Difference between pages "Cellebrite UFED" and "Defense Cyber Investigations Training Academy"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Page creation)
 
Line 1: Line 1:
The Cellebrite 'Universal Forensic Extraction Device' , or UFED, is a unique and very cost effective mobile phone forensic device that is completely stand alone.
+
The '''Defense Cyber Investigations Training Academy''', or '''DCITA''', is the training division of the [[Defense Cyber Crime Center]] based in Linthicum, Maryland.  DCITA is a nationally accredited academy that provides training in four areas of study, including:
+
* Computer Technology
 +
* Digital Forensics
 +
* Incident Response
 +
* Network Intrusion and Investigations
  
As of September 2008, the UFED is compatible with 1,625 mobile phones (including GSM, TDMS, CDMA), with the standard package containing 66 different phone cables. Wireless connection options are also integrated into the UFED, such as IR and Bluetooth.
+
Training is provided to all branches of the U.S. Government including Federal law enforcement. Training is provided in a hierarchical progression of courses that range from basic Introduction to Networks and Computer Hardware to the pinnacle of Live Network Investigations. Over 20 different courses are provided in-house at the DCITA facility, with a number of courses delivered remotely on-site. DCITA also provides online distance learning to students that features remote access to virtualized forensic workstations, allowing students to practice methodologies online in a safe, sandbox environment.
  
 +
DCITA instructors research and develop the curriculum that is used for courses. Instructors also provide formal presentations of their research at various security conferences including the DoD Cyber Crime Conference.
  
The UFED also supports native iPHONE extraction on both 2G and 3G versions. This is clientless, and via a physical cable, and works on jailbroken and non-jailbroken devices.
+
== External Links ==
 
+
* [http://www.dc3.mil/dcita/dcitaAbout.php Official website]
 
+
* [http://www.dc3.mil/dcita/dcitaCourseList.php Course Listing]
Using the MD5 Hash Algorithm, retrieved data includes:
+
 
+
+
– Phonebook
+
+
– SMS and MMS messages
+
 
+
- SIM data
+
 
+
- SIM cloning
+
 
+
- Multimedia (images, videos, audio, ect.)
+
 
+
- Date and Time stamps
+
 
+
- Deleted data
+
 
+
- HEX Dump
+
 
+
- and much more.  
+
 
+
 
+
The UFED is flexible enough to be used in many environments, such as:
+
 
+
 
+
- Fixed to a desk in a crime lab connect to a PC
+
 
+
- Fixed to a desk in a crime lab (stand alone with no PC)
+
 
+
- Mobile in a car or at a VCP (connected to car 12V power)
+
 
+
- Mobile in the field (using battery kit)
+
 
+
 
+
While the UFED is completely stand alone, additional software is included to create specialised reports on the retrieved raw data. Customised reports give the additional option of containing your own logo, case file number, address, etc.
+

Latest revision as of 12:39, 1 October 2008

The Defense Cyber Investigations Training Academy, or DCITA, is the training division of the Defense Cyber Crime Center based in Linthicum, Maryland. DCITA is a nationally accredited academy that provides training in four areas of study, including:

  • Computer Technology
  • Digital Forensics
  • Incident Response
  • Network Intrusion and Investigations

Training is provided to all branches of the U.S. Government including Federal law enforcement. Training is provided in a hierarchical progression of courses that range from basic Introduction to Networks and Computer Hardware to the pinnacle of Live Network Investigations. Over 20 different courses are provided in-house at the DCITA facility, with a number of courses delivered remotely on-site. DCITA also provides online distance learning to students that features remote access to virtualized forensic workstations, allowing students to practice methodologies online in a safe, sandbox environment.

DCITA instructors research and develop the curriculum that is used for courses. Instructors also provide formal presentations of their research at various security conferences including the DoD Cyber Crime Conference.

External Links