbreaking, rooting or flashing. You will learn:
- Various methods to bypass locked devices, and a live demo of password extractions using the UFED.
- How to use the extracted password to bypass other devices owned by the same person.
- Physical extraction while bypassing any type of lock from 470 Android devices, including Cellebrite’s first to market capabilities for Samsung Galaxy S4 family.
- Bypassing locks from counterfeit devices and phones manufactured in China.
- How to run a plug-in that reveals pattern locks in Physical Analyzer.
Automated JTAG Extraction Decoding with UFED Physical Analyzer
The growing popularity of JTAG forensics requires a great deal of resources and investment to obtain raw data stored on the device’s memory chip. It can take many hours for an examiner to transform the raw data into human interpretable evidence.
Cellebrite’s newly introduced decoding capabilities reduce the amount of time examiners have to spend on manually decoding, or carving, the large volume of extracted data. Join Cellebrite’s engineering product manager, Ronen Engler, for a 45-minute session on how you can take advantage of the UFED for JTAG decoding:
- Easily import the binary file from a JTAG extraction into the UFED Physical Analyzer to draw accurate conclusions and report data.
- Access this rich set of data to discover common artifacts, such as call logs, SMS, media files, e-mails, chats and locations.
- Drill down into the binary file’s hex code through advanced search capabilities for finer grained information.
- Decode the extractions from the widest range of devices, including popular Samsung, HTC, and LG, using a series of automated plug-ins and chains.
Register for the July 24 webinar to learn about Cellebrite’s efficient and cost-effective solution to decode and obtain forensically sound data from previously inaccessible devices.