A Guide to Peak Hardware Performance for Magnet AXIOM
Recently, I have seen user questions about hardware choices as it relates to performance with Magnet AXIOM or Magnet AXIOM Cyber. When it comes down to it, we all want our cases processed faster!
Recently, I have seen user questions about hardware choices as it relates to performance with Magnet AXIOM or Magnet AXIOM Cyber. When it comes down to it, we all want our cases processed faster!
Privacy is becoming increasingly prevalent in everyone’s day-to-day vocabulary. Over the past five years we have seen a surge in illegal activities taking place in the dark web market vendor space, with many of these transactions having devastating impacts on our communities due to the rise in fentanyl deaths caused from overdoses.
Today’s guest for the Digital Forensics in Real Life Podcast is Jim Cole, a retired Supervisory Special Agent with Homeland Security Investigations (HSI). He shared the case of Daniel Harris—a disgraced former top gun Navy F-18 pilot who sextorted at least 70 child victims around the globe—live on stage at the Magnet User Summit in Nashville.
A critical component of digital forensic examinations is the need to collaborate and discuss the findings from the case data with other stakeholders. This can include attorneys, other investigators, Human Resources, clients, and more.
In this episode of Mobile Unpacked, Chris Vance will discuss user activity tracking artifacts and how they can be utilized in your forensic investigations. Modern smartphone operating systems use multiple systems of monitoring user behavior and device metrics to craft a more user-friendly experience. This allows the OS to almost “predict” what application or person … Continued
Since Magnet Forensics’ inception, we’ve been dedicated to our mission statement: Seek Justice and Protect the Innocent. Combatting Child Sexual Abuse Material (CSAM) is a big part of that.
Unlike its smartphone counterpart, Android’s messaging applications are as fragmented as its operating system distribution. This next Mobile Unpacked episode will discuss the key points relating to recovering SMS, MMS, and RCS messages from both the core storage locations of Android as well as the additional storage areas where information may reside. Learn how Android … Continued
With AXIOM 7.0, we’ve delivered new features for more effective collaboration, better support of CSAM investigations, and more!
Adhere to privilege material workflows and reduce the risk of inadvertent exposure or misuse of privileged material in AXIOM/AXIOM Cyber 7.0.
We’re continuing to make collaboration easier and more efficient across our products with tag syncing from AXIOM to REVIEW.