• Training
  • Support
  • English
Explore Products
  • Products
    • Public safety
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Federal agencies
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Military & intelligence
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Enterprise
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
    • Service providers
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
  • Resources
    • All resources
          • All Resources

            Check out the latest resources and thought leadership for all resources.

            Explore All Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Resources By Industry

    • Enterprise
          • Enterprise Resources

            Check out the latest resources and thought leadership for enterprises and corporate digital investigations.

            Explore All Enterprise Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Public safety
          • Public Safety Resources

            Check out the latest resources and thought leadership for public safety.

            Explore All Public Safety Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Service providers
          • Service Providers Resources

            Check out the latest resources and thought leadership for forensic service providers.

            Explore All Service Provider Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Federal agencies
          • Federal Agencies Resources

            Check out the latest resources and thought leadership for federal agencies and government.

            Explore All Federal Agencies Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Military & intelligence
          • Military & Intelligence Resources

            Check out the latest resources and thought leadership for military, defense, and intelligence.

            Explore All Military & Intelligence Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
  • Our community
    • Officer wellness
    • Magnet Voices Program
    • Scholarship program
    • Agency Impact Award
  • Partners
    • Why partner with Magnet Forensics?
    • Strategic partners
    • Channel partners
    • Training partners
  • Why Magnet
  • Company
    • Our team
    • Careers
    • Press
  • Training
  • Support
    • English
  • English

Content Industry: Federal Agencies

How To Use IEF and Cellebrite to Find More Evidence On iOS Devices

October 9, 2014

By Phil Froklage

This is the third blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. In my previous blog post in this series, I explained how to find more mobile evidence on Android devices using IEF and Cellebrite.  Today, we’ll walk through the same steps … Continued

Criminal Investigation of a DDos Attack

August 27, 2014

By Phil Froklage

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions Show clear intent Obtain a criminal conviction Designed for digital forensics professionals who investigate network-based attacks, this webinar demonstrates techniques … Continued

Find Important Business Apps & OS Artifacts for Your Digital Investigations

August 19, 2014

By Phil Froklage

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of a person, not a computer. Almost every event or action on a system is the result of a user either … Continued

Forensic Analysis of Windows Shellbags

August 7, 2014

By Phil Froklage

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations.  What are Shellbags? While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation.  Shellbags … Continued

Investigating IP Theft – Computers, Smartphones and the Cloud

May 2, 2014

By Phil Froklage

In the first half of this IP forensics webinar, Heather Mahalik from SANS Institute offers tactical considerations for examining smartphone, cloud and computer artifacts in the event of intellectual property theft. She explores the challenges of investigating an IP theft case with the emergence of BYOD and cloud storage providers in the enterprise space. In … Continued

Find Important Business Apps & OS Artifacts for Your Digital Investigations

April 29, 2014

By Phil Froklage

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of a person, not a computer. Almost every event or action on a system is the result of a user either … Continued

How important are Facebook Artifacts?

April 22, 2014

By Phil Froklage

Facebook can be an indispensable online resource when recovering forensic artifacts to use as digital evidence. It can provide a glimpse into an individual’s life, offer geographical information to indicate where a person was on a specific date, and can reveal the identities of close friends and family. With Facebook applications available on most mobile … Continued

How to Uncover the Covered Tracks

April 22, 2014

By Phil Froklage

Download the white paper today! There are a variety of techniques used by suspects to erase and/or hide the things they do online. In this white paper, we will explore 3 different methods a person might use to conceal their online activity, before, during and after. Uncover “Hidden” Evidence Using Computer Forensics Tools We will … Continued

Skype Forensics: Analyzing Call & Chat Data From Computers & Mobile

April 9, 2014

By Phil Froklage

As a leading platform for voice and chat communications, Skype is often used as a platform for harassment or bullying incidents due to the perception that an individual’s actions are anonymous while on the Internet. Skype forensics analysis can yield valuable digital evidence for forensic investigators. In this white paper we’ll offer insight into where … Continued

Webinar: Geolocation Artifacts and Timeline Analysis in Digital Forensics

December 11, 2013

By Phil Froklage

In this webinar, Jad Saliba, Founder and CTO of Magnet Forensics, will take you through a fictional case study involving child luring that leads to murder. You will discover how digital forensics, geolocation artifacts and timeline analysis in particular, can be critical in solving cases like these and where you can look to find the … Continued

Posts navigation

Older posts
Newer posts
We use cookies on our website.

To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*

View Privacy Policy Accept
Magnet Forensics Logo
Products
  • Magnet One
  • Magnet Axiom
  • Magnet Axiom Cyber
  • Magnet Graykey
  • Magnet Graykey Fastrak
  • Magnet Nexus
  • Magnet Verakey
  • Magnet Verakey Fastrak
  • Magnet Witness
  • Magnet Automate
  • Magnet Review
  • Magnet Outrider
  • Magnet Griffeye
  • Magnet Griffeye Operations
  • Magnet Griffeye Enterprise
  • Magnet Verify
Partners
  • Strategic partners
  • Channel partners
  • Training partners
Community
  • The Auxtera Project
  • Magnet Forensics Scholarship Program
  • Agency Impact Award
  • Merchandise store
  • Magnet Idea Lab
Company
  • Careers
  • Our team
  • Magnet Idea Lab
  • Press
Resources
  • Resource center
  • Events
  • Blog
  • Free tools
  • Artifact exchange
  • Officer wellness
  • Customer stories
  • Grants for law enforcement
Support
  • Investigators’ Corner
  • Customer portal
  • Contact us
  • Subscribe to our emails
Training
  • Training overview
  • Courses and certifications
1 (844) 638-7884 sales@magnetforensics.com
  • Accessibility
  • Legal
  • Cookie Policy
  • Export approach
  • Trust & Security
  • Privacy Policy
  • California Collection Notice
  • Terms of Use
  • Email Preferences

Copyright© 2025 Magnet Forensics

Start modernizing your digital investigations today.

Complete the company & contact information form below and sales will be in touch with you shortly.