Unlock the Intelligence of Digital Forensics Data in the Field
Mobile device evidence is critical to proving innocence or guilt; revealing critical details and insights accelerate investigations. Having the ability to extract and act on mobile data quickly in the field is now a key capability.
Cellebrite’s newly modified and easy-to-use frontline solution – UFED InField Kiosk – is designed specifically with field personnel in mind. This user–friendly, “all-in-one” mobile forensic solution enables users to forensically selectively extract and decode mobile device data such as call logs, contacts, calendar, text messages, media files and more – for your agency, border check point, airport or – if a situation demands it – in the field. An intuitive user interface, requiring minimal training, makes extracting critical data simple, saving valuable time while ensuring strict access control and data management in every situation. Share actionable data quickly with key agency personnel as investigators, analysts, agency management and more – it’s now that easy.
The UFED InField Kiosk Empowers Agencies to:
- Extend Real-Time Access to Digital Evidence to Field Personnel to Help Speed Investigations.
- Fast-Track Evidence Collection and Qualification for more Targeted Insights with Selective Extraction.
- Account for Every Action by Every User to Ensure Evidentiary Integrity with a Central Management System.
UFED INFIELD KIOSK KEY FEATURES:
ALL IN ONE SOLUTION
Built on the proven UFED platform, this single-purpose solution supports the widest variety of device types and provides intuitive workflows that prevent unnecessary errors or contamination of evidence.
LOGICAL AND PHYSICAL EXTRACTIONS
Quickly and simply extract specific data from the widest variety of mobile devices, SIM cards or USBs by timeframe, data types or relevant persons.
Select and extract only the relevant data needed based on time range or specific subject information (person, email, phone).
Copy only specific evidence from witnesses and/or victims phones, leaving personal data private.
Simplifies the ongoing visibility to and management of software updates, configuration modifications, user permissions and usage statistics.