MediaClone’s Data Erase Solutions – A Guide



Selecting the Right Drive Erase Tool


Hi IT Manager

Erasing data from digital storage devices is essential to secure sensitive information before the storage device is discarded or recycled for reselling purposes. For healthcare providers and government agencies, institute by privacy laws, all stored data needs to be erased with no possibility of retrieving even a single bit of information.

Erasing stored digital data from storage devices seems like a simple task to erase digital data, but it is much more involved.

Here are several points to consider when you need to erase a storage medium and are searching for data erasing tools and solutions:

·    Software vs. Hardware Solution

·    OS – select the right one

·    Hard Disk Drives vs. Solid State Drives (SSD), the main difference when it comes to erase

·    Erase Protocols – most solutions support multiple protocols; which one to select?

·    Hardware Configuration and Media Storage Support – cover as many as possible

·    Reporting Capabilities – NIST guidelines

·    R.2 requirements for electronic recycling centers

·    Bad Sectors Handling – trapped sensitive information

·    Dealing with Special Storage Devices – Netapp

·    Selecting and Optimization of the hardware – get the maximum out of your investment

·    Application and Ease of Use – use untrained, low-cost workforce

·    Support – Advantage of local US

·    Quality and Reputation


Please follow the link below for a more detailed explanation.


Guide for Selecting Data Erase Tools


Also, for additional information, please visit our website or email us @


Workplace: ‘No mercy’ for firms flouting Covid-19 regulations

The move to level three lockdown regulations will bring new risks for workers but, writes Legalbrief, the Trade, Industry and Competition Department plans to close down companies that flout Covid-19 regulations to protect the well-being of employees. According to Business Report, Lionel October, the Director-General of the department, told Parliament’s Portfolio Committee on Trade and Industry on Friday that the government had adopted a ‘no mercy’ approach to firms that did not adhere to the regulations. ‘The essential workers are most exposed. People working in the health sector and people working in the retail sector are vulnerable. We are adopting an approach where worker safety and protection is imperative. We are adopting an approach where we are saying there is no mercy. If people do not implement these regulations properly, they will close down. The social contract is that we will have an opening of the economy on condition of protective measures being in place to protect employees,’ October said.

Full report in Business Report


Gauteng Premier David Makhura reiterated the threat in a Business Day report. The provincial government is working with various sectors in Gauteng to ensure they are compliant with requirements such as sanitation, social-distancing and wearing masks. Gauteng is the economic heart of SA and ordinarily contributes more than a third of the country’s GDP, but its economy faces devastation as a result of the lockdown. Makhura, who has met with businesses, said he expects that everything would be in place, but that if ‘a business doesn’t comply, we will simply shut that business down’ and that workers’ rights would not be placed at risk. The province has focused on getting the retail sector and the transport industry compliant with the measures imposed. It will also focus on other sectors, such as manufacturing and mining, which employ large numbers of people. He said workers should raise any non-compliance issues if they are required to go back to work.

Full Business Day report


Organised business has added its voice to calls for domestic firms to take steps to ensure that their workplaces are Covid-19-ready, reports Mining Weekly. In welcoming the easing, Business Unity SA (Busa) president Sipho Pityana said it was critical that businesses, big and small, played their part in ensuring workplaces were ‘corona-ready when employees return to work under level three’. Business Leadership SA CEO Busi Mavuso added that, during a meeting between business, the President and some Cabinet members on 21 May, an understanding developed that further transition through the lockdown levels will only occur if business is able to demonstrate that it can operate safely and protect workers. Mavuso said the pressure was now on business to innovate and adapt to the crisis.

Full Mining Weekly report

MediaClone’s NVMe Economic Solution Forensic Imaging NVMe SSD


Forensic Imaging of NVMe SSD to SATA becomes much in need. The NVMe SSD comes in 3 form factors: M.2, 2.5”(SFF-8639), and PCIe storage controller. NVMe SSD as Evidence drives are extremely fast but can be very expensive. So there is a need for forensic imager units that can support all the NVMe form factors and the flexibility to forensically image NVMe SSD to SATA drives.  MediaClone offers one of the best products in the market today, handle NVMe SSD challenging f/w and deliver one of the most economical solutions.


SuperImager Desktop NVMe/SATA units:


Here are the key benefits:

·       A standalone unit – no licensing scheme

·       Mix and cross copy of NVMe SSD and SATA drives using the same unit

·       Extremely high speed – NVMe speed can reach up to 100GB/min

·       Multiple Ports – 4 NVMe + 4 SATA ports (SAS optional)

·       Complete Forensic application, with many features

·       MediaClone Proven Forensic technology


MediaClone’s New NVMe Line of Products for Forensic and IT needs

NVMe SSDs are already being used today in many laptops and they will become more popular storage devices in the near future, all because of their incredible speed and low power.

Forensic investigators already encounter the need to capture data from NVMe SSDs, and IT professionals also have an increased need to clone NVMe SSDs.

Implementation of NVMe cloning and imaging is not trivial, since the SSDs connect directly to the PCIe bus. Also the NVMe drives are not compatible with SAS, SATA or USB storage protocols, and hot-plugging NVMe SSDs is a challenge.

Here is what MediaClone has to offer:

Please contact us for further information and pricing.

Social Media Investigator Events

We will be hosting a range of Social Media Investigator courses with certification upon completion of Social Media Investigator Level 1 & Level 2.

These hands-on, fast-paced, 5 & 3 day training courses, teach an array of social media investigative techniques, from mining the Dark Web to the effective use of free social media and open source intelligence-type tools and methodologies.


• Social Media Investigator Level 1
5 Days
• Social Media Investigator Level 2*
5 Days
• Dark Web Investigations:
A course for investigators *
3 Days
• Bitcoin, Blockchain & Cryptocurrency
Investigations: A course for
investigators *
3 Days

At the end of successfully completing the Social Media Investigator Level 2 Training, attendees will become a Certified Social Media Investigator.

* Social Media Investigator Level 1 Required.


1 – 5 OCTOBER 2018
Social Media Investigator Level 1
8 – 12 OCTOBER 2018
Social Media Investigator Level 2
15 – 17 OCTOBER 2018
Dark Web Investigations
18 – 20 OCTOBER 2018
Bitcoin, Blockchain & Cryptocurrency Investigations


TIMES: 8:00 – 16:00


• Law Enforcement
• Military
• Intelligence Analysts (All Agencies)
• Cyber Security Professionals
• Risk Managers
• Human Resource Departments
• Corporate Security Professionals
• Risk Analysts
• Financial Investigators
• Lawyers
• Forensic Investigators
• Heads of Forensic Investigation
• Professional Recruiters
• Customs & Immigration  Investigators


We are happy to announce the release of Version 2.2.1.

We are happy to announce the release of Version 2.2.1.

The iNPUT-ACE team has been hard at work making another round of improvements based on user feedback. Here are some of the upgrades you can look forward to utilizing after you complete the update:

File List Changes: Adjustable Width, Reordering, & Group Number Indicator

We have made the File List width adjustable to help you find files in the list more efficiently and track what file pertains to which piece of evidence. Just drag the list out to make it wide enough to read the entire file name and then slide it back when you don’t need the expanded view and want the space dedicated to the playback window. That’s the second high point of the adjustable File List: now you can create a bigger playback window to view the evidence, so details are easier to identify and track through the video. We have also added this functionality to the metadata section in the interrogate tab!

It is common for a single case to involve multiple video files. That’s why we have added a seamless drag and drop experience for groups/file reordering to make it easier for users to organize their data and key evidence. And once you have all your files added to your project, you can now check the counter next to the group to make sure they are all accounted for.

To add another layer of organization and ease of use, when you playback video, the file name will be highlighted in orange in the File List making it recognizable at-a-glance.

To see a short clip of these options in action visit our blog update on the release here.

Narrative Report: Improved Add Page Option

The improved function of the Add Page option in the Narrative Report tool now adds a blank page to your report without impacting the existing content. We have also made some changes to the Narrative Report tool that will make building your reports smoother. Try it out today to see how your feedback is making this tool better with every update!

Project: Loading/Saving Time Improvements

We understand the impact time can have on a case and on your day in general, so we have made significant improvements to the loading/saving function to run faster. Your projects will save or open in just a matter of minutes.

As always, offline users can get the latest version from,

A big thank you to all of our users, your insights and feedback are helping us make great improvements, keep sending them to us under Help > Submit Feedback. Please update your iNPUT-ACE software and start taking advantage of all the improvements today.

Copyright © 2018 iNPUT-ACE, All rights reserved.

Determining speed from video for Use of Force and Traffic Reconstruction

Published on December 15, 2017

Kelly Watt

Its amazing the problems video presents to users who are not familiar to the numerous ways CCTV, dash-cam and body-cam recording devices distort the true data. Most proprietary video players distort or change video when the DVR is compressing it, especially when multiple videos are running through 1 DVR, or when a higher quality is taxing the bit-rate.

Images can be stretched as aspect ratios are not accurate, colors distorted, loss of details/edges, strange artifacts show in the image, and/or data is sometimes removed in this process. Often times image frames are dropped or even removed completely from the playable video players. We reviewed one case showing 4 frames per second in this demonstration, when the original frames were 30 frames per second. Also, frame rates can be inconsistent. In one case we showed the original recording with a frame rate starting at 1 frame per second, then jumping to 10 frames per second and showing varying rates. When viewing a use of force scenario it may appear that an officer lunges at the suspect in custody and slammed him against a wall, but after reviewing the inconsistency of the frame rates the story is much different.

Compressed image frames called Predictive frames, or “P” frames, literally ignore changing data. They ignore pixels from the previous frames, only to capture movement. Objects can appear or disappear as a result, distorting what actually occurred causing very poor quality image frames. In order to better understand these video clips or images, we may need to enhance or clarify by removing the “P” frames and matching the “I” frames to better see what had occurred. DVR players interfaces can also cause users headaches with limited functionality or ability to read critical meta data. Investigators screen record video from DVR players or snip screen shots which offer distort results. Traffic Investigators may count image frames with the assumption that frames rates are consistent, presenting results that are not true. Learn more about how you as an officer, investigator, accident reconstructionist or forensic engineers can prevent mistakes during investigations by using the software experts use; iNPUT-ACE.

This demo will show how iNPUT-ACE is able to read proprietary files, extract raw original data in a meaningful way that help you better understand issues that occur when viewing video from DVR’s and proprietary readers. The demo will also show you some good workflows for a better understanding of how speed and frame rates impact our understanding of events in use of force and traffic reconstruction. For a product demonstration, please visit our website or email Kelly Watt

Engineer “Testimony Dismissed” – be careful with Video


Prosecuting attorney Jonathan Hak offers a dire warning to experts who rely on video evidence without the requisite training or the slightest understanding of the effects of digital video compression. Hak, who specializes in admissibility issues relating to video evidence, authors a blog dedicated to helping experts avoid career-ending mistakes on the stand.


Hak’s latest paper offers an insightful and articulate dissection of a forensic engineering analysis of video evidence and of the excoriating judicial decision that followed. The paper describes in detail the work of a forensic engineer who, without any training in video examinations, video compression, deinterlacing, or image timing analysis, nevertheless opined on the meaning of the video images.



In Patel v. City of Madison, Alabama and Parker in the United States District Court for the Northern District of Alabama (Case 5:15-CV-0253-VEH), the Plaintiff claimed he was seriously injured during an altercation with police. Mr. Patel hired a Forensic Engineer to analyze the video in order to conduct measurements to prove his case. To rebut the Plaintiff’s expert, the police hired Grant Fredericks, a Certified Forensic Video Expert with over 30 years of experience as a video analyst. Fredericks employed the powerful iNPUT-ACE video analysis software to demonstrate to the court that all of the Plaintiff’s opinions were in error.


iNPUT-ACE provides a simple user interface that exposes potential frailties in video evidence; it provides accurate data relating to image timing; it guides biomechanical engineers and traffic crash experts through the discovery of critical elements of video compression; and it helps to direct examiners to hidden detail in video images. Most importantly, iNPUT-ACE offers a comprehensive training program to quickly build video examination competency among non-video experts.


Jonathan Hak provides a detailed analysis in his case study of how the engineering expert ventured outside of his area of expertise, diving head first into the deep end of video examination without the assistance of a tool like iNPUT-ACE and without the accompanying training.


The clear take-a-way from Hak’s article is that anyone who intends to comment about video evidence in an expert report, or who intends to offer expert testimony at trial, must have undertaken appropriate training, using appropriate tools.


The trial judge noted that the Defendants’ expert employed proper techniques and tools to support his analysis of the video and his rebuttal of the engineer’s evaluation of the video images. Grant Fredericks leveraged the power of iNPUT-ACE to quickly and accurately examine and interpret the reliability of the video images. “When uninformed and misleading (intended or not) expert evidence is presented to the trier of fact, we run the risk of the trier reaching the wrong conclusion and therefore a miscarriage of justice occurs,” writes Hak.


iNPUT-ACE takes this caution seriously, providing a comprehensive hands-on and web-based video training program for non-video experts. Visit one of our video Investigator Training classes in a city near you or call us for a web demonstration to see how iNPUT-ACE can raise your level of competency when dealing with video evidence.


Kelly Watt

Tips for Monitoring Kids’ Social Media

The American Academy of Pediatrics (AAP) recently released findings from a comprehensive study on the impact social media has on kids and families. Although there are real benefits to kids using sites like Facebook, including increased communication, access to information and help in developing a sense of self, there can be serious downsides to all this online sharing too.

Social networking is on the rise, and the study found that 22 percent of teenagers log onto their favorite social media sites more than 10 times a day, and that 75 percent own cell phones. This level of engagement online increases the risks of cyberbullying, “Facebook depression” (a new phenomenon where “de-friending” and online bullying lead to symptoms of depression), exposure to inappropriate content, and sexting.

Just as we prepare our kids for life in the real world, we should prepare them for life in the online world. Read on for tips that every parent should keep in mind.

To safely encourage an internet-savy child check out these Kid-Friendly Social Networking Sites

No Underage Facebooking
Did you know that no one under the age of 13 is permitted to join Facebook? However, there is no real way for Facebook to truly enforce it, because anyone can lie about their year of birth. You need to make sure that your child stays away from Facebook until 13 AND until you are comfortable with him or her having an account. There are measures put in place, such as reporting an underage child, but ultimately, it should be the parent who has the say on when and if that account gets created.

Check Privacy Settings 

Check that your privacy settings for the Internet and Facebook are set to the strictest levels. Depending on which browser you are using, you can adjust the settings directly from the options tab and adjust levels around cookies, third party sites and more. This not only protects the computer user, but also the computer from the threat of viruses. Checking your Facebook privacy settings is easy as well. Simply go here to ensure that you are up to speed on its privacy policy and make any changes you deem necessary.

Use Filtering Software 
There are software suites you can purchase to monitor your child’s Internet usage; many even enable you to view the exact keys that were typed, time spent online and all computer activity in general. Popular programs such as Net Nanny and PureSight PC let you monitor social media sites, block chats, filter content and much more. You can even monitor your child’s cell phone with a software program like My Mobile Watchdog.

Create Ground Rules
If your kids are old enough to be using the computer on their own, they are old enough to understand that there are rules they need to abide by. Breaking them should not have a lesser consequence than if they broke a rule in the offline world. The best way for families to agree on ground rules is to create a contract that all parties must sign. The Family Online Safety Institute (FOSI) encourages parents and kids to have an open discussion about what these rules mean, and offers a good example of a contract here.

Get To Know What Your Child’s Habits Are

You don’t need to be a super sleuth and spy on your kid’s every online move, but it is important to be aware of the kinds of sites he is frequenting and the people he is associating with. You get to know the friends he’s hanging out with at school, and his online friends shouldn’t be any different. One of the contract rules should be that you have full access to his Facebook friends and can take a look whenever you wish.

Another fantatsic tool to use is Tomoko Discovery, an enterprise online evidence authentication platform that solves simple and complex challenges, from collection to preservation of  Evidence from social media and online sources.  Their groundbreaking technology makes Tomoko Discovery the only platform that offers the preservation of evidence through Authenticated Desktop and Webcam Recording.

Since 2016, Tomoko Discovery has made it easier for people to securely collect and preserve Court Admissible Evidence from social media and online sources.
Today, more than 1000 users trust Tomoko Discovery. Click here for further info:

Source & For Further Tips:

Social Media Challenges and Concerns for Families

By: Gwenn Schurgin O’Keeffe, MD

“What’s the harm?” That’s the age-old rhetorical question parents ask when trying to
convince themselves that the new shiny toy or gizmo on the block is safe for their children.
In the age of electronics, this question has been asked about every new device:
video cassette recorders, televisions, radios, Walkmen, MP3 players, cell phones
used as phones, smart phones, tablets, gaming systems, apps, and now social media.
As with issues in the nondigital world, safety with social media is a balance between
common sense and understanding the rules of what one is using. Social media is a
tool. Like all tools, whether there is harm or not depends on how it is used. Used
correctly, there should not be a need for concern. Used incorrectly, problems could
Technology is faceless so it is tempting to forget that issues can occur from its use.
Technology seems like a mere tool, an extension of the ability to connect and communicate.
With a device in hand, we forget that there are people at the other end. With
interactions with people, however, complications can arise from miscommunications
to true harm, such as privacy breaches and bullying.
With face-to-face connections, we are not so brazen. We take more care in how we
interact. We are careful in our choice of words and our mannerisms. We teach our
Pediatrics Now, PO Box 5336, Wayland, MA 01778, USA
E-mail address:
 Social media  Cyber-bullying  Sexting  Family media plan  Texting
 Applications  Games
 Social media is everywhere and used by adults and children.
 Social media can have a positive impact on child development in terms of fostering
communication, socialization, and learning.
 Social medial can have a negative impact on child development with such issues as
bullying, sexting, and inappropriate content contributing to additional issues.
 Social media can have positive and negative issues on family health and needs to be used
within a family with attention and care with a focus on the ages of the children at home.

Access the full PDF here: PDF

A powerful solution to assist in securely collecting and preserving social media and online information is Tomoko Discovery. Click here for further info: