Magnet Forensics to Launch New Digital Investigation Platform

New end-to-end forensics solution will find even more evidence and enable more efficient investigative workflows

Today at the ICAC Task Force 2016 National Law Enforcement Training on Child Exploitation, Magnet Forensics, a global leader in the development of digital forensic software, unveiled Magnet AXIOM, its new digital investigation platform.

Launching in Spring 2016, AXIOM will enable forensics professionals to seamlessly acquire, analyze, and share digital evidence from computers, smartphones, and tablets.Digital forensics examiners are dealing with heavier workloads, larger volumes of data and a growing number of devices that need to be processed in an investigation, which creates case backlogs and slower response times. AXIOM is a digital investigation platform that allows examiners to work their cases more efficiently, by automating and integrating tasks, and simplifying the user interface.

“The prevention of crimes against children has long been a focus for Magnet Forensics and me, personally,” said Jad Saliba, Magnet Forensics Founder and CTO. “The ICAC conference is an ideal opportunity for us to announce Magnet AXIOM, which will help forensics examiners find more evidence, dive deeper into the data and to work the case in the smartest, most efficient way. We have brought many powerful processing and in-depth analysis capabilities into an intuitive and easy-to-use solution. We wanted our clients in the ICAC community to be among the first to see this new platform in action.”

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Magnet Forensics tools are trusted and used by more than 3,000 agencies in 92 countries to assist in their investigations. AXIOM builds on Magnet IEF, a leading artifact processing tool that parses and carves for hundreds of artifact types. AXIOM extends beyond IEF, adding in-depth analysis tools with reporting tools that make it simple to share findings with stakeholders, regardless of forensic experience level.

Magnet AXIOM will be available to the law enforcement community this quarter and pricing information will be made available closer to launch. For a hands-on demo of AXIOM, register for a Magnet User Summit 2016 Series event at magnetusersummit.com.

Learn More (Magnet Forensics)

About Magnet Forensics
Magnet Forensics is a global leader in the development of digital forensics software that acquires, analyzes and shares evidence from computers, smartphones and tablets. Magnet Forensics has been helping examiners and investigators fight crime, protect assets and guard national security since 2011. For more information, please visit magnetforensics.com

Media Contact
Magnet Forensics
Neil Desai, 519-342-0195 ext. 3434
[email protected]

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...