Quantcast
Channel: Magnet Forensics
Viewing all 1190 articles
Browse latest View live

Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 2

$
0
0

In this series, a few forensics experts within Magnet Forensics are sharing their suggestions for nominations in this year’s Forensic 4:cast Awards. In this second installment, Jamie McQuaid, Forensics Consultant, highlights people in the DFIR community who are making valuable contributions. You can submit your nominations (including Magnet AXIOM for DFIR Commercial Tool of the Year) here.

As many of you might have noticed, we’re taking a different approach to the Forensic 4:cast awards this year. Lee Whitfield decided he wanted to make some changes to the awards and formatting, which I think is a great way to get more community involvement and inclusion. With that in mind, a few of us at Magnet Forensics are going to each select a few categories and suggest a few of our own personal favorites that we really enjoyed throughout the year.

For myself, I picked a few categories for things that really stood out for me this past year or something that I used frequently enough that it deserved more recognition. My colleague Jessica Hyde provided some of her favourite picks here in Part 1, so if you haven’t seen those take a look. I have not seen or discussed picks with her before writing my own, so I have no idea if they will be completely the same or overlap at all. Without further ado, my picks:

DFIR Non-Commercial Tool of the Year

For me, this one is an easy choice. I probably use Volatility more than any other open source tool in my toolbox and I’m sure there are many other examiners out there who feel the same. If analyzing memory was required in an investigation, Volatility has been my primary tool for years and has consistently found relevant data needed to solve my case. Last year, we integrated Volatility into Magnet AXIOM to enhance the memory analysis capabilities which meant I ended up using it even more than before.

DFIR Resource of the Year

I usually read a lot of books, blogs, and other online resources in my own personal time, but that has really been limited this past year with the birth of our second child. Anyone with small children will attest that finding some quiet time to read up on file systems and system internals really takes a hit.

So Phill Moore’s This Week In 4n6 gets my nomination for the Resource of the Year, not only because it’s a great consolidated source of information in the DFIR space but even more for me this year because it has allowed me to get a high level summary of everything going on in the industry without needing to take the extra time to search and find anything that might be interesting or relevant.

DFIR Groundbreaking Research of the Year

For this category, I had to read the description a little closer to understand if my nomination fit here. The keyword for me here is groundbreaking. What was so innovative that it changed how we conduct DFIR investigations?

With that in mind, I think it’s an easy choice to nominate Grayshift’s ability to exploit iOS devices and crack passcodes with its GrayKey tool. Apple has continued to lock down access to its devices year after year and we’ve generally had to accept it. Prior to Grayshift’s breakthrough technology and methods, we were all stuck with iTunes backups and even then, only on unlocked devices. While its technology is limited to law enforcement only and doesn’t benefit the entire DFIR community, I still think it deserves recognition for having such a huge impact to our industry in such a short period of time. In the year it has been available, I have heard many stories where it has enabled access to devices that saved lives, rescued children and helped solve some of the worst crimes that law enforcement has to deal with on a regular basis and that’s why they get my nomination.

Overall, I have a ton of other favourites (this industry makes it easy) that I will likely nominate and vote for, but these ones really stood out to me for their contributions to our industry and more directly my daily work in this industry.

Jamie McQuaid

Forensics Consultant

Magnet Forensics

The post Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 2 appeared first on Magnet Forensics.


Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 3

$
0
0

In this series, a few forensics experts within Magnet Forensics are sharing their suggestions for nominations in this year’s Forensic 4:cast Awards. In this third installment, Tarah Melton, Forensics Consultant, highlights people in the DFIR community who are making valuable contributions. You can submit your nominations (including Magnet AXIOM for DFIR Commercial Tool of the Year) here.

Every year, Lee Whitfield coordinates the Forensic 4:cast Awards to recognize the outstanding contributions to the DFIR community. As you may be aware of by now, we at Magnet Forensics are approaching the Forensic 4:cast nominations a bit differently this year. A few of us have been given the opportunity to share our personal recommendations for nominations for these awards.

You may have already read about some great picks for nominations from my colleagues at Magnet. If not, be sure to check out Part 1 of this series by Jessica Hyde and Part 2 by Jamie McQuaid. In this third installment, I will be giving my personal nods to some stand out contributors to the field. These are my personal opinions, not the official opinions of Magnet Forensics. Read on to see a few of my choices!

DFIR Book of the Year

Practical Mobile Forensics – Third Edition by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

If you’re looking for a great reference for smartphone forensics, look no further. Practical Mobile Forensics receives my nomination because of the vast amount of useful information iOS, Android, and Windows mobile devices. From acquisitions to analysis and all the questions that arise in between, this book offers a thorough guide to help both experienced examiners or newcomers to the field tackle a case involving smartphone forensics. I have used this book for reference many times over the years when performing mobile examinations, and valuable updates were added with the release of the third edition in early 2018.

DFIR Non-Commercial Tool of the Year

Volatility

Volatility is a standout pick to me when it comes to open source forensic tools. Utilizing Volatility when conducting memory analysis is common practice in my experience, and so I feel pretty strongly in this recommendation. The wide array of plugins for Windows, Linux, and Mac platforms give examiners ample ability to conduct in-depth memory analysis for almost any investigation. I have found Volatility to be a vital analysis tool in many examinations I have worked.

DFIR Undergrad, Graduate, or Training Class of the Year

Bloomsburg University of Pennsylvania

As a graduate of this program myself, I am thrilled to recommend the Digital Forensics Undergraduate Program at Bloomsburg University for nomination. The program is updated continuously and is incredibly comprehensive, covering file systems, mobile devices, Python scripting, E-Discovery, tech writing, malware forensics, and so much more. Students are trained to use the most popular and up-to-date commercial forensic tools in preparation for real world lab environments, arming graduating students with a solid knowledge base to prepare them for a career in the DFIR industry.

Bloomsburg’s Digital Forensics program is recognized as a National Center of Academic Excellence (CAE) in Cyber Defense Education with a focus in the area of digital forensics by the National Security Agency and the Department of Homeland Security. Additionally, they hold an annual digital forensics conference, BloomCON, which last year drew in over 500 attendees. BloomCON offers both students and professionals a great venue to interface within the DFIR community, as well as informative lectures and fun forensics challenges.

The mentions above are just a few acknowledgements that have personally influenced my work in digital forensics, but I am extremely appreciative of the work that everyone in the DFIR community has done to truly make a positive impact. Thanks for reading everyone, and don’t forget to nominate your picks for the Forensic 4:cast Awards!

Tarah Melton

Forensic Consultant

Tarah.Melton@magnetforensics.com

The post Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 3 appeared first on Magnet Forensics.

Welcome to the New Self-Service Customer Portal!

$
0
0

We’re excited to announce our new self-service Customer Portal and knowledge base. We’ve revamped the entire portal to help you get the answers you need as quickly as possible.

Using your existing Customer Portal account, you can access product downloads, read product documentation, log support tickets, and search more than 125 how-to, solution, and reference support articles!

Log in to the Portal now!

The new knowledge base helps Magnet Forensics better support you outside our standard hours of support (Monday – Friday from 8:30 to 5:30 Eastern Time). By typing a question, keyword, or topic in the search bar, you can discover solutions to common troubleshooting questions, learn how to use key product features, read the latest release notes, and more.

Check back soon! Over the coming months, we’ll not only continue to build out the portal with new features, but we’ll also continue to add new articles to the knowledge library. If you have suggestions for knowledge base articles, or other ideas for the portal, you can submit them to docs.feedback@magnetforensics.com.

Thanks for your support!

The Magnet Forensics Support Team


The post Welcome to the New Self-Service Customer Portal! appeared first on Magnet Forensics.

Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 4

$
0
0

In this series, a few forensics experts within Magnet Forensics are sharing their suggestions for nominations in this year’s Forensic 4:cast Awards. In this fourth (and final) installment, Trey Amick, Forensics Consultant, highlights people in the DFIR community who are making valuable contributions. You can submit your nominations (including Magnet AXIOM for DFIR Commercial Tool of the Year and MAGNET App Simulator for DFIR Non-Commercial Tool of the Year) here.

Since 2009, Lee Whitfield has organized, promoted, and published the annual Forensic 4:cast Awards. Lee does this as a community event with both a nomination and a voting phase. During the nomination phase, you can nominate as many tools, projects, and people as you want for each category. The rules and list of categories can be found here

For myself, I’ve highlighted a couple of categories listed below. My colleagues shared their nominations in previous posts: Tarah Melton provided some of her favorite picks here in Part 3, while Jamie McQuaid provided his insights in part 2. Jessica Hyde kicked off our Forensic 4:cast series, naming her picks in Part 1, so if you haven’t seen those articles make sure and take a look. These are my personal opinions, not the official opinions of Magnet Forensics.

DFIR Groundbreaking Research of the Year

As soon as I read “Groundbreaking Research” I knew who I wanted to nominate for this category: Grayshift, makers of GrayKey. For years, forensicators have been challenged when confronted with iOS investigations due to the limited access Apple allows in most circumstances. Casework revolving around iOS investigations, specifically for law enforcement, received quite a surprise last year when this new technology was announced, allowing for both file system level acquisitions and password cracking. For the first time in years, law enforcement investigators have a tool backed by amazing research that provides a new avenue for gaining access to information that can be invaluable in an investigation.

In the year since GreyKey was released, I’ve heard countless stories from my brothers and sisters in blue, where data being acquired has been the difference between closing the case, and it remaining open with little hope of being solved. Grayshift has changed many department’s iOS processing procedures over the last year, based off the research that went into allowing for a collection that far exceeds the logical / iTunes based backup that forensics professionals were left with in years past.

DFIR Blog of the Year

Since my last nomination revolved around research on iOS security, my next pick continues the trend with DFIR Blog of the Year, which I would like to nominate Sarah Edwards (@iamevltwin) for! Sarah consistently provides valuable research and tools for the DFIR community on her website, http://www.mac4n6.com. The website is packed full of great macOS and iOS forensic blogs, while also including links to the different presentations Sarah has given. Sarah is also the brains behind the popular SANS Mac Forensic Analysis class, FOR518.

The Apple Pattern of Life Lazy Output’er (APOLLO) project was released by Sarah in early November at the Objective by the Sea Conference, with many updates coming in the form of her blog series since. APOLLO is a collection of Python scripts, or as they are referred to on the blog, modules, for SQL queries from various databases found from within iOS and macOS systems. Since November of 2018, http://www.mac4n6.com has had consistent updates to the research and modules for APOLLO, which is a fantastic resource for the DFIR community. If you haven’t yet, make sure you bookmark Sarah’s blog!

There has been tremendous work done by so many researchers in the DFIR community over the last year, and while I’ve only named a couple here, make sure to vote for as many nominees as you can for this year’s Forensic4:Cast awards. As I mentioned earlier, you can nominate as many individuals, projects, and software as you want!

The post Who We’re Nominating for This Year’s Forensic 4:cast Awards: Part 4 appeared first on Magnet Forensics.

GrayKey Integration and Further Cloud and Mac Support Come to Magnet AXIOM 3.1

$
0
0

The innovation of Magnet AXIOM 3.0 continues with the release of Magnet AXIOM 3.1—which is now available to download! Either upgrade within AXIOM, or head over to the Customer Portal to download AXIOM 3.1. 

In this release, we’re excited to have developed our exclusive technology partnership with Grayshift by integrating the loading of GrayKey images directly within AXIOM. We’ve also introduced a new SQLite viewer to give you better access when reviewing SQLite databases. And we’ve brought support for 12 Chromium-based browsers on Android—leading to 90 new supported artifacts. 

On top of these new features, we’ve continued to build on the great new features of AXIOM 3.0, with new Mac artifacts and further enhancements to Cloud acquisition (including Facebook Warrant Returns and public Twitter acquisitions), Timeline, and media categorization.  

If you’re not already using AXIOM and want try AXIOM 3.1 for yourself, request a trial today


Sal Aziz, a Product Marketing Manager at Magnet Forensics, shares some of the highlights of Magnet AXIOM 3.1.

Load GrayKey Images Directly Within AXIOM  

Building on our exclusive technology and distribution partnership with Grayshift, AXIOM 3.1 brings integration with GrayKey devices, allowing you to connect and load images directly into AXIOM Process—eliminating the need to manually copy and load images. 

This integration streamlines the process for selecting and loading GrayKey images. Once connected, you can see all images stored on the device, and pick the image components you want to process. AXIOM will look after loading the image from GrayKey to AXIOM. Plus, it will use the image hashes to validate that the files were correctly loaded. Once you’re done loading the GrayKey images, simply choose the image components for processing. 

Check out this how-to guide on how to load GrayKey images with the new GrayKey integration within AXIOM.

Want to learn more about using AXIOM and GrayKey together in your iOS investigations? Join us and Grayshift for a live webinar on May 21 at 10:00AM & 2:00PMET. You can register here.

New in AXIOM 3.1: SQLite Viewer 

The new SQLite viewer will give you greater flexibility in reviewing evidence so you can quickly and easily find the most relevant data. The new viewer includes the ability to: 

  • Quickly review table contents 
  • Filter on columns 
  • Search tables 
  • Execute custom SQL queries 
  • Export directly to .CSV and Excel files​ 

The new SQLite viewer is launched when you select any .db or .sqlite file from the File System Explorer. It will allow you to stay within the context of AXIOM while enabling advanced search and review capabilities—speeding up your manual review and validation times.​  

Updates to Facebook Warrant Returns and Public Twitter Acquisitions 

AXIOM 3.0 brought the ability to process Facebook Warrant Returns using AXIOM Cloud, as well as gathering data from public Twitter profiles. With AXIOM 3.1, we’re ensuring that you can get even more data from those sources. 

Facebook Warrant Returns 

Facebook Warrant Returns includes a lot of information about a suspect’s Facebook activity. This includes details on anything that they had posted to the platform. When working on Facebook Warrant Returns, we have added the ability to collect and display information on pictures and status updates posted by the user.  

Twitter 

If you’re looking to collect publicly available Twitter information, you now have better control over the information you want to acquire. Now you can decide to only collect: ​ 

  • Tweets (all public tweets authored by or retweeted by the user) ​
  • Who they’re following (account information for accounts that the user follows) ​ 
  • Followers (account information for accounts that follow the user) ​ 

This update can greatly improve collection times—especially for accounts that have a large number of tweets, followers, or Twitter users that the suspect is following, which may not be relevant to the investigation.​  

Now Supporting 12 New Chromium-Based Browsers for Android 

AXIOM 3.1 introduces support for 12 new Chromium-based Android browsers and 90 new artifacts including web history, downloads, bookmarks, search details and more!  

There are many different Chromium-based browsers available to users that are popular in different regions and often advertise enhanced security or privacy capabilities. Each browser stores its own data including browser history, bookmarks, search history and other important artifacts that may be crucial to an investigation.  With this added support, you will have more opportunities to identify critical evidence in your cases through artifacts. ​Here are the browsers now supported: 

  • Aloha 
  • Android Browser
  • Brave 
  • Ecosia 
  • Iron Browser 
  • Kiwi Browser 
  • Lunascape 
  • Opera
  • Sleipnir
  • UC Browser
  • Whale
  • Yandex 

Read more about our new artifacts supporting Chromium-based browser artifacts over on our blog, here

Performance Improvements 

As always, we’re working to continually improve the performance capabilities of AXIOM. With AXIOM 3.1, we have reduced that amount of data we store in the attachment database when carving videos from evidence files, reducing the amount of memory being used during processing, as well as the footprint of the case on disk. In a baseline 500GB case, the overall footprint on disk was reduced by 36%, from 227GB to 140GB.​ 

Additionally, we’ve continued to refine the performance of the new Timeline view, introduced in AXIOM 3.0. 

Support for Exporting Media in Project VIC JSON Version 2.0  

AXIOM now supports exporting media in the Project VIC JSON version 2.0—in addition to the existing support for version 1.2 and 1.3. VICS 2.0 adds support for associating a number of additional attributes with media to support advanced investigative techniques. This will be helpful when you want to be able to leverage extended VICS data to better understand which media should be sent to Victim Identification teams for review. 

New Artifacts 

  • Contacts (MacOS) 
  • Quicklook Thumbnails (MacOS)
  • MacOS Keychain (MacOS)
  • Recovery Accounts (MacOS)
  • Mail.ru Agent (iOS & Android)
  • Reddit (iOS) 
  • Gmail (iOS)
  • Lyft (iOS)
  • Android Browser (Android)
  • MS Edge Chromium (Windows)
  • VLC Player (Windows & MacOS) 
  • Facebook Warrant Return (Photos)
  • Facebook Warrant Return (Status Updates) 

Updated Artifacts 

  • Prefetch (Windows) 
  • Skype (Windows & Android) 
  • NTLM Hashes (Windows)
  • Chrome (Windows & MacOS)
  • KnowledgeC (iOS)
  • Signal (iOS)
  • Mail (iOS) 
  • Instagram (iOS)
  • Gmail (Android)
  • Telegram (iOS & Android)
  • Tik Tok (iOS & Android) 

Get Magnet AXIOM 3.1 Today! 

If you’re already using AXIOM, download AXIOM 3.1 over at the Customer Portal. If you want to see how AXIOM 3.1 can help you find the evidence that matters, request a free 30-day trial today

The post GrayKey Integration and Further Cloud and Mac Support Come to Magnet AXIOM 3.1 appeared first on Magnet Forensics.

Magnet AXIOM 3.2 Now Supports Instagram Warrant Returns and Gets More Data from Macs

$
0
0

We’re happy to announce from Techno Security in Myrtle Beach that Magnet AXIOM 3.2 is now available to download! Either upgrade within AXIOM, or head over to the Customer Portal to get AXIOM 3.2.

In this release, we’re bringing support for Instagram warrant returns, the ability to search recently deleted files that are stored in Free Queue on Mac computers, and improvements to our recently enhanced SQLite Viewer.

If you’re not already using AXIOM and want try AXIOM 3.2 for yourself, request a trial today.

AXIOM 3.2 now supports getting data from Instagram Warrant Returns.

Instagram Warrant Returns

In addition to support for Facebook Warrant Returns, AXIOM can now ingest and analyze warrant returns from Instagram. This will help shed light on a person’s online persona, allowing you to see who is following the user, who the user is following, posts in addition to direct stories, and direct shares (including media and messages).

Get data from Free Queue space on Mac computers.

Find More Deleted Data

In addition to searching the known file system for artifacts, AXIOM will now search recently deleted files that are stored in Free Queue in APFS of Mac computers.

Also, when AXIOM encounters a container such as a mobile backup or archive (e.g. zip or tar files), it will now search deleted archives for additional artifacts.

SQLite Viewer Improvements

AXIOM 3.1 saw the introduction of an overhauled SQLite Viewer, and AXIOM 3.2 continues to make AXIOM’s SQLite Viewer even easier to use.

You can now convert various different data types in SQLite to more human-readable data, including date/times, binary data and various types of encoded strings. For binary data, you can view common data types such as pictures and plists within AXIOM. And we’ve added “open with” functionality to give you the ability to open binary data in an app or program of your choice.

Media Categorization Enhancements

On top of the enhancements brought to media categorization in AXIOM 3.0, AXIOM 3.2 now supports setting a priority when configuring hash sets. This is useful because AXIOM will accurately assign evidence to the proper category when multiple hash sets have the same hash value and are assigned in different categories.

Summary information in PDF and HTML reports have also been added, making it easier to see how much known content was found by hash sets. It will also allow you to see the breakdown of content by category for materials graded by reviewers, making it easier to gather this information for reporting and charging purposes.

Additionally, AXIOM 3.2 now has the capability to more easily export reviewer graded content and select the specific categories that get hash data/media attachments included in the export when submitting back to Project VIC or CAID repositories.

New Artifacts

  • Live Photos (iOS)
  • TamTam Messenger (iOS/Android)
  • Life 360 (iOS/Android)
  • Whale (iOS)
  • Brave (iOS)
  • Ecosia (iOS)
  • Best Secret Folder (iOS)

Updated Artifacts

  • Signal (iOS)
  • WhatsApp (iOS/Android)
  • Facebook Messenger (Android)
  • Instagram (Android)
  • Twitter (Android)
  • Skype Lite (Android)
  • Tinder (Android)
  • Chrome (iOS/Android)
  • Recover FS Info When Carving Documents
  • MBOX Email (Windows)
  • Windows 10 Timeline (Windows)

Get Magnet AXIOM 3.2 Today!

If you’re already using AXIOM, download AXIOM 3.2 over at the Customer Portal. If you want to see how AXIOM 3.2 can help you find the evidence that matters, request a free 30-day trial today!

The post Magnet AXIOM 3.2 Now Supports Instagram Warrant Returns and Gets More Data from Macs appeared first on Magnet Forensics.

Magnet AXIOM Now VICS Certified by Project VIC International

$
0
0

Project VIC International and its partners are at the forefront helping to identify and rescue children from sexual exploitation. The VICS standard developed by Project VIC International sets the bar for many tools that law enforcement agencies around the world use for their child exploitation investigations.

Magnet Forensics and Project VIC International are proud to announce that Magnet AXIOM is now VICS certified for use with Project VIC and CAID hash sets.

Richard Brown, Director of Project VIC International says “Magnet Forensics has released one of the most comprehensive updates focusing on child protection by incorporating multi-national support for Project VIC child rescue ecosystems and combining this effort with artificial intelligence layers to assist our Victim Identification experts rescue children from continued abuse.”

The importance of thoroughly and efficiently organizing and sharing relevant media data is especially apparent when working ICAC investigations. Examiners need to be able to easily focus their analysis to provide rapid support to potential victims. The hash sets provided by Project VIC and CAID allows for just that.

Jad Saliba, Founder & CTO of Magnet Forensics says “Internet Crimes Against Children are some of the most horrific cases seen by Law Enforcement today. Alongside our partners like Project VIC International we’re constantly working to make sure that those who are undertaking this unbelievably important work have the best tools possible to get through more cases, faster, and with less exposure to the materials themselves.”

These hash sets allow for the sharing of hashes of known child sexual abuse material (CSAM) resulting in the rapid identification of illicit media on seized devices. Through the VICS metadata shared, examiners and investigators can focus their efforts on unknown victims or offenders to better prioritize victim identification investigations. Over time, this allows for more victims to be rescued, streamlines work efforts for participating agencies, and helps to limit over exposure to illicit material.

How Magnet AXIOM Helps for Child Exploitation Investigations

Rapid Media Categorization

AXIOM’s new media categorization features make it even easier to use Project VIC and CAID data to focus your investigation. Examiners now have the capability to efficiently grade media in AXIOM’s thumbnail view, leveraging keyboard shortcuts and rich previews to quickly move through large amounts of content in a case. This saves precious time when moving through your workflow by reducing the number of steps needing to be taken to move data between different tools for grading, and allowing the examiner to grade all of the media directly in AXIOM.

VICS metadata is also now shown for matched media items, during pre-categorization, to help focus victim identification efforts on unknown persons. Once categorization has been completed for a case, examiners can immediately save their results back to AXIOM’s hash database for use in future case work, and upload back to Project VIC or CAID for all other investigators to benefit from.

To read more about media categorization, you can check out a detailed how-to document here and watch and embedded video to see it in action.

Easy Management & Sharing of Hash Sets

Following the value that the Project VIC team puts on maintaining the quality of these datasets and providing a simple experience for users, we are committed to continuously enhancing our support for leveraging VICS data to assist in your forensic examinations. Much effort has been put into making sure that adding data from Project VIC or CAID in AXIOM happens as quickly and easily as possible.

AXIOM now supports import and export of VICS 2.0 JSON data for use in investigations. Exporting in VICS format allows examiners to share findings back to the various national VICS repositories (Project VIC US, Project VIC Canada, CAID, etc.)  for review, adding more relevant data which ultimately benefits the rest of the forensic community. AXIOM now also offers support for importing incremental hash sets to save time when updating Project VIC or CAID data for your cases.

Magnet Forensics is excited to continue working closely with Project VIC International and the community to take steps towards reducing the possible intermixing of unrelated hash sets—ensuring a high degree of quality control on the hash sets you use in your investigations.

Leveraging AI to Surface Content of Interest Quickly

Using Magnet.AI, examiners can process pictures and text-based conversations to quickly filter and sort possible CSAM content for further review by investigators. AI will quickly and accurately identify CSAM content, nudity, bedroom scenes, and much more in media, as well as flagging chat messages with sexual content in them and potential luring conversations. Found content is tagged and surfaced for review in AXIOM’s Case Dashboard, providing for time savings and a more informed starting point in your investigations.

Magnet.AI Picture Categorization

Certification is an Important Step

Certification by Project VIC International is an important step for Magnet Forensics to move forward in helping law enforcement agencies worldwide rescue children from unspeakable situations and apprehend offenders.

In places like the UK where tools must be certified by Project VIC International and have support for CAID hash sets, Magnet AXIOM is now an option for agencies to use within their child exploitation investigations.

Brown of Project VIC International says “Magnet Forensics’ new advancements in the child protection area is much needed. Police need to be armed with the best tools technically possible to fight this heinous crime. Magnet Forensics’ contributions and innovation in artificial intelligence are just some examples of their dedication to child protection globally.”

We hope you will utilize our continued developments of Magnet AXIOM for your investigations and, as always, your feedback is always encouraged so that we can provide our customers with the best experience possible. Please reach out to me at tarah.melton@magnetforensics.com with any comments or questions.

The post Magnet AXIOM Now VICS Certified by Project VIC International appeared first on Magnet Forensics.

Magnet AXIOM 3.3 Includes SIM Card Support and Updates to Warrant Returns

$
0
0

Magnet AXIOM 3.3 is now available within AXIOM or as a download over at the Customer Portal.

In this release, we’re bringing more warrant returns, performance improvements, and SIM card support. If you’re not already using AXIOM and want try AXIOM 3.3 for yourself, request a trial today.

New Snapchat Warrant Returns and Facebook Warrant Return Improvements

AXIOM Cloud can now ingest and analyze warrant returns from Snapchat to help shed light on a person’s online persona—allowing you to recover messages, group chat details, and all media files.

AXIOM 3.3 also brings support for a new format of HTML file-based warrant returns from Facebook in combination with an older, previously-support format.

SIM Card Imaging and Processing

AXIOM 3.3 now allows you to recover information stored on SIM cards, such as contacts and any SMS messages in addition to a number of artifacts, including unique ones like Integrated Circuit Card ID (ICCID) and International Mobile Subscriber Identity (IMSI.)

LG Lock Bypass Support

You will now be able to bypass the lock screen on certain LG-based devices and perform an acquisition of the device without needing the passcode.  ​

Keep in mind that this method will not work with all LG devices—particularly LG Nexus devices.

Media Categorization Enhancements

The last few releases have seen enhancements to media categorization within AXIOM, and AXIOM 3.3 is no exception. A few enhancements in AXIOM 3.3 include:  

  • The same media category is automatically applied to other media items that have the matching hashes — keeping you from duplicating the work or being exposed to the same content again​
  • A media categorization summary report is available (in HTML and PDF) and will include the number of unique hashes in each category, helping you determine how many illegal images are found in the case

Performance Improvements

AXIOM 3.3 is optimized to perform faster with large data sets. You should see a significant gain in performance when doing case load, searching, filtering, and sorting. ​

New Artifacts

  • QuickTime Player (macOS)
  • Real Player (Windows)
  • Verizon Messages (Android)
  • Glide (iOS & Android)
  • Cake.tv (Android)

Updated Artifacts

  • SMS/MMS (Android)
  • Instagram (Android)
  • Twitter (Android)
  • Chrome (iOS & Android)
  • Telegram (iOS)
  • Skype (Windows 10)
  • KnowledgeC (iOS)
  • TikTok (Android)
  • Significant Locations (iOS)

Get Magnet AXIOM 3.3 Today!

If you’re already using AXIOM, download AXIOM 3.3 over at the Customer Portal. If you want to see how AXIOM 3.3 can help you find the evidence that matters, request a free 30-day trial today!

The post Magnet AXIOM 3.3 Includes SIM Card Support and Updates to Warrant Returns appeared first on Magnet Forensics.


Download Magnet AXIOM 3.4 to Get New Mac Updates and Officer Wellness Features

$
0
0

With the latest release of Magnet AXIOM, we’ve brought a host of new features that will help reduce the stress on examiners exposed to disturbing materials—particularly CSEM.

Get Magnet AXIOM 3.4 within AXIOM or as a download over at the Customer Portal today to utilize these new Officer Wellness features as well as a number of new updates that are making Mac investigations faster and more robust.

If you’re not already using AXIOM and want try AXIOM 3.4 for yourself, request a trial today.

Officer Wellness for ICAC Investigations


A message from Magnet Forensics Founder & CTO, Jad Saliba regarding Officer Wellness.

The effects of chronic exposure to CSEM or IIOC (illicit images of children) can be immense for those who are performing ICAC investigations—including depression, feelings of worthlessness and thoughts of death/suicide.

With this in mind, we’ve included new features in AXIOM that can reduce overexposure to CSEM with the goal to promote improve officer wellness.These features are configurable and optional, allowing examiners to work the way that they want:

  • Blur or block media thumbnails
  • Mute audio on videos
  • Set timer reminders to take breaks or alerts to stop grading
  • View grading progress and set goals for amount of media graded

Trey Amick, Forensic Consultant, walks through some of those features and how they can be beneficial to those who are performing ICAC investigations.

It has become commonplace for forces to include SOPs for officer wellness, specifically for those officers supporting ICAC investigations who are directly exposed to illicit material, particularly during grading.  Encouraging officer wellness directly within AXIOM simplifies the implementation of SOPs and reduces burden on ICAC investigators​.

To learn more about how we’re addressing the challenges of ICAC investigations, sign up for our webinar on August 1. If you can’t make it to the live presentation, register anyway and we’ll send along a link to the recording afterwards.

Continued Mac Support

Our support of macOS and APFS continues to develop since the release of AXIOM 3.0—we’re excited to share that we’ve significantly reduced the time it takes to scan Mac images. We’ve seen up to 4x improvements in speed—in one example, a scan that once took 4 ½ hours now takes just 52 minutes!

Display Spotlight Metadata from macOS

Files on macOS can contain a number of additional attributes associate with each file on the file system—typically referred to as extended attributes. AXIOM 3.4 surfaces this metadata in a new card in the details pane, providing a view of common attributes of interest in the Artifact Explorer, and a full listing of attributes in the File System explorer.​

Carve Unallocated Space for Artifacts on APFS

Following on our support for carving the macOS free queue for artifacts in AXIOM 3.2, AXIOM 3.4 now adds support for carving unallocated space on APFS. This is typically limited to files that have been deleted and their associated blocks released back to the filesystem since the last password change. 

Enhanced Snapchat Support for iOS and Android

We’ve brought enhanced support to Snapchat, one of the world’s most popular apps. On the Android version, you can now recover chat messages, contact, groups, account information, as well as media from Snapchat Memories including the ‘My Eyes Only’ feature of the product.​ On iOS, you can recover information from SnapChat MyStory, along with support for saved messages​.

MTK Backup Acquisition and Processing

​MediaTek (MTK)-based devices offer users the ability to backup user data to a SD card, even on locked devices.  AXIOM now supports acquiring and processing these backups and includes a guided workflow that will walk examiners through the process of generating the backup on the device and processing the data within AXIOM.​

Examiners with a locked cell phone with a MediaTek chipset can attempt to use this method to gain access to the device information, without requiring the device passcode.

New Artifacts

  • Passwords and Tokens
  • Apple Health (iOS)
  • Waze (iOS)
  • PowerLog — Battery Usage (iOS)
  • PowerLog — Timezone (iOS)
  • Baidu (Android)

Updated Artifacts

  • Recover EXIF From Videos
  • Snapchat (iOS/Android)
  • Line (iOS/Android)
  • Viber (Android)
  • Instagram (Android)
  • Twitter (Android)
  • WhatsApp (Android)
  • Telegram (iOS)
  • UserAssist (Windows)

Get Magnet AXIOM 3.4 Today!

If you’re already using AXIOM, download AXIOM 3.4 over at the Customer Portal. If you want to see how AXIOM 3.4 can help you find the evidence that matters, request a free 30-day trial today!

The post Download Magnet AXIOM 3.4 to Get New Mac Updates and Officer Wellness Features appeared first on Magnet Forensics.

APFS Performance Improvements with Magnet AXIOM 3.4

$
0
0

One of the improvements made in the recent 3.4 release of Magnet AXIOM includes significant enhancements to APFS processing times allowing investigators to get access to their data as quickly as possible. Since AXIOM 3.0 was released earlier this Spring, we’ve continued expanding our macOS artifacts, which now also includes Free Queue carving, search capabilities of unallocated space, as well as the parsing of Spotlight metadata of files located on the system.

Get Magnet AXIOM 3.4 within AXIOM or as a download from our Customer Portal today to utilize the new Mac performance enhancements as well as new Officer Wellness features. Watch this video to learn more on the Officer Wellness features found in AXIOM 3.4 or watch our recent webinar: Addressing The Challenges of ICAC Investigations.

Mac Performance Enhancements

Before we get to the results of the testing, let’s first review the parameters of the test.

For these trials, we’ve run AXIOM before and after the 3.4 release on the same MacBook Air Image on two different machines. The MacBook Air housed an APFS formatted 256GB drive, and Recon Imager Pro was used to create the .E01 measuring 69GB in size.  

The image contains four APFS volumes listed below:

  • Volume 1: MacHD: 104.69GB
  • Volume 2: Preboot: 43.61MB
  • Volume 3: Recovery: 498.51MB
  • Volume 4: VM: 2GB

It’s also worth noting for APFS investigations, examiners will typically see four volumes with Preboot, Recovery, and VM. The “MacHD” in this case was renamed from “MacintoshHD”. If investigators see additional APFS volumes present, it’s recommended they be imaged and reviewed as part of the investigation due to the ease in which a user can create additional APFS volumes using the macOS’s built in Disk Utility application.

The hardware used for testing the new enhancements included both an i9 processor powered machine as well as an i7 machine (specs below).

Dell XPS 15 2018 MacBook Pro 
i9-8950HK CPU @ 2.90GHz 6 Cores / 12 Logical Processors 
32GB RAM 
Windows 10 Pro 
i7-8850H @ 2.60 GHz 6 Cores / 12 Logical Processors 
16GB RAM 
Bootcamp-Windows 10 Pro 
  • Both machines were connected via USB C & USB 3.1 to 2 external 1TB SSD’s (Samsung T5’s), one drive used for case files, the other for forensic images
  • Each Case file created for these tests were approximately 23.6GB

The Results

Utilizing the boot-camped MacBook Pro (i7) and AXIOM 3.2.1, we initiated our first test processing only the MacHD volume, with all artifacts selected, as well as MD5 hashing turned on. Once complete, we had over 970,000 artifacts to review, but processing of the one APFS volume took 23 hours, 38 minutes, and 29 seconds. Our second test with the i7 powered MacBook Pro and the newly released AXIOM 3.4 took only 8 hours, 49 minutes, 15 seconds, resulting in a 62.69% decrease in processing time!

As seen below, the CPU was being used to its full potential while AXIOM 3.2.1 was processing the image file.

The next contender, an i9 powered Dell XPS15 coupled with AXIOM 3.3.1 completed processing of all four volumes listed above with all artifacts turned on, and MD5 hashing selected in 12 hours, 14 minutes, and 18 seconds. After a quick AXIOM update to 3.4 the test was repeated utilizing the same standards as the rest of the trials, with processing time cut to 5 hours, 24 minutes, and 28 seconds. The Dell XPS processing time was reduced by a staggering 55.81% after updating to AXIOM 3.4.

Evidence of how hard our developers have been working to improve performance for our customers can be seen below with a staggering decrease of processing time ranging from 55% to 62% between the two test machines. Also, keep in mind the AXIOM 3.4 builds included additional processing with the addition of the Spotlight metadata being parsed as well as searching across unallocated space on the volumes. In an upcoming blog, we’ll explore what information can be gleaned from both Extended Attributes and Spotlight metadata found on macOS systems.

If you have any questions, or have suggestions on new macOS artifacts that you’d like to see added to AXIOM, contact trey.amick@magnetforensics.com.

The post APFS Performance Improvements with Magnet AXIOM 3.4 appeared first on Magnet Forensics.

Magnet Forensics Wins Two 2019 Forensic 4:cast Awards!

$
0
0

We’re honored to again be recognized by the Digital Forensics Community in this year’s Forensic 4:cast Awards — this year in the newly created DFIR Commercial Tool of the Year and DFIR Team of the Year categories!

Of course, we want to not only thank every single person who took a moment to nominate and vote for Magnet Forensics, but we want to thank Lee Whitfield for taking the time to put these important awards together year after year. His efforts are greatly appreciated and we’re glad to be able to share these honors with several other amazing contributors within the community!

The Magnet Forensics team accepts the award from Lee Whitfield at the SANS DFIR Summit.

Announced at the SANS DFIR Summit in Austin, Texas, the awards recognize those in the DFIR community who are making a huge difference within the field. Our founder and CTO, Jad Saliba, shared his reaction: “What an amazing honor! Huge thanks to everyone who voted for us and has supported us over the years – you are the people that do the extremely important work and we are honored to support you with our team and tools. A huge thank-you to our team at Magnet as well! Truly a world class group of people that I am so proud and grateful to work with. Thanks for everything you do everyday to support our customers and for coming up with innovative new features like our recent #OfficerWellness features – doing the right things for the right reasons. Looking forward to doing more great things together! ”

Adam Belsher, our CEO, added: “Thank you to all our customers for the honor of serving you. Your passion and important work keeps us motivated and committed to working alongside you in supporting your mission. I have never worked with such an inspiring group of individuals than at Magnet Forensics and I’m proud to be on this journey will all of you! ”

If you want to catch up on our nomination series, you can find who are Forensic Examiners highlighted here: Part 1Part 2Part 3, Part 4. Want to know more about our previous wins in the Organization of the Year and Computer Forensic Tool of the Year categories? Read our previous post here.

The post Magnet Forensics Wins Two 2019 Forensic 4:cast Awards! appeared first on Magnet Forensics.

Our Approach to Usability Within AXIOM: A Q&A with Filip Jadczak

$
0
0

With the release of Magnet AXIOM 3.5, we’ve focused on features that improve the quality of life for our users. In this Q&A, we talk to Filip Jadczak, a UX Designer at Magnet Forensics about his approach to usability, new features, and more! 

 Magnet Forensics: Tell us what you do here at Magnet Forensics. 

Filip Jadczak: I’m a User Experience (UX) Designer here at Magnet Forensics. That means I design the new features that go into each new release of AXIOM and determine how we display information to our users in the interface. I also maintain contact with our customers to understand what challenges they face, so we can constantly improve their experience with AXIOM. 

 

MF: Why are you passionate about usability/user experience? 

FJ: Every day, we are seeing how digital technologies are being integrated into every industry – and with that comes a variety of tools and apps, each with their own interface. Usability in these interfaces is critical to ensuring that people are able to carry out the tasks they need in a quick, effective manner. I got into the field of UX to help advocate for better usability and design in the tools we use, and to make sure that when we build software, we always consider the human element first (i.e. the people on the other side of the screen). 

My approach while designing for the digital forensics industry is to help examiners get to the information they need as quickly as possible. AXIOM needs to help our users find the right evidence they need in a seamless way, so they can focus on doing their best work and spend their time on the things that matter. 

 

MF: How would you describe Magnet Forensics’ approach to usability?  

FJ: The UX team at Magnet Forensics strives to design our products in a way that balances the power of data analysis with ease of use. Especially in a field like digital forensics, there can be huge amounts of data to review, and we aim to present that data in a way that is easily consumable and recognizable. Likewise, with the functionality of our products, we aim to provide the flexibility that our users need while keeping things easy to understand and follow, even for those who are new to the tool. 

We regularly conduct research to better understand where things are going in digital forensics and we seek out our customers to hear their feedback – both good and bad. This feeds back into our design process, so we know what is working well and what areas we need to focus on next to streamline and improve. 

 

MF: We’re currently introducing what we call, “quality of life improvements” in Magnet AXIOM — a series of user experience updates that will improve the overall AXIOM experience. Why are these changes important and how will they help users?  

FJ: AXIOM has come a long way in the past few years, and we are continuing to grow its capabilities as a forensics tool. However, while we do that, it’s important to keep in mind the existing workflows and features and make sure we keep those running as smoothly as possible. The “quality of life” improvements are a set of requests we’ve gathered with regards to how we can smooth out some of the features that have already been in AXIOM for a while. What this means is that you can expect to see some smaller tweaks here and there to improve your day-to-day workflow. 

Since AXIOM has new releases on a monthly basis, we are continuously sending out these improvements as we work on them. As such, we can make sure that our customers are getting a better experience every time they update. 

 

MF: Are there any particular improvements that you’re especially excited to introduce? 

FJ: One set of improvements I’m excited to see launch in AXIOM 3.5 is the advanced search and filtering capabilities. We now allow you to conduct Boolean searches, exact match searches, and more, to help you narrow down your keyword searches to exactly the results you need. This includes letting you include or exclude results based on the criteria you specify. These search capabilities have long been requested by our customers and we’re happy to be adding these into AXIOM as the next step in helping you get through your investigations faster. 

 

MF: What kinds of things can we expect in the future for AXIOM when it comes to QOL or UX updates? 

FJ: Within future releases, you can expect to see further advanced filtering options like what I’ve mentioned above with the global keyword search. We are also actively looking into ways that we can streamline the full end-to-end workflow of using AXIOM, from processing through examination and reporting. 

 

MF: Is there one feature within AXIOM that you feel like more users should be taking advantage of?  

FJ: The relative date and time filter can be a powerful way to narrow down the results you’re looking at, if you know you need to find user activity or artifacts with timestamps from before or after a specific event. From the “Date and time” filter, you can select “Relative date/time” and specify a range to search for before and after a specific point in time (whether minutes, hours, days, or longer). Hint: if you are looking at a specific artifact, you can select the clock icon next to one of the timestamps in the Details card to set your filter around that timestamp! In conjunction with our Timeline view, this makes a great way to investigate what someone may have been doing around a loose time range, when you have a starting point but need to do a bit more digging.

The post Our Approach to Usability Within AXIOM: A Q&A with Filip Jadczak appeared first on Magnet Forensics.

Magnet AXIOM 3.5 Includes Apple Warrant Returns and User Experience Improvements

$
0
0

MAGNET AXIOM 3.5 IS NOW AVAILABLE!

Get Magnet AXIOM 3.5 now—either within AXIOM or as a download over at the Customer Portal. In this release, we’ve added Apple warrant returns, new image categories in Magnet.AI, as well as some quality of life improvements to make AXIOM even faster and easier to use.

If you haven’t tried AXIOM yet, request a free 30-day trial here.

NEW APPLE WARRANT RETURNS

AXIOM Cloud can now ingest and analyze warrant returns from Apple that will often include useful information even if the physical device is not recovered.

AXIOM now provides full decryption of any iOS device backups that are included within warrant return package as well as processing synced media, and iCloud drive contents.

NEW IMAGE CATEGORIES FOR MAGNET.AI

Magnet.AI, a feature built into AXIOM at no additional charge, significantly speeds up your investigations by using artificial intelligence to identify pictures of interest as well as luring or grooming chats. With 3.5 AXIOM can now recognize hate symbols, license plates on vehicles, and pictures that have faces in them.

QUALITY OF LIFE IMPROVEMENTS

At Magnet we’re constantly striving to make AXIOM more powerful and easier to use. In 3.5 we’ve introduced a frequently customer-requested feature that we hope will make examinations easier and faster.

The Advanced Search functionality will now easily allow you to create granular searches using Boolean operators like AND & OR, Match Case, Whole Word Only, and with the ability to stack these searches so you can find exactly what it is that you’re looking for quickly.

Over the next several releases of AXIOM we’re going to be focusing more on quality of life or user experience improvements. Check out this Q&A blog with the UX Designer of AXIOM, Filip Jadczak, to learn more about the new features in AXIOM 3.5 and what we have in store for the future.

NEW ARTIFACTS 

  • Evernote (Android)
  • Application Power Usage (Android)
  • Camera History (Android)
  • Activity Manager History (Android)
  • Last Known Locations (Android)
  • File Signature Mismatch
  • Powerlog Process Data Usage (macOS or iOS)
  • WhatsApp (Windows desktop)

UPDATED ARTIFACTS

  • Snapchat (iOS and Android)
  • Telegram (iOS)
  • WhatsApp (iOS and Android)
  • Enhance EXIF from Pictures
  • Installed Applications (Android)
  • Device Information (iOS and Android)

GET MAGNET AXIOM 3.5 TODAY!

If you’re already using AXIOM, download AXIOM 3.5 over at the Customer Portal. If you want to see how AXIOM 3.5 can help you find the evidence that matters, request a free 30-day trial today!

The post Magnet AXIOM 3.5 Includes Apple Warrant Returns and User Experience Improvements appeared first on Magnet Forensics.

Women in Forensics Camp

$
0
0

By Jessica Hyde, Director of Forensics

This summer, I had an unbelievable opportunity to give back in DFIR via the Women in Forensics Camp at Notre Dame. The camp, sponsored by PWC and put together by members of the St. Joseph County Cyber Crimes Unit, was designed to introduce high school age women to digital forensics. What is incredible about St. Joseph County Cyber Crime Unit is that many of the sworn members of the force are interns from Notre Dame. The program is the brainchild of Mitch Kajzer, who is both the Cyber Crimes Director for the Office of the Prosecuting Attorney for St. Joseph County and a professor at Notre Dame teaching digital forensics.  More information can about the program at St. Joseph County can be found here.


Jessica Hyde and Mitch Kajzer

Mitch additionally decided this year to start the Women in Forensics Camp. This camp was an amazing experience. Mitch invited Heather Mahalik, Sarah Edwards, and me to come help teach the students in the camp. In addition to getting to spend time with some of my favorite fellow forensic femmes, we were able to assist four of the Notre Dame students and St. Joseph County Cyber Crime Unit interns with the course. The interns were teaching the bulk of the course while Heather did a section on mobile forensics, Sarah a section on APOLLO and iOS/mac forensics, and I did a section on Windows and Internet of Things forensics. 

The high school students were well engaged, and I was beyond impressed by the lessons delivered by the interns.  I thought it would be a great opportunity to ask them some questions about both the program at St. Joseph’s County Crime Lab and the Women in Forensics Camp. Below is an interview with Laura Hernandez, Briana Drummond, and Julia Gately about the programs.


From Left to Right – Jessica Hyde, Sarah Edwards, Julie Gately, Brianna Drummond, Heather Mahalik, Lexie VanDenHeuvel, and Laura Herndandez

Jessica Hyde (JH): Ladies, I just wanted to take a moment to say thank you again for the amazing experience at the Women in Forensics Camp that you all put on at Notre Dame. I was extremely impressed by your forensic knowledge, your willingness to give back to the high school students, your delivery during the instruction you provided, your professionalism, and the quality of the content you delivered. Thank you also for taking the time to answer some questions in retrospect about yourselves, the internship program at St. Joseph’s County Crime Lab, and the camp itself.

Okay, to get started, can you each please tell me about the kind of work you do as an intern at the St. Joseph’s County Crime Lab?

Laura Hernandez (LH): As of right now, the St. Joseph County Cyber Crimes Unit is actually the only unit in the world that swears in college students and grants them full law enforcement powers. As investigators, we’re sent digital evidence from cases all over the county, and we extract, process, and analyze the information from that evidence to help detectives in their investigations. Coming into this internship, I was convinced that the interns would only do paperwork and basic tasks; instead, we’re the primary investigators on the cases we’re given, and we’re a part of the entire process of an investigation, from writing search warrants to writing reports at the end of an investigation. I love every part of the process, and I am so lucky to be working in this unit!

Briana Drummond (BD): As an intern for the St. Joseph County Cyber Crimes Unit, we extract, process, and analyze various electronic devices such as iPhones, Androids, SD Cards, laptops, etc. given to us as evidence by both local and federal law enforcement agencies. The work we do is very hands-on. From the second we get a case, we, the interns, are the ones logging it and establishing a line of communication with the Detective or Investigator who gave us the case. We write up our own case reports and discuss with the officer the evidence we found (or did not find)! 

Julia Gately (JG): As an intern in Cyber Crimes, I do the work of a Digital Forensics Investigator. The majority of my time is spent doing cases for police departments/metro units within St. Joseph County. When I work on a case, the detective will bring me the item(s) of evidence, and I will then extract, process, and analyze it (if requested) accordingly. I’ve worked with a variety of devices, such as mobile phones (iOS and Androids), USB drives, SD cards, and cloud accounts. After I’ve finished going through the evidence, I’ll write up a report and give it to the detective, as well as a portable case and HTML report of the work that I’ve done. I’ll usually go through the case with the detective as well and share my findings. When I’m not working on cases, I’m doing research. All of the interns have different research assignments that we work on during our down time. Lexie VanDenHeuvel and I are partners on our current research project, which studies the data on wearable devices that results from sexual assault. At the moment, we are trying to locate data that we can use to try and establish a baseline for what sexual assault may look like on a wearable device.

JH: Wow! What are you most excited about getting  to do in the field?

BD: One thing I am very excited about is the fact that we get to see the case as it progresses from its first submission all the way through until the officer picks it up. Mitch, our Cyber Crimes Director, has allowed us to do so much for the Unit, and I am so grateful for that. Not only do I understand how to analyze the data we have extracted, but I know how important the completion of each step of the whole process is.

LH: I’m really excited to see the results of the cases I have been working on. Especially with those few that end up going to trial, it just makes it incredibly clear that our work does have an impact. Not only do I get to gain valuable experience in the field, but I also get to contribute an effort that has concrete effects on people’s lives. I still haven’t gotten over that amazement.

JG: I’m most excited about continuing to learn about different ways of collecting data. Working in the unit has taught me so much in terms of what law enforcement can extract, but I’m interested to see the corporate side of forensics. It’s an ever-expanding field, so I hope that wherever I end up post-grad I get the chance to see more software.

JH: Are there any particular challenges you’ve faced so far that have been particularly difficult?  If so, how did you work through them?

LH: The sheer volume of information that is available on the subject of digital forensics is terrifying in itself, and it can only grow as technology keeps developing. I came into this internship with a computer programming background, but only a basic understanding of digital forensics. It’s a lot of hands-on learning, and each case forces me to learn something new and leaves me with even more questions. Especially at the beginning of my time in the unit, I would have been completely overwhelmed if not for Mitch Kajzer, the director of the Cyber Crimes Unit. He has a lifetime of experience and helps us address problems that we haven’t seen before, and he always encourages us to take on research projects and learn more about any subject that interests us. The upside of how much I don’t know is that it’s hard to get bored, because there’s always a new extraction technique, operating system update, or forensics software to learn about.

BD: One challenge I have is feeling as though I do not know the technological aspect of digital forensics entirely. I work through this by asking our amazing director several questions, but I also lean on the other investigators that I work alongside. One very unique feature of this field is that technology is ever changing, and we may never fully understand every aspect of it! It is an awesome field that pushes you to learn and ask your peers for help. While this is something I am not used to, I think this is an awesome challenge for me and will be valuable for any future professional experience. 

JG: The biggest challenge for me has been learning to preserve as much of the evidence as possible. As technology continues to develop, the methods for collecting evidence develop along with it, and it can be difficult when a method will save evidence one day and destroy it the next. The way I worked through this was just doing my best to be constantly updated. The best source of information that I have is my boss, Mitch Kajzer, because his never-ending drive to learn more about technology keeps him very aware on what’s safe to do. I’ve also started reading a fair amount of tech news, because with every update or new phone there come new challenges. There’s no surefire way to combat constantly updating technology, but as long as we stay prepared in the unit, we can provide the best service to law enforcement.

JH: Turning to the Women in Forensics Camp, what were your goals for the camp and what did you do to prepare for the camp ahead of time?

JG: This camp holds a special place in my heart, especially since it actually stemmed from a conversation I had with Lexie VanDenHeuvel, another intern, at the beginning of my sophomore year. We were discussing how we wish we had known about the field earlier, like in high school, and Mitch asked if we wanted to make a camp. It just took off from there. When we started brainstorming the camp, we just wanted to raise awareness about digital forensics to high potential young women. But as we continued planning, it turned into more than that. We wanted to give the girls not only a chance to experience forensics, but to understand the kinds of opportunities the field can bring them. So many young women are discouraged from pursuing a career in STEM, so it was really important for all of us that they feel comfortable and confident going into the field, if they choose to do so. In terms of preparing for the camp, we spent a lot of time making arrangements for amazing speakers, as well as making sure that we had enough activities to keep the girls interested. We also wanted to ensure that we moved at the right pace, so that no one felt as though the camp was outside of their understanding.

LH: My goals for the camp were just to show these girls all the opportunities that I didn’t know existed when I was their age. I was lucky enough to stumble on digital forensics through an email announcement for the Cyber Crimes Unit internship, but there is so much more I could have done in high school and college to learn more about digital forensics if I had known about it. I came into this week just wanting to show them how much I love the work I do and teach them a little bit of the digital forensics knowledge that I’ve gotten to learn.

BD: I know that Lexie and Julia were the original brains behind the camp, and they met with several individuals in preparation for it. I helped with packaging the swag bags, loading files onto the computers, and ensuring that the test iPhones were charged and ready to go. When I found out about the camp, one goal I had was to make sure that the students felt comfortable asking for help. I also wanted the students to gain exposure to a potential future career field. While I do not know how many of them will go into digital forensics in the future, I was glad that they would have tangible experience for one option for their future. Going into college, we pick our majors and are expected to have an idea of what we want to do for the rest of our lives. I find this extremely difficult as many of us have only worked as nannies, at restaurants or ice cream shops, etc., so I was excited that these girls would get to experience a career field before entering college or the next phase of their life.

JH: What did you enjoy most about the camp?

BD: I really enjoyed getting to know the girls and answering any questions they had. I think it is such a blessing to have people in your life that are a few years older and have had even just a little bit more experience in life that you feel totally comfortable coming to with any and all questions you have. We gave the girls our contact information, and I hope that they will reach out about college admissions questions or just to chat about life in general. 

LH: One of the most surprising and rewarding parts of the camp was that not only did I get to teach and try to inspire the high school girls who attended, but I was also taught and inspired in turn by our amazing guest speakers. You, Heather Mahalik, and Sarah Edwards were so warm and welcoming from day one, offering to revise our research, introduce us to other leaders in the field, and support us in any way you could. It was the same knowledge and encouragement I was hoping to give to our campers, and I ended up receiving it tenfold.

JG: The best part of the camp for me was actually being able to interact with the girls and hear about what they wanted to do going forward. It was great to hear how some of them were already determined to enter the forensic field, and how others definitely had a new interest in the field after seeing what it offered. Answering questions about what we do at the unit and college made me really grateful for all of the mentors that I’m lucky enough to have, and I hope that these girls take their experiences at the camp and use them going forward. I’m also so grateful to all of those who traveled to come and speak at the camp, as without them it wouldn’t have been possible.

JH:  Thank you so much taking the time to share your responses!  It was such a pleasure to get to participate in the camp and not only give back to the students, but to be inspired by you and the next generation.

BH: Thank you so much for giving us amazing advice and for being an amazing role model to look up to in a potential career field. 

Thank you so much to the Women in Forensics Camp for allowing us to have a part in this fantastic initiative. Thank you Mitch Kajzer for being a mentor to not only these students, but to me as well.

Interested in finding ways that you can use your digital forensics skills to help others?  Check out my prior blogpost on the topic https://www.magnetforensics.com/blog/giving-back-in-dfir/ 

Questions or comments?  More ways to share? Reach out to Jessica at: Jessica.Hyde@magnetforensics.com

The post Women in Forensics Camp appeared first on Magnet Forensics.

AXIOM at Work Events Are Coming to Cities Across the U.S.

$
0
0

Over the last few months, we hope that you’ve had the opportunity to check out our AXIOM at Work video series, and that they have been beneficial to demonstrate the enhanced features in Magnet AXIOM to make your examinations easier and more thorough. Now, Magnet Forensics is taking AXIOM at Work on the road to bring that conversation to you! We will be visiting multiple cities across the U.S., bringing personalized technical discussions right to your front door.

The event schedule currently includes the following cities: 

  • September 18, 2019 – New York, NY (Registration is Open!) 
  • October 8, 2019 – Seattle, WA​  (Register Here)
  • November 1, 2019 – Dallas , TX(Coming Soon)
  • November TBD – Atlanta, GA​ (Coming Soon) 
  • December TBD – Tampa, FL (Coming Soon) 

The AXIOM at Work events will provide in-depth lectures on various challenges the digital forensics community faces today. Hear about:

  • How to answer the questions you might encounter in a macOS investigation
  • Capturing the evidence that could be hidden in the Cloud
  • How our Volatility integration can assist in your memory analysis
  • And more!

Through informative talks and live demos, we’ll take you through these case examples and more, demonstrating how AXIOM can be integrated into your current forensic workflow.

Our AXIOM at Work events will also show you how to solve additional struggles you may face in your lab. Need a better way to manage your digital evidence? Want to reduce your backlog and take better advantage of processing downtime? We will demonstrate other tools in the Magnet Forensics portfolio, such as Magnet ATLAS and Magnet AUTOMATE, to provide you an overview of the entire investigative workflow. 

We hope to see you on the road with AXIOM at Work! Want us to come closer to you? Tell us where! And in the meantime, we encourage you to check out our AXIOM at Work video series here!

The post AXIOM at Work Events Are Coming to Cities Across the U.S. appeared first on Magnet Forensics.


Top 5 Reasons Why You Should Use AXIOM with Your UFED Extractions

$
0
0

Here at Magnet Forensics we’ve always been a big believer in the “toolbox” approach to investigations. While many of our customers use Magnet AXIOM as their primary investigative tool for mobile, computer and cloud investigations, when lives are at stake, and justice hangs in the balance, we know it’s important to verify your results. Different tools have different strengths, and when it comes to convicting or exonerating a suspect, you want to make sure every strength is given its due. Often, using a secondary tool will even help you get through certain parts of the investigation more efficiently, while still maintaining the accuracy that’s so crucial for the whole process.

When it comes to mobile investigations, you probably have Cellebrite’s UFED as one of those tools in your toolbox. We know it may even be the only one that you have. UFED performs extractions from various mobile devices and it’s likely convenient for you to continue performing your initial examinations with it. However, you could be missing essential data if you don’t verify your evidence with more than one tool.

AXIOM was designed to not only ingest images from various tools (including UFED) but to be the clearest and most robust analysis tool available. So, after you’ve done your acquisition and first pass of the data with UFED, AXIOM can be an extremely powerful solution for analyzing the evidence. Here are five reasons why we think you should use AXIOM to verify what you’ve done with UFED:

1. AXIOM Finds Important Additional Evidence

Magnet Forensics pioneered the artifacts-first approach; no other tool recovers and surfaces more relevant artifacts than AXIOM does.

This is especially true of evidence that is abundant on mobile devices: artifacts like photos, chats, social media artifacts, geolocation data, and browser activity. And because mobile analysis is all about the artifacts, it’s important to make sure you’re seeing the ones that might matter to your investigation first—something AXIOM does for you every time.

In fact, based on internal testing that we’ve done, we’ve found that AXIOM finds up to 25% more evidence than other tools available. That’s significant! Especially if AXIOM can find that one photo or that one chat that leads to a breakthrough in your investigation.

After running Cellebrite, I always followup with AXIOM if the case involves social media or internet artifacts. I find AXIOM will always get more data from these sources.

Steve Ware, Computer Forensic Investigator, City of Redding

2. AXIOM Analyzes Evidence from Mobile Devices, Computers, and the Cloud

While UFED is commonly used for mobile investigations, AXIOM is a complete digital forensics platform that can process and analyze evidence from multiple evidentiary sources, including computers, mobile devices, and cloud services. Investigations are rarely just about a person’s computer, or their phone… it’s about that person’s activity and behavior. And that activity and behavior has a digital footprint that spans all of their devices: their phone, their computer, and their social media and other cloud-based accounts.

The fact of the matter is that crime is often not restricted to one device or source of data. As our lives become increasingly digitally enhanced, so too is our digital footprint. AXIOM can ingest and analyze evidence from all of those sources in one case file which gives you a wholistic view of the person’s activity and how it relates to the case.  Whether it’s child exploitation or corporate intrusions, you can’t solely rely on a solution that focuses on one evidence source.

3. Quickly Get Insight into Your Investigations

We know speed is of the essence for you during an investigation. Whether you need evidence immediately so you can use it during an interview or whether it’s to help you move through your workload faster. AXIOM has many different features to help you save time in your investigations by providing immediate and actionable insight into your evidence.

Visualize a Timeline Across All Timestamped Data

Many additional timestamps, other than those reported by the file system, can be found within AXIOM’s artifacts. The Timeline feature in Magnet AXIOM will show you all artifact timestamps, including chat records, EXIF data, and web activity, alongside the file system timestamps in a single view so can quickly and easily sort, filter and zero in on what you’re looking for. Watch this video to learn more:

Easily Understand Evidence Attribution with Connections

Connections allows you to more easily understand attribution of a file or artifact by visualizing connections between artifacts and files in your case. You’ll be able to quickly understand how a file, like a picture for example, might have gotten on someone’s phone, where it might have gone, etc. which can be very helpful in many investigations.

Here’s another video that shows you a more in-depth look at Connections:

This is just the start. There are many other great reasons to use AXIOM—things like relative-time filtering, advanced filtering, and our amazing SQLite Viewer will help you find more evidence and work through it faster.

4. Locate and Analyze Data from Unsupported Mobile Apps

At Magnet Forensics, we call this supporting the unsupported. Mobile apps especially are constantly changing all the time and new ones are being introduced at a rapid pace. Sometimes these new apps have features like anonymous chats for example, that can be used for nefarious purposes.

Dynamic App Finder

How are you supposed to find chat evidence from that app if you don’t even know it exists? This is where Dynamic App Finder (DAF) helps you find that evidence. DAF will identify SQLite databases that may contain useful information in your case. This could ultimately lead to you finding something of critical importance that you didn’t even know was there.

Custom Artifacts

Custom artifacts are used to analyze artifacts that aren’t yet supported by AXIOM. They’re XML or Python scripts that have been built and uploaded by professionals in the Digital Forensics Community to help their peers with their cases.

Custom artifacts

Custom artifacts live in the Magnet Artifact Exchange. This community-based approach to finding even more evidence is yet another way for you to find more evidence.

5. Easy-To-Understand Reporting—Including Chat-Rebuilding

Even with solid evidence of an incident or a crime, if you don’t have the means to convey your findings in a way that is easily understood to your stakeholders such as a judge or jury, for example, then all of your hard work may be fruitless.

AXIOM produces easy-to-understand reports including the ability to rebuild chats into a conversation bubble-view commonly used on mobile devices which examiners and users are accustomed to.

Chat re-build

When a non-technical judge or jury member sees the conversation bubble-view on the report, just how they see it on their phone they use every day, they can understand the interactions far better than something presented to them as a spreadsheet or regular text.

And—similarly to UFED Reader—AXIOM has a feature called Portable Case that allows you to provide a single report to non-technical stakeholders. This significantly cuts down on time and frustration of merging data from all of your different sources whether mobile, computer, or cloud.

Try AXIOM on Your UFED Extractions Today

So, the next time you’ve done an examination with UFED, think of AXIOM and give it a try. Here’s a blog we wrote a while ago that walks you through how to load a Cellebrite image into AXIOM.

And if you don’t have AXIOM yet, sign up for a free 30-day trial and see for yourself what kind of results you get. We think you’ll be pleasantly surprised!


The post Top 5 Reasons Why You Should Use AXIOM with Your UFED Extractions appeared first on Magnet Forensics.

Announcing Magnet AXIOM Cyber — Now in Beta!

$
0
0

We’re excited to share a new solution, purpose-built for organizations needing to perform remote acquisitions and collect & analyze evidence from computers, cloud services, and mobile devices: Magnet AXIOM Cyber.

AXIOM Cyber is now available for free beta testing for AXIOM customers and those who are new to AXIOM. Visit the Magnet AXIOM Cyber Beta page to be the first to try the most modern solution for your cybersecurity investigations and provide valuable feedback.

What to Expect in Magnet AXIOM Cyber

Whether it’s employee misconduct, fraud, IP theft, or incident response, AXIOM Cyber will be a powerful tool in your organization’s investigations. Building upon the capabilities of Magnet AXIOM, AXIOM Cyber will not only allow you acquire and analyze evidence from computer, cloud, and mobile sources, but will also allow you to:

  • Get point-to-point remote acquisition — Obtain evidence from target endpoints, even if they are not connected to your corporate network.
  • Use an on-demand remote acquire agent — Deploy the agent (ad hoc), so you don’t need one on every single endpoint.
  • Acquire from cloud services — Get evidence from cloud storage services like Amazon S3, Office365, Slack, Microsoft Teams, G Suite, Box.com, and more
  • Automatically resume collection — Reconnect and resume collections where they left off when connectivity to the target is lost.

Additionally, AXIOM Cyber will incorporate all the features of AXIOM that help in your investigations, including:

  • The ability to easily produce reports for non-technical stakeholders
  • Examine evidence from all sources—computer, cloud, and mobile—in one case
  • Quick performance of root cause analysis
  • Visualization of key data with features like Connections and Timeline
  • Acquisition of unencrypted collections of files even when the source drive is encrypted
  • Ongoing updates that provide you with new features that optimize productivity and performance

Join the AXIOM Cyber Beta Program Today!

Looking to be the first to try AXIOM Cyber? Be sure to head over to our AXIOM Cyber page for more information and to sign up to participate.

If you’re new to AXIOM, this can be a great opportunity to get started — sign up over at the Beta page today and try AXIOM Cyber for free.

The post Announcing Magnet AXIOM Cyber — Now in Beta! appeared first on Magnet Forensics.

Announcing Magnet SHIELD — A New Way to Capture and Report on Digital Evidence

$
0
0

We’re proud to announce Magnet SHIELD, an innovative new solution that empowers the frontline police officers and investigators in your police service to easily capture and report on digital evidence from consenting victims and witnesses in the field.

Share Magnet SHIELD with Frontline Teams

If you know who is responsible for equipment for frontline officers in your police department, please let them know about Magnet SHIELD and how it can benefit the service by forwarding this email to them or telling them to visit the Magnet SHIELD page for more information.

Magnet SHIELD will give officers and investigators the ability to:

  • Quickly and easily capture chat, picture, and video evidence at the scene
  • Immediately produce shareable evidence reports
  • Preserve key digital evidence from consenting victims and witnesses
  • Enable victims and witnesses to select the evidence they want to share

Available as a Microsoft Surface Go Tablet or Software-Only Solution

Magnet SHIELD is available as a turnkey solution that leverages the mobility, battery life, HD camera and familiarity of the Microsoft Surface GO tablet, or as a software-only solution available on any tablet powered by Windows 10 – including existing mobile data terminals in police cruisers. Data integrity is maintained due to trusted Windows 10 security and IT Controls.

After capturing the evidence, SHIELD automatically produces a standardized evidence report that can be shared with Crown attorneys. Evidence from SHIELD can easily be stored in an existing Digital Evidence Management system or other systems like an RMS.

Magnet SHIELD is currently available to agencies in Canada, with a global availability in the near future. Visit magnetforensics.com/products/magnet-shield/ for more information.

The post Announcing Magnet SHIELD — A New Way to Capture and Report on Digital Evidence appeared first on Magnet Forensics.

Get Magnet AXIOM 3.6 for New Advanced Filters, Instagram Public Data, and Apple Updates

$
0
0

MAGNET AXIOM 3.6 IS NOW AVAILABLE!

With Magnet AXIOM 3.6, we’ve introduced some great new features, including new advanced filters, Instagram public data acquisition, and updates to the support of some Apple products. Get AXIOM 3.6 within AXIOM or as a download over at the Customer Portal today!

If you haven’t tried AXIOM yet, request a free 30-day trial here.

New Advanced Filtering Options

Within AXIOM 3.6, there are a number of new advanced filtering options, including the ability to perform advanced filtering with multiple search terms, proximity searches and include/exclude function. These will help you surface the data you need in your investigations that much quicker. For a deeper look, check out this video overview:

Instagram Public Data Acquisition​

Instagram boasts more than 500 million active users every day, which makes it a hard-to-ignore source of data for investigators. Now, you will be able to collect public-facing posts using a username or a hashtag — without requiring any user credentials — potentially uncovering additional leads in the case. Collect the post information, and associated media as artifacts, all within AXIOM. ​

File Signature Mismatch Artifact

The file signature mismatch artifact highlights files where the extension and the signature of a file don’t match each other. These files can contain material that someone was attempting to hide from an investigation that you may want to examine more closely when looking for evidence.​

For example, you may uncover an .mp3 that is actually a zip archive and see this in the file signature mismatch artifact. From there, you’d be able to export it in order to see if the suspect had been hiding files inside of this archive. ​

Now with Support for iOS 13

With the launch of iOS 13, AXIOM 3.6 continues to support examinations of the latest iPhone OS!

Encrypted iOS Backup Enhancements​

You can now view the friendly files and paths as it appears in the iOS backups manifest in AXIOM Examine’s File System View — giving you the ability to look at the file as it was stored on the device rather than how it is displayed in the backup.​

iCloud Backup Recovery for Devices with 2FA ​

This release re-enables AXIOM Cloud’s ability to recover this data, providing a more complete view of the evidence available in a user’s iCloud account. ​At this time, this feature is only available for iOS 11 and 12 backups.​

Xiaomi & Huawei Backup Support​

Thanks to enhancements to the Android unlocked device workflow, you can now retrieve additional information from Xiaomi and Huawei devices by leveraging the on-board device backup mechanism. ​

New Artifacts

  • Evernote (iOS)
  • LinkedIn (iOS)
  • Waze (Android)
  • Safari Recently Closed Tabs (iOS)
  • DSStore (iOS)
  • Bluetooth Low Energy (iOS)
  • KakaoTalk (iOS)
  • Mega.nz (iOS & Android)
  • Powerlog — Lock State (iOS)
  • Powerlog — Camera State (iOS)

Updated Artifacts

  • WhatsApp (iOS/Android)
  • Gmail (iOS/Android)
  • Shellbags (Windows)
  • iMessage (iOS)
  • Messenger (iOS)
  • Snapchat (iOS)
  • Telegram (iOS)
  • TextNow (Android)
  • WeChat (Android)
  • Firefox (Windows)

GET MAGNET AXIOM 3.6 TODAY!

If you’re already using AXIOM, download AXIOM 3.6 over at the Customer Portal. If you want to see how AXIOM 3.6 can help you find the evidence that matters, request a free 30-day trial today!

If you’re interested in a new solution, purpose-built for organizations needing to perform remote acquisitions and collect & analyze evidence from computers, cloud services, and mobile devices, then find out more about our just announced beta program for our newest product: Magnet AXIOM Cyber.

The post Get Magnet AXIOM 3.6 for New Advanced Filters, Instagram Public Data, and Apple Updates appeared first on Magnet Forensics.

Clearing the Way with Magnet OUTRIDER

$
0
0

We’re proud to introduce Magnet OUTRIDER — a new and easy way for officers and investigators to check devices for digital contraband. OUTRIDER is an intuitive preview tool that quickly scans smartphones and computers to determine if there is illicit material present and to develop a risk profile of the target user.

For a limited time, Magnet OUTRIDER is available as an extended free trial.  Visit www.magnetoutrider.com to take part!

An Easy-To-Use Solution for Offender Management and Use in Search Warrants

Magnet OUTRIDER was purpose-built to be used by both technical and non-technical officers. It is ideal for offender management, or execution of search warrants and users can be up and running very quickly with minimal training — a brief 30-minute online video training video is enough to get started.

For example, parole officers need to inspect a sex offender’s devices to make sure that they are not violating the terms of their release. OUTRIDER empowers parole officers, or any other non-technical user, to create a more accurate risk assessment of offenders by performing an extremely fast scan of their computers, hard drives, USB drives, as well as Android & iOS devices, looking for objectionable material or data.

The scans are so fast in fact, that in one test case, over one million files were scanned in 40 seconds!

From there, OUTRIDER will:

  • Identify known encryption, dark web, peer-to-peer, cryptocurrency, and cloud storage apps
  • Indicate if virtual machines or anti-forensic tools are on the device
  • Utilize pre-defined or customized keyword lists to flag files names
  • Detect encryption as well as provide a warning to ensure access to data is not lost by powering down a computer with active encryption
  • Obtain the external IP address of a live computer for use in cross-referencing with other intelligence systems like the Child Protection System (CPS) or ICACCOPS — allowing for quicker identification of offenders
  • Quickly preserve located contraband to ensure evidence is not lost

By using Magnet OUTRIDER, the demand on DFUs can be reduced by limiting the number of seized devices and prioritizing those requiring urgent full forensic analysis — decreasing the time frame between arrest and charge.

How to Use Magnet OUTRIDER

Running OUTRIDER from a USB is simple. Simply launch OUTRIDER and choose whether you want to scan all the local drives on the computer or specifically target any external drives. You can also customize your keyword list or use the default one provided. Finally, give it a case or reference number and start the scan.

Magnet OUTRIDER scan

The first thing OUTRIDER will do is check for encrypted disks and notify the user when this is present as it may impact the next steps for the investigation. After the encryption check, OUTRIDER will begin scanning the selected drives for files and applications matching the keywords or applications of interest. The scan will be quick (it took about a minute and half to scan a 500 GB drive and found matches for several things of interest.)

Magnet OUTRIDER results

From there you can choose to review the matches that were found, export the data and/or collect the system for a more in-depth forensic analysis.

In addition to running from a USB to a target computer, OUTRIDER can scan smartphones — the computer simply needs to be connected to the target smartphone.

Want to Give Magnet OUTRIDER a Try?

You can take part in our extended free trial offer of Magnet OUTRIDER only until the end of 2019! If you’re in Law Enforcement and looking to try it out for yourself, visit www.magnetoutrider.com for more information.

The post Clearing the Way with Magnet OUTRIDER appeared first on Magnet Forensics.

Viewing all 1190 articles
Browse latest View live