Difference between pages "Cellebrite UFED" and "User:John Crout"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(MPH, BSEE, CISSP. Advocating volunteer relationships with federal agencies. ("Politician" is a paid position that needs oversight).)
 
Line 1: Line 1:
The Cellebrite 'Universal Forensic Extraction Device' , or UFED, is a unique and very cost effective mobile phone, smartphone, and PDA forensic device that is completely stand alone.
+
Management and design experience from avionics and medical devices industries
+
  
As of January 2009, the UFED is compatible with 1,838 mobile phones (including GSM, TDMS, CDMA, iDEN), with the standard package containing 71 different phone cables. The UFED has an intergrated SIM reader, with Wireless connection options also being integrated, such as IR and Bluetooth. 
+
ISSA Colorado Springs
  
 +
USCG Auxiliary
 +
  Vice-Flotilla Commander, 8WR 16 (since Dec 2011)
 +
  Authorized for direct communications with CIO (outside of Chain of Leadership) since Feb 2010
 +
  National Staff, Branch Chief Data Security (Dec 2008 - Jan 2010)
 +
  Flotilla Staff Officer - Communications Services (Nov 2008 - Dec 2010)
  
The UFED also supports native iPHONE extraction on both 2G and 3G versions. This is clientless, and via a physical cable, and works on jailbroken and non-jailbroken devices.
+
IGC Denver chapter, member
  
 +
SoftHome.net (since Oct 2003)
 +
  System/Network Administrator
  
Using the MD5 Hash Algorithm, and SHA-256, subject data can be retrieved via logical extraction or via physical extraction (ie: hex dump). Moreover, all cable connectors from subject (source) side act as a write-blocker, being read only via the onboard hardware chipset. Extracted data includes:
+
NIST Cloud Security Working Group contributor
  
 +
American Red Cross
  
- Handset data (IMEI, ESN, Manufacturer, Model No., ect.)
+
Prev:
 
+
Texas Engineering Extension (TEEX), div. of Texas A&M (since June 2011)
– Phonebook
+
  Adjunct, DHS/FEMA certified cybersecurity courses
+
– SMS and MMS messages
+
 
+
- SIM data
+
 
+
- SIM cloning
+
 
+
- Multimedia (images, videos, audio, ect.)
+
 
+
- Date and Time stamps (with GMT and daylight savings options)
+
 
+
- Deleted data
+
 
+
- Fragmented or Partial data
+
 
+
- HEX Dump
+
 
+
- and much more.
+
 
+
 
+
The UFED is flexible enough to be used in many environments, such as:
+
 
+
 
+
- Fixed to a desk in a crime lab connect to a PC
+
 
+
- Fixed to a desk in a crime lab (stand alone with no PC)
+
 
+
- Mobile in a car or at a VCP (connected to car 12V power)
+
 
+
- Mobile in the field (using integrated battery kit)
+
 
+
 
+
While the UFED is completely stand alone, additional software is included to create specialised reports on the retrieved raw data. Customised reports give the additional option of containing your own logo, case file number, address, etc.
+
 
+
Standard hardware options include a portable mobile phone battery charger set (with 42 plug heads), Faraday bag, and 9-in-1 media card reader.
+

Revision as of 18:57, 10 July 2012

Management and design experience from avionics and medical devices industries

ISSA Colorado Springs

USCG Auxiliary

 Vice-Flotilla Commander, 8WR 16 (since Dec 2011)
 Authorized for direct communications with CIO (outside of Chain of Leadership) since Feb 2010
 National Staff, Branch Chief Data Security (Dec 2008 - Jan 2010)
 Flotilla Staff Officer - Communications Services (Nov 2008 - Dec 2010)

IGC Denver chapter, member

SoftHome.net (since Oct 2003)

 System/Network Administrator

NIST Cloud Security Working Group contributor

American Red Cross

Prev: Texas Engineering Extension (TEEX), div. of Texas A&M (since June 2011)

 Adjunct, DHS/FEMA certified cybersecurity courses