Chat Examiner

Chat Examiner

Chat Examiner Product Image
Paraben's Chat Examiner is a component of Paraben's P2 Forensic Collection of computer forensic analysis tools. This specialized tool focuses on the analysis and reporting of Internet chat logs. Chat Examiner supports ICQ 1999-2003b, Yahoo, MSN 6.1 and 6.2, Trillian, and Miranda chat logs. Features include an auto-search function, filtering and advanced searching.

Expand for more details on this Product

SPEKTOR Drive Litigation Support and Forensic Incident Response Tool

Product From Evidence Talks

UK digital forensic experts Evidence Talks released SPEKTOR Drive. It is the latest powerful e-discovery, litigation support and forensic incident response tool designed for non-expert users, and will reduce the need for outsourced expertise, which will lower the cost of responding to litigation, digital incidents and forensic investigations.

Get Info Now

Forensic Toolkit (FTK) Version 5.1

Product From Accessdata Group LLC

The big challenges digital investigators face is the time and effort required to sift through the sheer volume of case data across their devices. They use several third party solutions to handle specific tasks which add greater complexity and resources.  

Get Info Now

MiniDAS

Product From CyanLine

CyanLine's free software grants law enforcement agencies the power to capture and unlock never-before-seen bonus data. Inspired by CyanLine’s Fast Disk Acquisition System (FDAS), MiniDAS allows investigators to obtain critical metadata, also known as “data about the data,” and collect a forensic image, and is available for free to all law enforcement agencies worldwide.

Get Info Now

Mobile Examiner Trainnig Certification Program

Product From Cellebrite

Cellebrite, the leading developer and provider of mobile forensic solutions, today announced the launch of a new training and certification program. The new program delivers a higher quality, standardized mobile forensics training curriculum, culminating in a formal Cellebrite Certified Mobile Examiner (CCME) credential. The program empowers mobile forensic, investigative, and intelligence professionals in law enforcement, military, and corporate environments to employ mobile forensics best practices in their everyday work, and when applicable, to defend their practices with confidence in a court of law.

Get Info Now

Shadow 3

Product From VOOM Technologies Inc.

To access a suspect’s computer, traditional procedure involves removing the hard drive, creating a forensic image (a duplicate copy) and then analyzing that copy using sophisticated industry-specific software. 

Get Info Now

Steganography Analyzer Signature Scanner (StegAlyzerSS)

Product From Steganography Analysis and Research Center

StegAlyzerSS is a steganalysis tool designed to extend the scope of traditional computer forensic examinations by allowing the examiner to scan suspect media or forensic images of suspect media for uniquely identifiable byte patterns, or known signatures, left inside files when particular steganography applications are used to embed hidden information within them. Automated extraction algorithms unique to StegAlyzerSS can be used to recover hidden information.

Get Info Now

Steganography Analyzer Artifact Scanner (StegAlyzerAS)

Product From Steganography Analysis and Research Center

StegAlyzerAS is a steganalysis tool designed to extend the scope of traditional computer forensic examinations by allowing the examiner to scan suspect media or forensic images of suspect media for known artifacts of steganography applications.

Get Info Now

Mem Marshal

Product From ARCHITECTURE TECHNOLOGY CORP. (ATC-NY)

ATC-NY's new forensics tool - Mem Marshal 1.0 - is a user-friendly, automated memory analysis system that assists and automates computer forensic investigations of volatile memory (RAM) images. Mem Marshal enables computer forensic investigators to analyze and effectively make use of information contained in volatile memory. Memory analysis produces important, case-relevant data for investigators that cannot be obtained from disk analysis, such as running applications, open files, and active network connections.

Get Info Now

RTX Secure Tower Enclosure with Encryption

Product From WIEBETECH, A BRAND OF CRU-DATAPORT

Protecting sensitive data from security breaches is easy with CRU-DataPort’s new line of RTX Secure encrypted storage towers. Specifically designed for government agencies with top-secret data, these units are now available for anyone that needs to prevent unauthorized access to confidential files. RTX Secure high performance tower enclosures, with AES 256-bit (FIPS 140-2) hardware based encryption, offer TrayFree™ removable bays for easy hot swapping and offsite data backup scalable to the amount of storage needed. Units are available with 4, 6 or 8 TrayFree bays and multiple interface options (Multilane, eSATA (point to point), eSATA (port multiplier), iSCSI and Quad (eSATA, FireWire 400/800 or USB 2.0).  The units support any capacity 3.5” SATA drive.

Get Info Now

UFED CHINEX

Product From Cellebrite

Cellebrite announced the launch of UFED CHINEX, an end-to-end solution for extraction and decoding of data and content from thousands of Chinese mobile phones. UFED CHINEX will enable law enforcement agencies to support the full forensic analysis of Chinese mobile phones.

Get Info Now