UFED innovation timeline

Consistently first,often unmatched.

Cellebrite UFED consistently brings critical mobile forensic capabilities first to the lab and field, and many of these capabilities remain unmatched for months or years. Many remain unmatched today.

2017
May

Physical Advanced ADB extractions for an additional 101 tested and approved devices

ONLY FROM CELLEBRITE

May

New disable user lock capability for 135 LG devices including LG F700L G5, H872 G6 and US996 V20 devices

ONLY FROM CELLEBRITE

May

Easy and secure access to all UFED platforms using Microsoft Windows Active Directory account

ONLY FROM CELLEBRITE

March

Physical Advanced ADB extractions for 113 tested and approved Android devices, including: Samsung Galaxy S7, Samsung Galaxy S7 Edge, Samsung Galaxy Note 5, Samsung Galaxy S6, Samsung Galaxy Note 4, LG G4, LG G5, LG Nexus 5X, LG V20, Sony Xperia Z5, Xiaomi Redmi 3S, Huawei Nexus 6P, HTC Desire 825 and more! This capability is supported on THOUSANDS of Android devices.

ONLY FROM CELLEBRITE

January

Physical and file system ADB extractions for 51 Samsung Android devices, including SM-G935FD Galaxy S7 Edge, SM-G920T Galaxy S6 and SM-G930F Galaxy S7

January

Bootloader-based physical bypass extraction for 59 Qualcomm-chipset devices (MSM8926, MSM8916 and more), for selected vendors including ZTE, Alcatel and Xiaomi Android devices (including Alcatel 6045Y One Touch Idol 3, Alcatel 5054W One Touch, and ZTE Z828 Avid Plus)

ONLY FROM CELLEBRITE

January

Bootloader-based physical extraction for 4 Alcatel devices running Spreadtrum chipset (SC6531) – Alcatel 1016G One Touch, 1016D One Touch, 3022G One Touch and 2040D One Touch

January

Two unique SQLite tools: SQLite wizard and Fuzzy methods to expose much more data from applications

ONLY FROM CELLEBRITE

2016
November

Physical extraction and decoding from 26 popular Motorola Android devices (up to and including OS 5.0.1), including XT1254 Droid Turbo, XT1028 Moto G and XT1068 Moto G

STILL ONLY FROM CELLEBRITE

November

Bootloader-based physical extraction from 17 MTK Android devices, including QMobile A3 Noir and Huawei TAG-TL00 Enjoy 5S

STILL ONLY FROM CELLEBRITE

November

Physical extraction while bypassing user lock (Bootloader) and decoding support for 18 Huawei devices, running HiSilicon chipsets, including PLK-UL00 Honor, ALE-L02 P8 Lite and GRA-TL00 P8

STILL ONLY FROM CELLEBRITE

November

Convert BSSID values (wireless networks) and cell tower values into physical locations (latitude and longitude GPS coordinates) – offline solution

STILL ONLY FROM CELLEBRITE

November

Logical extraction is enabled for the new Google Pixel Android devices (apps data not included)

August

Partial file system extraction while bypassing screen lock for 105 Android Samsung devices, including devices running on Android 6 OS, including SM-G9208 Galaxy S6, SM-G928F Galaxy S6 Edge+ and SM-G930F Galaxy S7

STILL ONLY FROM CELLEBRITE

August

Physical extraction while bypassing screen lock for 12 Samsung Galaxy S6, S6 Edge and Note 5, with, forensic recovery partition, now running on Android 6 OS

August

File system extraction of blocked apps data for devices running OS 6, using APK downgrade

August

Decrypt and decode data produced by Apple and other sources

July

Decrypted physical extraction of data from Samsung Galaxy S6, Galaxy Note 5 and some Galaxy S7 devices

STILL ONLY FROM CELLEBRITE

July

Decrypted physical extraction of data from Apple iPhones 4s, 5, 5c

STILL ONLY FROM CELLEBRITE

June

A unique bypassing-lock method that allow physical extraction of more than 140 LG models, including 22 previously-unsupported models, such as the MS3330 and VS880. This method additionally allows the removal and restoration of the user screen lock

Cellebrite is the undisputed pioneer in breakthrough device specific mobile forensic capabilities. With UFED, chances are you will have these critical capabilities when you need them, when they are essential to your investigation, and well before any other tool.