Mobile device data visualization for field investigators
Posted on 14 September 2012.
Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by analyzing data from multiple mobile devices.


By drawing on the most comprehensive data sets—including the existing, deleted and hidden data available only from physical and file system extractions—UFED Link Analysis delivers the most thorough, accurate and actionable picture of any mobile forensic solution.

Law enforcement, military, private, and corporate investigators can use UFED Link Analysis to generate leads in the early hours of an investigation. Whether this brings about more in-depth analysis, a crime prevented, a suspect’s apprehension or a victim’s rescue, visual analytics can shorten investigations and make operational planning faster and more efficient.

“One of the biggest challenges law enforcement has is being able to take raw data and turn it into actionable intelligence in the field,” said Dan Morrissey, a supervisor with the Sacramento County Sheriff’s Department. “We routinely encounter suspects carrying multiple phones. Being able to determine if a relationship occurs, and to what extent the relationship exists, can be a significant benefit to any investigation.”

By integrating multiple mobile device extraction reports on a single screen, UFED Link Analysis:
  • Reveals people’s direct and indirect links via their calls, text messages, chats, and application activities.
  • Shows people’s usage behavior, including the channels they use and unusual communication.
  • Indicates how strongly connected people are, including whether they share connections, across multiple devices.
  • Analyzes data from hundreds of the most popular mobile devices and smartphone apps.
  • Enables investigators to associate people within groups.
  • Filters data by time and date, number of events, and categories.
  • Searches data by keyword such as names, addresses, area codes or other information.
  • Stands alone as an individual application, requiring no special servers or other equipment to run.





Spotlight

Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //