

TLDR: There are cell phone experts who are experienced in and use Cellebrite. If for no other reason than you can't validate the other investigator or expert's work unless you are using the same tool. But if you spend your time in court, as I do, it has to be Cellebrite. If you spend your time in your lab playing with cell phones you can use whatever you want. I know people will disagree that it is Cellebrite or nothing, and I am sure fans of all the other programs will downvote this, but the truth is the truth. If they did that it would level the playing field, and equalize phone investigations. In fact both Apple and Google could break Cellebrite overnight if they would simply enable rooting and jailbreaking in the phone's settings. I would love for it to be different but it is not.

If you have another tool you prefer, great. Cellebrite is considered the best tool, (whether it is or isn't doesn't matter.) If you are going to do any work in large civil, criminal, or federal cases, or with E-Discovery companies, and you want to be taken seriously, you have to be using Cellebrite. That said, they are the industry standard and are spec'd in court orders and protocols. Read the FAQ before posting.Ĭellebrite is expensive, the sales and support teams were gutted before they went public, they are hard to work with and have issues being responsive. Irrelvant submissions will be pruned in an effort towards tidiness. Vote based on the quality of the content. Topics include digital forensics, incident response, malware analysis, and more. This subreddit is not limited to just the computers and encompasses all media that may also fall under digital forensics (e.g., cellphones, video, etc.).

The field is the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes. A community dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
