![]() So, be careful with information sharing, whether it's in face-to-face conversations, over the phone, on online newsgroups, via e-mail - other things like that - just try to keep it sensitive and don't go into too much detail.Īs for written documentation, obviously you don't want to divulge too much in your court reports. What's more, exposure of any of these premium features could be very detrimental to the global law enforcement environment. ![]() And in some cases, there's a risk of tampering and disabling the component, and that's something you really don't want to do, because it could prevent your agency from having the capability while you're waiting for a replacement. These are very sensitive assets, and we want to make sure that no tampering or other curiosities are used on these devices. Those little bits that make all that capability. ![]() This starts with the physical protection of the premium system and all its components that you received in the kit. How you got in, let's try to keep that as quiet as possible.Īnd now to operational or "opsec" security. At the end of the day, you've extracted the data, it's the data that solves the crime. Please don't make our job any harder than it already is.Īnd at the end of the day, we don't really want techniques to be disclosed in court through discovery practices, or you know, ultimately in testimony, when you're sitting on the stand, producing all this evidence and discussing how you got into the phone. And the challenge is already as difficult as it is, but we continue to make very good inroads. We are also aware that phone manufacturers are constantly looking for ways to improve the security of their products. And, if the bad guys find out how we get into a device, or that we're able to decrypt a particular encrypted messaging app, when they might move on to something much, much harder or impossible to overcome. Your role is to ensure that these techniques are protected to the best of your ability, and to consider them as "law enforcement sensitive" or to classify them at a higher level of protection in your country or agency.Īnd the reason is that we want to make sure that widespread knowledge of these capabilities doesn't spread. In a little more detail, these capabilities that are built into Cellebrite Premium are actually Cellebrite trade secrets, and we want to continue to ensure their viability so that we can continue to invest heavily in research and development, so that we can give these capabilities to law enforcement around the world. So it's very important to keep all these capabilities as protected as possible, because ultimately, leaks can be detrimental to the entire law enforcement community worldwide. And in situations where it's too late, we help to put an end to victims' families and, ultimately, solve crimes and put people behind bars. Well, we have to recognize that this capability actually saves lives. The following list are those who make up this current set of modules, so I hope you'll enjoy meeting each and every one of them.īefore we start, it's very important to review the confidentiality and operational security issues that we have to respect when using Cellebrite Premium, not only ourselves in our own Cellebrite Advanced Services laboratories, but especially you in your own laboratories around the world. Thank you and enjoy.ĭid you know that Cellebrite Advanced Services has 10 laboratories in nine different countries around the world? Well, to take advantage of all these capabilities, we're working together to bring you this training, so you'll hear from colleagues from all over the world. And I'm happy to launch this initial module covering system overview and orientation for Cellebrite Premium. Here is the full transcript of the training video: Transcription of the Cellebrite private training video:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |