Faster. Flexible. Trusted. Magnet AXIOM 4.0 Is The Strongest Version Yet

Magnet Forensics is proud to announce the availability of Magnet AXIOM 4.0!

With this next step in AXIOM’s evolution, we’ve brought huge enhancements to the speed, flexibility, and reliability of AXIOM. And with AXIOM Cyber, we’re excited to introduce remote collection of Macs and Azure virtual machine image acquisitions.

If you haven’t tried AXIOM or AXIOM Cyber yet, request a free trial here.


Up to 5X Faster Filtering

We’ve dramatically reduced the amount of time it takes to filter data compared to previous versions of AXIOM. Now, searching and filtering can happen up to 5x faster, depending on the size of the case and the data set returned from your search—reducing your downtime and helping you get your cases completed even faster.


See for yourself how AXIOM is reducing filtering time in this blog from Tarah Melton.


Find Similar Pictures

Using integrated CBIR (content-based image retrieval), AXIOM can automatically locate pictures containing similar features. Examples include pictures with similar subject matter or pictures that were taken in the same location as a part of a series. From there, pictures are displayed in ranked order based on similarity to the query picture in the thumbnail view.


Once the ‘Build Picture Comparison’ process is completed, you can right click on any image in your case and select ‘Find Similar Pictures’ to see the results. The ‘Build Picture Comparison’ task can be run manually, or automatically when the case processing has been completed.


You’ll also be able to load external pictures that aren’t in your case to find similar pictures within the case file by selecting ‘Import picture to find similar pictures’ from the Tools menu. The imported image is only used as a reference and is not included in the case file.


See it in action in this blog and how-to video from Trey Amick.




Reimagined Exports

Reporting is easier than ever with customized Exports. Now, you can choose to include only data relevant to your case such as specific artifact types and columns.


And with the new addition of Export Templates for similar case types, efficiency and consistency of exports is improved—with standard formats agency-wide helping to streamline processes. It’s easier than ever to export and import these templates and share them with your colleagues.


Learn more in this blog and video from Tarah Melton.




Stronger Reliability with Scan Summary and Exception Reporting

Thanks to a new detailed Scan Summary and Exception Reporting, you can improve the defensibility and reproducibility of examinations by knowing what data was scanned and what may have been missed.


Now, if you have multiple evidence sources scanned and one fails, you can use the new details pane to understand what needs to be re-scanned and what likely caused that outcome.


Find out more about Scan Summaries and Exception Reporting in this blog post from our Product Marketing Manager, Sal Aziz.


New in Magnet AXIOM Cyber: Remote Collection From Macs

With Magnet AXIOM Cyber, you can remotely browse and reliably acquire files from Macs without having physical access. That includes remote collections from Macs with T2 security chip encryption or System Integrity Protection enabled.


AXIOM Cyber makes it even easier to use one tool to remotely collect data from Macs and Windows devices and then analyze it alongside data from computer, cloud, and mobile evidence sources in a single case file.


See how you can use AXIOM Cyber to perform remote collection from Macs in this blog and how-to video from Trey Amick.




Azure Virtual Machine Acquisitions Now in AXIOM Cyber

Use AXIOM Cyber to acquire virtual machine images hosted in Microsoft Azure as a part of your investigation. AXIOM will then automatically begin processing the VM image once it has been acquired to simplify the workflow.


The acquired image is a .VHD which represents the virtual hard drive of the virtual machine running in Azure.


This feature requires advanced configuration of the Azure environment to provision an account that has permission to image VMs.


New Artifacts

– Albums — Photos (macOS)

– Houseparty (iOS, Android)

– iCloud Local Files (macOS)

– ID for Advertisers (iOS)

– KnowledgeC – App Usage (macOS)

– KnowledgeC – App WebUsage (macOS)

– LogMeIn Activity (Windows)

– Private Photo Vault (iOS)

– Safari Preferences (macOS)

– TeamViewer File Transfers (Windows)

– TeamViewer Sessions (Windows)

– Wickr (Android)

– Z shell (macOS)


Updated Artifacts

– Albums (iOS)

– Android 10 System Artifacts (Android)

– Apple Notes – Voice (macOS and iOS)

– Cached Locations (iOS)

– Chrome Logins

– Chrome/Webkit Browsers (Android)

– Live Photos (macOS)

– Mail (iOS)

– Messenger (iOS)

– OS Information (macOS)

– Outlook (macOS and Android)

– Safari (iOS, macOS)

– TextFree (iOS)

– Threema (iOS)

– Twitter (iOS)

– Videos (macOS and Windows)

– VK (iOS)

– Wickr (iOS)

– Zalo (iOS)

– Zoom (Android, iOS)


Get Magnet AXIOM 4.0 Today!

If you’re already using AXIOM or AXIOM Cyber, download AXIOM 4.0 over at the Customer Portal. If you want to see how AXIOM 4.0 can help you find the evidence that matters, or how AXIOM Cyber can help you simplify remote acquisitions, request a free trial today!

Leave a Comment

Latest Videos

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_g6nTjfEMnsA

Tips And Tricks Data Collection For Cloud Workplace Applications

Forensic Focus 4 hours ago

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i41eg24YGZg

Deepfake Videos And Altered Images - A Challenge For Digital Forensics?

Forensic Focus 13th February 2023 10:30 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...