Shahar Tal, VP Research, Cellebrite

Shahar, tell us about yourself, your role as VP Research, and Cellebrite’s Security Research Labs.

I have the outstanding honor to work with one of the most brilliant teams in our profession. I lead Cellebrite’s Security Research Labs, which are dedicated to unlocking, extraction and analysis research, and development. We are the ones discovering new methods to extract data from all devices and data sources of interest.

While we’re mostly focused on Android and iOS devices, we have the skills to pick apart, study, and reverse engineer any device of interest, such as drones, wearables, and more. Cellebrite’s Digital Intelligence solutions empower agencies to access, manage, and leverage digital data to yield actionable results that move investigations forward. Digital Intelligence is the data extracted from digital sources that can be used for forensics and the process by which agencies access and manage that data.

My department is responsible for the research and development processes, from the inception of a new method to the delivery of production code. We work in unison with all departments within Cellebrite to fully execute and deliver our vision into our products and services.

What does a typical day look like for you?


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

My day is spent talking with my leaders and co-workers over Zoom meetings, reviewing project progression, ongoing issues, technical challenges, and strategic growth plans. I try to reach out to every team member and pay special attention to what drives us forward, both as individuals and as a team.

How do you spend your spare time?

I try to spend my spare time with my family, I have two young children who are a blast to hang out with! In these pandemic times, this usually means playing with the kids at home or teaching them something interesting. We love traveling as a family and visiting theme parks, zoos, or farms. Late at night I will usually catch a Netflix show or movie together with my wife.

What are the big investigative and forensic challenges Cellebrite customers are facing these days, and how is your team helping them to meet them?

It’s quite evident that device access has become more and more difficult over the years. The ubiquitous deployment of advanced encryption schemes, combined with dramatic improvements in device operating system security, has pushed the technical challenges to new boundaries. My teams are fully equipped with the skill sets to solve these challenges and produce unmatched capabilities at a phenomenal rate.

What’s exciting you most about Cellebrite’s latest products and solutions?

I take great pride in the progress we have made in the breadth and depth of device unlocking and extraction support that we were able to provide to our customers. Cellebrite focuses on providing customers with tools and solutions to quickly access digital data and find hidden connections to solve cases faster.

While many other forensics providers made incremental feature releases this last year, no one has come close to matching UFED and Premium coverage, in respective comparison, by a wide margin. Cellebrite Advanced Services (CAS) continues to provide law enforcement customers around the world with groundbreaking technology, assisting investigative forces to uncover the truth and deliver justice everywhere.

How does your previous experience with vulnerability research inform your research for Cellebrite?

Working in concert with many other team members, I bring unique perspectives and experience in completing vulnerability research work on the latest technologies. We convert this domain understanding into a stream of previously impossible capabilities. This is one of the most beautiful things about our line of work – we literally create magic!

“Digital intelligence” can mean a lot of things. How does Cellebrite define it and how do Cellebrite’s solutions reflect that definition?

Cellebrite has a clear vision of transforming the investigative domain in ways that agencies today can only begin to imagine. The greatest minds in the company are working together to outline how to connect the dots from accessing, collecting, decoding, and analyzing the data, to creating investigative insights—all connected by robust management solutions.

We are determined to provide a range of solutions in this domain, wherever agencies and enterprises require the most. I believe in our leadership capacity both on the technological front and in reshaping the industry together with our partners, to complete the offering. Cellebrite’s unique leadership position creates this opportunity and Cellebriters are doing this with a passion and determination to make an impact for a safer world.

How did the pandemic impact your team, and how did your response ensure customers could still be served?

Luckily, many of our tasks are very suitable to “work-from-home” deployment as we have adjusted to stay-at-home measures. We replaced corridor conversations with ongoing chats, calls, and video meetings. Our global team is spread out across multiple continents, so this adjustment was natural for many of us. We keep in touch with all of our colleagues in the same way, supporting CAS activities, delivering new releases, and taking part in community forums.

What’s next for Cellebrite tools as 2020 comes to a close and 2021 approaches?

We are working on a number of extremely exciting new projects, all of which we expect to make a strong impact, redefine “what’s possible,” and empower our customers like never before. These types of projects naturally take time, but I can guarantee our customers will find value in the new offerings.

Leave a Comment

Latest Videos

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw 

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_5f72B6DD5wk

Programming Languages, Flipper And Gaming

Forensic Focus 24th May 2023 11:43 am

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian. 

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git. 

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git. 

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian.

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git.

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git.

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_BX15Z_xF8mA

Preventing Data Leaks With Git Guardian

Forensic Focus 3rd May 2023 11:07 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...