MediaClone’s NVMe Economic Solution Forensic Imaging NVMe SSD


Forensic Imaging of NVMe SSD to SATA becomes much in need. The NVMe SSD comes in 3 form factors: M.2, 2.5”(SFF-8639), and PCIe storage controller. NVMe SSD as Evidence drives are extremely fast but can be very expensive. So there is a need for forensic imager units that can support all the NVMe form factors and the flexibility to forensically image NVMe SSD to SATA drives.  MediaClone offers one of the best products in the market today, handle NVMe SSD challenging f/w and deliver one of the most economical solutions.


SuperImager Desktop NVMe/SATA units:


Here are the key benefits:

·       A standalone unit – no licensing scheme

·       Mix and cross copy of NVMe SSD and SATA drives using the same unit

·       Extremely high speed – NVMe speed can reach up to 100GB/min

·       Multiple Ports – 4 NVMe + 4 SATA ports (SAS optional)

·       Complete Forensic application, with many features

·       MediaClone Proven Forensic technology


MediaClone’s New NVMe Line of Products for Forensic and IT needs

NVMe SSDs are already being used today in many laptops and they will become more popular storage devices in the near future, all because of their incredible speed and low power.

Forensic investigators already encounter the need to capture data from NVMe SSDs, and IT professionals also have an increased need to clone NVMe SSDs.

Implementation of NVMe cloning and imaging is not trivial, since the SSDs connect directly to the PCIe bus. Also the NVMe drives are not compatible with SAS, SATA or USB storage protocols, and hot-plugging NVMe SSDs is a challenge.

Here is what MediaClone has to offer:

Please contact us for further information and pricing.

Social Media Investigator Events

We will be hosting a range of Social Media Investigator courses with certification upon completion of Social Media Investigator Level 1 & Level 2.

These hands-on, fast-paced, 5 & 3 day training courses, teach an array of social media investigative techniques, from mining the Dark Web to the effective use of free social media and open source intelligence-type tools and methodologies.


• Social Media Investigator Level 1
5 Days
• Social Media Investigator Level 2*
5 Days
• Dark Web Investigations:
A course for investigators *
3 Days
• Bitcoin, Blockchain & Cryptocurrency
Investigations: A course for
investigators *
3 Days

At the end of successfully completing the Social Media Investigator Level 2 Training, attendees will become a Certified Social Media Investigator.

* Social Media Investigator Level 1 Required.


1 – 5 OCTOBER 2018
Social Media Investigator Level 1
8 – 12 OCTOBER 2018
Social Media Investigator Level 2
15 – 17 OCTOBER 2018
Dark Web Investigations
18 – 20 OCTOBER 2018
Bitcoin, Blockchain & Cryptocurrency Investigations


TIMES: 8:00 – 16:00


• Law Enforcement
• Military
• Intelligence Analysts (All Agencies)
• Cyber Security Professionals
• Risk Managers
• Human Resource Departments
• Corporate Security Professionals
• Risk Analysts
• Financial Investigators
• Lawyers
• Forensic Investigators
• Heads of Forensic Investigation
• Professional Recruiters
• Customs & Immigration  Investigators


We are happy to announce the release of Version 2.2.1.

We are happy to announce the release of Version 2.2.1.

The iNPUT-ACE team has been hard at work making another round of improvements based on user feedback. Here are some of the upgrades you can look forward to utilizing after you complete the update:

File List Changes: Adjustable Width, Reordering, & Group Number Indicator

We have made the File List width adjustable to help you find files in the list more efficiently and track what file pertains to which piece of evidence. Just drag the list out to make it wide enough to read the entire file name and then slide it back when you don’t need the expanded view and want the space dedicated to the playback window. That’s the second high point of the adjustable File List: now you can create a bigger playback window to view the evidence, so details are easier to identify and track through the video. We have also added this functionality to the metadata section in the interrogate tab!

It is common for a single case to involve multiple video files. That’s why we have added a seamless drag and drop experience for groups/file reordering to make it easier for users to organize their data and key evidence. And once you have all your files added to your project, you can now check the counter next to the group to make sure they are all accounted for.

To add another layer of organization and ease of use, when you playback video, the file name will be highlighted in orange in the File List making it recognizable at-a-glance.

To see a short clip of these options in action visit our blog update on the release here.

Narrative Report: Improved Add Page Option

The improved function of the Add Page option in the Narrative Report tool now adds a blank page to your report without impacting the existing content. We have also made some changes to the Narrative Report tool that will make building your reports smoother. Try it out today to see how your feedback is making this tool better with every update!

Project: Loading/Saving Time Improvements

We understand the impact time can have on a case and on your day in general, so we have made significant improvements to the loading/saving function to run faster. Your projects will save or open in just a matter of minutes.

As always, offline users can get the latest version from,

A big thank you to all of our users, your insights and feedback are helping us make great improvements, keep sending them to us under Help > Submit Feedback. Please update your iNPUT-ACE software and start taking advantage of all the improvements today.

Copyright © 2018 iNPUT-ACE, All rights reserved.

Determining speed from video for Use of Force and Traffic Reconstruction

Published on December 15, 2017

Kelly Watt

Its amazing the problems video presents to users who are not familiar to the numerous ways CCTV, dash-cam and body-cam recording devices distort the true data. Most proprietary video players distort or change video when the DVR is compressing it, especially when multiple videos are running through 1 DVR, or when a higher quality is taxing the bit-rate.

Images can be stretched as aspect ratios are not accurate, colors distorted, loss of details/edges, strange artifacts show in the image, and/or data is sometimes removed in this process. Often times image frames are dropped or even removed completely from the playable video players. We reviewed one case showing 4 frames per second in this demonstration, when the original frames were 30 frames per second. Also, frame rates can be inconsistent. In one case we showed the original recording with a frame rate starting at 1 frame per second, then jumping to 10 frames per second and showing varying rates. When viewing a use of force scenario it may appear that an officer lunges at the suspect in custody and slammed him against a wall, but after reviewing the inconsistency of the frame rates the story is much different.

Compressed image frames called Predictive frames, or “P” frames, literally ignore changing data. They ignore pixels from the previous frames, only to capture movement. Objects can appear or disappear as a result, distorting what actually occurred causing very poor quality image frames. In order to better understand these video clips or images, we may need to enhance or clarify by removing the “P” frames and matching the “I” frames to better see what had occurred. DVR players interfaces can also cause users headaches with limited functionality or ability to read critical meta data. Investigators screen record video from DVR players or snip screen shots which offer distort results. Traffic Investigators may count image frames with the assumption that frames rates are consistent, presenting results that are not true. Learn more about how you as an officer, investigator, accident reconstructionist or forensic engineers can prevent mistakes during investigations by using the software experts use; iNPUT-ACE.

This demo will show how iNPUT-ACE is able to read proprietary files, extract raw original data in a meaningful way that help you better understand issues that occur when viewing video from DVR’s and proprietary readers. The demo will also show you some good workflows for a better understanding of how speed and frame rates impact our understanding of events in use of force and traffic reconstruction. For a product demonstration, please visit our website or email Kelly Watt

Engineer “Testimony Dismissed” – be careful with Video


Prosecuting attorney Jonathan Hak offers a dire warning to experts who rely on video evidence without the requisite training or the slightest understanding of the effects of digital video compression. Hak, who specializes in admissibility issues relating to video evidence, authors a blog dedicated to helping experts avoid career-ending mistakes on the stand.


Hak’s latest paper offers an insightful and articulate dissection of a forensic engineering analysis of video evidence and of the excoriating judicial decision that followed. The paper describes in detail the work of a forensic engineer who, without any training in video examinations, video compression, deinterlacing, or image timing analysis, nevertheless opined on the meaning of the video images.



In Patel v. City of Madison, Alabama and Parker in the United States District Court for the Northern District of Alabama (Case 5:15-CV-0253-VEH), the Plaintiff claimed he was seriously injured during an altercation with police. Mr. Patel hired a Forensic Engineer to analyze the video in order to conduct measurements to prove his case. To rebut the Plaintiff’s expert, the police hired Grant Fredericks, a Certified Forensic Video Expert with over 30 years of experience as a video analyst. Fredericks employed the powerful iNPUT-ACE video analysis software to demonstrate to the court that all of the Plaintiff’s opinions were in error.


iNPUT-ACE provides a simple user interface that exposes potential frailties in video evidence; it provides accurate data relating to image timing; it guides biomechanical engineers and traffic crash experts through the discovery of critical elements of video compression; and it helps to direct examiners to hidden detail in video images. Most importantly, iNPUT-ACE offers a comprehensive training program to quickly build video examination competency among non-video experts.


Jonathan Hak provides a detailed analysis in his case study of how the engineering expert ventured outside of his area of expertise, diving head first into the deep end of video examination without the assistance of a tool like iNPUT-ACE and without the accompanying training.


The clear take-a-way from Hak’s article is that anyone who intends to comment about video evidence in an expert report, or who intends to offer expert testimony at trial, must have undertaken appropriate training, using appropriate tools.


The trial judge noted that the Defendants’ expert employed proper techniques and tools to support his analysis of the video and his rebuttal of the engineer’s evaluation of the video images. Grant Fredericks leveraged the power of iNPUT-ACE to quickly and accurately examine and interpret the reliability of the video images. “When uninformed and misleading (intended or not) expert evidence is presented to the trier of fact, we run the risk of the trier reaching the wrong conclusion and therefore a miscarriage of justice occurs,” writes Hak.


iNPUT-ACE takes this caution seriously, providing a comprehensive hands-on and web-based video training program for non-video experts. Visit one of our video Investigator Training classes in a city near you or call us for a web demonstration to see how iNPUT-ACE can raise your level of competency when dealing with video evidence.


Kelly Watt

Tips for Monitoring Kids’ Social Media

The American Academy of Pediatrics (AAP) recently released findings from a comprehensive study on the impact social media has on kids and families. Although there are real benefits to kids using sites like Facebook, including increased communication, access to information and help in developing a sense of self, there can be serious downsides to all this online sharing too.

Social networking is on the rise, and the study found that 22 percent of teenagers log onto their favorite social media sites more than 10 times a day, and that 75 percent own cell phones. This level of engagement online increases the risks of cyberbullying, “Facebook depression” (a new phenomenon where “de-friending” and online bullying lead to symptoms of depression), exposure to inappropriate content, and sexting.

Just as we prepare our kids for life in the real world, we should prepare them for life in the online world. Read on for tips that every parent should keep in mind.

To safely encourage an internet-savy child check out these Kid-Friendly Social Networking Sites

No Underage Facebooking
Did you know that no one under the age of 13 is permitted to join Facebook? However, there is no real way for Facebook to truly enforce it, because anyone can lie about their year of birth. You need to make sure that your child stays away from Facebook until 13 AND until you are comfortable with him or her having an account. There are measures put in place, such as reporting an underage child, but ultimately, it should be the parent who has the say on when and if that account gets created.

Check Privacy Settings 

Check that your privacy settings for the Internet and Facebook are set to the strictest levels. Depending on which browser you are using, you can adjust the settings directly from the options tab and adjust levels around cookies, third party sites and more. This not only protects the computer user, but also the computer from the threat of viruses. Checking your Facebook privacy settings is easy as well. Simply go here to ensure that you are up to speed on its privacy policy and make any changes you deem necessary.

Use Filtering Software 
There are software suites you can purchase to monitor your child’s Internet usage; many even enable you to view the exact keys that were typed, time spent online and all computer activity in general. Popular programs such as Net Nanny and PureSight PC let you monitor social media sites, block chats, filter content and much more. You can even monitor your child’s cell phone with a software program like My Mobile Watchdog.

Create Ground Rules
If your kids are old enough to be using the computer on their own, they are old enough to understand that there are rules they need to abide by. Breaking them should not have a lesser consequence than if they broke a rule in the offline world. The best way for families to agree on ground rules is to create a contract that all parties must sign. The Family Online Safety Institute (FOSI) encourages parents and kids to have an open discussion about what these rules mean, and offers a good example of a contract here.

Get To Know What Your Child’s Habits Are

You don’t need to be a super sleuth and spy on your kid’s every online move, but it is important to be aware of the kinds of sites he is frequenting and the people he is associating with. You get to know the friends he’s hanging out with at school, and his online friends shouldn’t be any different. One of the contract rules should be that you have full access to his Facebook friends and can take a look whenever you wish.

Another fantatsic tool to use is Tomoko Discovery, an enterprise online evidence authentication platform that solves simple and complex challenges, from collection to preservation of  Evidence from social media and online sources.  Their groundbreaking technology makes Tomoko Discovery the only platform that offers the preservation of evidence through Authenticated Desktop and Webcam Recording.

Since 2016, Tomoko Discovery has made it easier for people to securely collect and preserve Court Admissible Evidence from social media and online sources.
Today, more than 1000 users trust Tomoko Discovery. Click here for further info:

Source & For Further Tips:

Social Media Challenges and Concerns for Families

By: Gwenn Schurgin O’Keeffe, MD

“What’s the harm?” That’s the age-old rhetorical question parents ask when trying to
convince themselves that the new shiny toy or gizmo on the block is safe for their children.
In the age of electronics, this question has been asked about every new device:
video cassette recorders, televisions, radios, Walkmen, MP3 players, cell phones
used as phones, smart phones, tablets, gaming systems, apps, and now social media.
As with issues in the nondigital world, safety with social media is a balance between
common sense and understanding the rules of what one is using. Social media is a
tool. Like all tools, whether there is harm or not depends on how it is used. Used
correctly, there should not be a need for concern. Used incorrectly, problems could
Technology is faceless so it is tempting to forget that issues can occur from its use.
Technology seems like a mere tool, an extension of the ability to connect and communicate.
With a device in hand, we forget that there are people at the other end. With
interactions with people, however, complications can arise from miscommunications
to true harm, such as privacy breaches and bullying.
With face-to-face connections, we are not so brazen. We take more care in how we
interact. We are careful in our choice of words and our mannerisms. We teach our
Pediatrics Now, PO Box 5336, Wayland, MA 01778, USA
E-mail address:
 Social media  Cyber-bullying  Sexting  Family media plan  Texting
 Applications  Games
 Social media is everywhere and used by adults and children.
 Social media can have a positive impact on child development in terms of fostering
communication, socialization, and learning.
 Social medial can have a negative impact on child development with such issues as
bullying, sexting, and inappropriate content contributing to additional issues.
 Social media can have positive and negative issues on family health and needs to be used
within a family with attention and care with a focus on the ages of the children at home.

Access the full PDF here: PDF

A powerful solution to assist in securely collecting and preserving social media and online information is Tomoko Discovery. Click here for further info:

The 112 secret sexting codes kids are using on social media which parents need to know

With so much interaction done online, it’s increasingly tricky to know when your child is potentially in danger.

The line between trusting your child (and respecting their privacy) and policing them out of concern is a fine one for parents to tread.

As such, police have shared a list of ‘secret texting codes’ children are using.

These codes are also regularly used by sex pests looking to groom children online.

The list of abbreviations includes codes for ‘get naked on cam’, ‘parents are watching’, and ‘see you for sex’.

A spokesman for Newry and Mourne PSNI, said: “As a follow up to the text talk post just to clarify that this was an American resource and indeed some of the codes may not be being used here but it is something to be aware off if you see cryptic messages on your kids devices.

“Also prevention is better than cure so speak to your kids about their online activity, what they are using and respect the age limits of social media platforms – is it proper to set up a kid with a Facebook account at eight years old?

 A powerful tool to securely collect and preserve this social media and online info is Tomoko Discovery. Click here for further info:

“What is an appropriate age to give your child a smart phone or device and data or wifi access?

“There are hundreds of text talk codes – a simple online search will reveal what any codes you spot actually mean.”

Here is a further list of abbreviations regularly used by children:

  • 143 – I love you
  • 2DAY – Today
  • 4EAE – For ever and ever
  • ADN – Any day now
  • AFAIK – As far as I know
  • AFK – Away from keyboard
  • ASL – Age/sex/location
  • ATM – At the moment
  • BFN – Bye for now
  • BOL – Be on later
  • BRB – Be right back
  • BTW – By the way
  • CTN – Can’t talk now
  • DWBH – Don’t worry, be happy
  • F2F or FTF – Face to face
  • FWB – Friends with benefits
  • FYEO – For your eyes only
  • GAL – Get a life
  • GB – Goodbye
  • GLHF – Good luck, have fun
  • GTG– Got to go
  • GYPO – Get your pants off
  • HAK – Hugs and kisses
  • HAND – Have a nice day
  • HTH – Hope this helps / Happy to help
  • HW– Homework
  • IDK – I don’t know
  • IIRC – If I remember correctly
  • IKR– I know, right?
  • ILY / ILU– I love you
  • IM– Instant message
  • IMHO – In my honest opinion / In my humble opinion
  • IMO – In my opinion
  • IRL– In real life
  • IWSN – I want sex now
  • IU2U – It’s up to you
  • IYKWIM – If you know what I mean
  • J/K– Just kidding
  • J4F – Just for fun
  • JIC– Just in case
  • JSYK – Just so you know
  • KFY – Kiss for you
  • KPC – Keeping parents clueless
  • L8– Late
  • LMBO – Laughing my butt off
  • LMIRL – Let’s meet in real life
  • LMK– Let me know
  • LOL – Laugh out loud
  • LSR – Loser
  • MIRL – Meet in real life
  • MOS – Mum over shoulder
  • NAGI– Not a good idea
  • NIFOC– Nude in front of computer
  • NM – Never mind
  • NMU – Not much, you?
  • NP – No problem
  • NTS – Note to self
  • OIC – Oh I see
  • OMG – Oh my God
  • ORLY – Oh, really?
  • OT– Off topic
  • OTP– On the phone
  • P911– Parent alert
  • PAW – Parents are watching
  • PCM– Please call me
  • PIR – Parent in room
  • PLS or PLZ– Please
  • PPL – People
  • POS – Parents over shoulder
  • PTB– Please text back
  • QQ – Crying. This abbreviation produces an emoticon in text. It’s often used sarcastically.
  • RAK – Random act of kindness
  • RL – Real life
  • ROFL – Rolling on the floor laughing
  • RT – Retweet
  • RUOK – Are you okay?
  • SMH – Shaking my head
  • SOS – Someone over shoulder
  • SRSLY – Seriously
  • SSDD – Same stuff, different day
  • SWAK – Sealed with a kiss
  • SWYP – So, what’s your problem?
  • SYS – See you soon
  • TBC – To be continued
  • TDTM– Talk dirty to me
  • TIME – Tears in my eyes
  • WYCM – Will you call me?
  • TMI– Too much information
  • TMRW – Tomorrow
  • TTYL– Talk to you later
  • TY or TU– Thank you
  • VSF – Very sad face
  • WB – Welcome back
  • WTH – What the heck?
  • WTPA – Where the party at?
  • WYCM – Will you call me?
  • YGM – You’ve got mail
  • YOLO – You only live once
  • YW – You’re welcome
  • ZOMG – Oh my God (sarcastic)
  • 182 – I hate you
  • 420 – Marijuana
  • ADR – Address
  • CD9 – Code 9 – it means parents are around
  • ILU – I Love You
  • KOTL – Kiss On The Lips
  • LMIRL – Let’s Meet In Real Life
  • NIFOC – Nude In Front Of The Computer
  • P999 – Parent Alert
  • PAL – Parents Are Listening -or- Peace And Love
  • RU/18 – Are You Over 18?
  • WYRN – What’s Your Real Name?


Talking to Your Kids about Sexting — Tip Sheet

Sexting is most likely to have negative consequences when the person sending the sext has been pressured into doing it.

  • Talk about the characteristics of a healthy relationship:  Ask your kids if they think it’s ever appropriate to harass, embarrass, isolate or control their partner. Make sure they know that these behaviours are never okay.
  • Teach and model healthy emotional habits: Encourage them never to post or reply to something in anger, but “walk away” from the situation and wait until they’ve cooled down.
  • Talk about gender roles: Explain how girls and boys may feel they have to act in certain ways because of established gender roles. For example, boys may feel pressured by friends prove their masculinity by sharing sexual photos that their partners have sent them.
  • If you think your child is in an unhealthy relationship: Be clear that you think the relationship is unhealthy but don’t try to push them into leaving it. Instead, encourage him or her to spend more time with family and friends. Talk to your child’s friends to see if they have similar concerns.

Sending Sexts

Don’t just talk to girls about sexting. MediaSmarts’ research shows that boys are just as likely to send sexts as girls, and boys’ sexts are more likely to be forwarded.

  • Talk about how uncommon this kind of behaviour is: Youth may be motivated to engage in sexting if they believe “everybody is doing it”, so it is important for them to understand how rare these activities really are. (In our research, fewer than one in ten students who had access to a cellphone said they had sent a sext.)
  • Talk about digital permanence: Whenever kids are sharing personal things about themselves they should keep in mind that these could easily end up being seen by people they didn’t want it sent to.
  • Encourage your child/teen to ask themselves the following questions about what they are sharing:
    • Is this how I want people to see me?
    • Could somebody use this to hurt me? Would I be upset if they shared it with others?
    • What’s the worst thing that could happen if I shared this?
  • Discuss appropriate ways of showing you care for someone: Kids may think that sharing a nude or sexy photo with a girlfriend or boyfriend – or someone they hope will be their girlfriend or boyfriend – shows they love or trust them. Remind them to ask the questions above before sharing something this personal.
  • Remind them they shouldn’t do anything they don’t want to: Tell your kids that if somebody asks them to send something they are not comfortable doing, they have the right to say no. No one who loves or respects someone will pressure or threaten them.

Forwarding Sexts

MediaSmarts’ research suggests that sexts that are forwarded reach a fairly wide audience, so it’s important that kids understand how big an impact sharing sexts can have.

  • Encourage your child/teen to ask themselves the following questions when someone shares a sext with them:
    • Did the person in this picture mean for it to be shared?
    • If it came from someone other than the original sender, did they have permission from the person who’s in it?
    • How would I feel if somebody shared something like this with me in it?
  • Tell them if what they received makes that person look bad, would embarrass them, or could hurt them if it got around, don’t pass it on! The person who sent it may have meant it as a joke, but jokes can be a lot less funny when something is seen by the wrong person. They shouldn’t assume that “everybody’s already seen it!”
  • Tell your kids it’s okay to say no: A lot of people – boys especially – get pressured by their friends to share nude photos of their girlfriends or boyfriends. It can be hard to stand up to this pressure, but you have to think about how much giving in could hurt you and your girlfriend/boyfriend.
  • Treat everyone with respect online: MediaSmarts’ research suggests that youth who forward sexts don’t think of it as being wrong. Talk about ethical decision making and how to respect others online.

A powerful tool to securely collect and preserve social media and online info is Tomoko Discovery. Click here for further info: