IPL - Intelligence Products Limited - products

By: Intelligence Products  11-11-2011

The Cellebrite UME36 Forensics is a portable, standalone device which can securely extract vital data such as phonebook, pictures, videos, SMS- text messages, call logs, ESN and IMEI information from more than 1200 handset devices, including internal phone memory, SIM memory, Smartphones and PDAs.

The UME-36 examines mobile phones using a data cable (USB and serial), IrDA or Bluetooth adapter. In addition, the UME-36 physically acquires complete GSM SIM and USIM card information, including deleted data. There is no need for a PC in field use. Simply collect the data at the location that the device is seized to a USB disk drive. The data can then be analyzed in the forensics lab or station.

UME-36 Forensics edition is constantly updated with support of new mobile devices. By working closely with major vendors, Cellebrite ensures that future devices are supported as soon as they are released to the market.

Features and Functionality

Supports more than 1,200 handsets available in the market today, regardless of network carrier or network technology.

Content types - The UME-36 forensics supports extraction of the following data types:

Call Logs (Received, Dialed, Missed)


Text Messages (SMS)



Audio content (including recordings)


Mobile number of extracted handset

Physical SIM/USIM data extraction

The UME-36 Forensics Kit includes:

UME-36 forensics device

Full set of data cables (over 40 cables)

Bluetooth adapter

Power supply

UME Content Manager Utility Program

Operation Manual

Customized carrying case with cable organizer

The UME Forensics Content Manager creates a detailed report of the extracted data in HTML format.

The report contains:

Time stamp of the transaction

IMEI (GSM) or ESN (CDMA) of the phone

Examined phone details

Detailed list of all phonebook contacts

Detailed list of SMS messages on the phone.

Detailed list of call logs (Incoming/Outgoing/Missed)

Images/Videos/Audio/Recording details including file name, data

type, size, creation date and MD5 signature with a link to the file.

All extracted data can be saved locally to the PC hard drive or remotely

to an organization’s backup server.