Sharing is Caring: Empowering the Whole Team to Collaborate
Every examiner, forensic analyst, or investigator has to share findings with peers and stakeholders.
Every examiner, forensic analyst, or investigator has to share findings with peers and stakeholders.
This year, the National Center for Missing and Exploited Children (NCMEC) reported that child sexual abuse material (CSAM) reports have increased from “983,734 reports in March 2019 to 2,027,520 this March.”
The global pandemic accelerated workplace shifts towards new ways of working, many involving online work and new technologies. Law Enforcement Agencies and Digital Forensic teams were already re-imagining new workflows to cope with rising digital evidence volumes.
With AXIOM 5.2, we are expanding support of Facebook acquisition, more options for Media Explorer, and releasing the Project Prague™ beta.
Project Prague Beta allows searching across cases for specific identifiers that’ve been tagged in AXIOM, while offering cross-case analytics.
You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.
The Magnet Training Team wants to give those of you that nominated us in the DFIR Degree Program or Training Class of the Year category in this year’s Forensic 4:cast awards, our most heartfelt gratitude.
Collecting data from Instagram via the Cloud directly in Magnet AXIOM and Magnet AXIOM Cyber can provide investigators with the most recent posts associated with a hashtag or user activity within public facing information. Acquiring data via the Cloud Module is particularly valuable because the information is collected immediately, whereas warrant returns, for example, provide … Continued
Learn how to utilize the CameraForensics tool as part of your workflow in Magnet Griffeye to efficiently identify connected images and discover critical leads faster.
With Apple’s Safari application typically taking the #2 browser spot worldwide across both computer and mobile platforms, examiners need to understand the how’s and the whys of Safari’s operation on both macOS and iOS. Is the information missing from the device because the user took an action? Or because of a default system preference? What preferences were set, anyway? This talk will address how to find the latest Safari’s preference data for per-website controls, global application preferences, and even how to potentially track information from Safari’s Private Browsing.