Click here to close now.

SYS-CON MEDIA Authors: David Sprott, Liz McMillan, Pat Romanski, tru welu, Blue Box Blog

News Feed Item

Cellebrite Introduces Permission Management and User Authentication Capability to its Best-in-Class Mobile Forensic Solution

PETAH TIKVAH, Israel and PARSIPPANY, New Jersey, April 7, 2014 /PRNewswire/ --



UFED Version 3.0 Improves Workflow, Integrates Internal Policy and Best Practices with Field-Based Mobile Evidence Collection 

Cellebrite, the leading developer and provider of mobile data forensic solutions, has released an update to its Universal Forensic Extraction Device (UFED) software that enables forensic lab administrators to enforce policies around the manner and circumstances under which UFED Touch and UFED 4PC users extract mobile device data.

     (Logo: http://photos.prnewswire.com/prnh/20140202/667552 )

Released as part of the UFED 3.0 version, UFED Permission Management offers comprehensive granular administrative support at any extraction level: logical, file system or physical. It enables administrators to create user profiles and assign data extraction permissions according to predefined standard operating procedures (SOPs) or other internal policies. Administrators can therefore use the solution to manage forensic lab personnel, or to extend mobile data extraction capabilities to a broader field of users on a "right to know, need to know" basis-reducing the risk of their accessing private data beyond the scope of their legal authority.

"UFED Permission Management was developed in response to demand for more evenly distributed mobile forensics capabilities across government and corporate organizations," said Ron Serber, Cellebrite Corporate Co-CEO. "However, not every user has the right or the need to bypass a user lock, access certain types of data, or perform a deep extraction and analysis. By extending basic mobile evidence collection and reporting capabilities to those responsible for proving minor offenses or corporate policy violations, but also limiting those capabilities, forensic lab administrators can accelerate investigations while preserving privacy and due process protections."

Dan Morrissey, a supervisor with the Sacramento County (California) Sheriff's Department, stated: "The difficulty for any law enforcement supervisor, responsible for overseeing the collection of digital evidence, is developing methodologies that both allow for the lawful collection of information while ensuring that the scope of the search does not exceed the court's direction. With Cellebrite's new UFED permission management capabilities, law enforcement can manage policies and procedures at an individual case level while ensuring searches are handled with the same right to know and need to know mindset. This feature clearly acknowledges law enforcement's position with respect to the current digital media privacy debate."

UFED Permission Management enables administrators to enforce their organization's SOPs or policies, which may require end users to have achieved a certain level of competency, training and/or certification in mobile data collection. End user permissions may also be based upon a role they fulfill, such as general evidence collection specialist, or types of incidents they respond to.

As a result, users who have access to UFED mobile data extraction platforms may have their permission limited to perform only certain types of extractions-for instance, to acquire only existing, but not deleted, data from a mobile device-and within that data set, only certain data, such as call logs and text messages but not images or videos. The permission management function therefore helps users better manage the vast array of data that is possible to extract with UFED technology.

UFED Permission Management is part of a set of features developed within UFED 3.0 that make mobile evidence identification and collection more efficient for both lab and field personnel. The other features include a more streamlined evidence collection workflow interface, which can automatically detect the device to be extracted, and a new mobile app, UFED Phone Detective, available for iOS and Android devices.

About UFED 

Cellebrite's UFED provides cutting-edge solutions for physical, logical and file system extraction of data and passwords from thousands of legacy and feature phones, smartphones , portable GPS devices, and tablets with ground-breaking physical extraction capabilities for the world's most popular platforms - BlackBerry®, iOS, Android, Nokia, Windows Mobile, Symbian and Palm and more.

The extraction of vital evidentiary data includes call logs, phonebook, text messages (SMS), pictures, videos, audio files, ESN IMEI, ICCID and IMSI information and more.

About Cellebrite 

Founded in 1999, Cellebrite is a global company known for its technological breakthroughs in the cellular industry. A world leader and authority in mobile data technology, Cellebrite established its mobile forensics division in 2007, with the Universal Forensic Extraction Device (UFED). Cellebrite's range of mobile forensic products, UFED Series,  enable the bit-for-bit extraction and in-depth decoding and analysis of data from thousands of mobile devices, including feature phones, smartphones, portable GPS devices, tablets and phones manufactured with Chinese chipsets.

Cellebrite's UFED Series is the prime choice of forensic specialists in law enforcement, military, intelligence, corporate security and eDiscovery agencies in more than 100 countries.

Cellebrite is a wholly-owned subsidiary of the Sun Corporation, a listed Japanese company (6736/JQ).

http://www.ufedseries.com

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a b...
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
2015 predictions circa 1970: houses anticipate our needs and adapt, city infrastructure is citizen and situation aware, office buildings identify and preprocess you. Today smart buildings have no such collective conscience, no shared set of fundamental services to identify, predict and synchronize around us. LiveSpace and M2Mi are changing that. LiveSpace Smart Environment devices deliver over the M2Mi IoT Platform real time presence, awareness and intent analytics as a service to local connecte...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Amazon and Google have built software-defined data centers (SDDCs) that deliver massively scalable services with great efficiency. Yet, building SDDCs has proven to be a near impossibility for companies without hyper-scale resources. In his session at 15th Cloud Expo, David Cauthron, CTO and Founder of NIMBOXX, highlighted how a mid-sized manufacturer of global industrial equipment bridged the gap from virtualization to software-defined services, streamlining operations and costs while connect...
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
paradigm shifts in networking, to cloud and licensure, and all the Internet of Things in between. In 2014 automation was the name of the game. In his session at DevOps Summit, Matthew Joyce, a Sales Engineer at Big Switch, will discuss why in 2015 it’s complexity reduction. Matthew Joyce, a sales engineer at Big Switch, is helping push networking into the 21st century. He is also a hacker at NYC Resistor. Previously he worked at NASA Ames Research Center with the Nebula Project (where OpenSta...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affec...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In this session, James Kirkland, Red Hat's Chief Architect for the ...