NVMe SSDs are already being used today in many laptops and they will become more popular storage devices in the near future, all because of their incredible speed and low power.
Forensic investigators already encounter the need to capture data from NVMe SSDs, and IT professionals also have an increased need to clone NVMe SSDs.
Implementation of NVMe cloning and imaging is not trivial, since the SSDs connect directly to the PCIe bus. Also the NVMe drives are not compatible with SAS, SATA or USB storage protocols, and hot-plugging NVMe SSDs is a challenge.
Here is what MediaClone has to offer:
Please contact us for further information and pricing.
We will be hosting a range of Social Media Investigator courses with certification upon completion of Social Media Investigator Level 1 & Level 2.
These hands-on, fast-paced, 5 & 3 day training courses, teach an array of social media investigative techniques, from mining the Dark Web to the effective use of free social media and open source intelligence-type tools and methodologies.
• Social Media Investigator Level 1
• Social Media Investigator Level 2*
• Dark Web Investigations:
A course for investigators *
• Bitcoin, Blockchain & Cryptocurrency
Investigations: A course for
At the end of successfully completing the Social Media Investigator Level 2 Training, attendees will become a Certified Social Media Investigator.
* Social Media Investigator Level 1 Required.
1 – 5 OCTOBER 2018
Social Media Investigator Level 1
8 – 12 OCTOBER 2018
Social Media Investigator Level 2
15 – 17 OCTOBER 2018
Dark Web Investigations
18 – 20 OCTOBER 2018
Bitcoin, Blockchain & Cryptocurrency Investigations
VENUE: 133 ALTHEA STREET, DIE HOEWES, CENTURION.
TIMES: 8:00 – 16:00
WHO SHOULD ATTEND?
• Law Enforcement
• Intelligence Analysts (All Agencies)
• Cyber Security Professionals
• Risk Managers
• Human Resource Departments
• Corporate Security Professionals
• Risk Analysts
• Financial Investigators
• Forensic Investigators
• Heads of Forensic Investigation
• Professional Recruiters
• Customs & Immigration Investigators
We are happy to announce the release of Version 2.2.1.
The iNPUT-ACE team has been hard at work making another round of improvements based on user feedback. Here are some of the upgrades you can look forward to utilizing after you complete the update:
File List Changes: Adjustable Width, Reordering, & Group Number Indicator
We have made the File List width adjustable to help you find files in the list more efficiently and track what file pertains to which piece of evidence. Just drag the list out to make it wide enough to read the entire file name and then slide it back when you don’t need the expanded view and want the space dedicated to the playback window. That’s the second high point of the adjustable File List: now you can create a bigger playback window to view the evidence, so details are easier to identify and track through the video. We have also added this functionality to the metadata section in the interrogate tab!
It is common for a single case to involve multiple video files. That’s why we have added a seamless drag and drop experience for groups/file reordering to make it easier for users to organize their data and key evidence. And once you have all your files added to your project, you can now check the counter next to the group to make sure they are all accounted for.
To add another layer of organization and ease of use, when you playback video, the file name will be highlighted in orange in the File List making it recognizable at-a-glance.
To see a short clip of these options in action visit our blog update on the release here.
Narrative Report: Improved Add Page Option
The improved function of the Add Page option in the Narrative Report tool now adds a blank page to your report without impacting the existing content. We have also made some changes to the Narrative Report tool that will make building your reports smoother. Try it out today to see how your feedback is making this tool better with every update!
Project: Loading/Saving Time Improvements
We understand the impact time can have on a case and on your day in general, so we have made significant improvements to the loading/saving function to run faster. Your projects will save or open in just a matter of minutes.
As always, offline users can get the latest version from, download.input-ace.com/release.
A big thank you to all of our users, your insights and feedback are helping us make great improvements, keep sending them to us under Help > Submit Feedback. Please update your iNPUT-ACE software and start taking advantage of all the improvements today.
Copyright © 2018 iNPUT-ACE, All rights reserved.
Published on December 15, 2017
Its amazing the problems video presents to users who are not familiar to the numerous ways CCTV, dash-cam and body-cam recording devices distort the true data. https://inputace.wistia.com/medias/0cqbvl88k9 Most proprietary video players distort or change video when the DVR is compressing it, especially when multiple videos are running through 1 DVR, or when a higher quality is taxing the bit-rate.
Images can be stretched as aspect ratios are not accurate, colors distorted, loss of details/edges, strange artifacts show in the image, and/or data is sometimes removed in this process. Often times image frames are dropped or even removed completely from the playable video players. We reviewed one case showing 4 frames per second in this demonstration, when the original frames were 30 frames per second. Also, frame rates can be inconsistent. In one case we showed the original recording with a frame rate starting at 1 frame per second, then jumping to 10 frames per second and showing varying rates. When viewing a use of force scenario it may appear that an officer lunges at the suspect in custody and slammed him against a wall, but after reviewing the inconsistency of the frame rates the story is much different.
Compressed image frames called Predictive frames, or “P” frames, literally ignore changing data. They ignore pixels from the previous frames, only to capture movement. Objects can appear or disappear as a result, distorting what actually occurred causing very poor quality image frames. In order to better understand these video clips or images, we may need to enhance or clarify by removing the “P” frames and matching the “I” frames to better see what had occurred. DVR players interfaces can also cause users headaches with limited functionality or ability to read critical meta data. Investigators screen record video from DVR players or snip screen shots which offer distort results. Traffic Investigators may count image frames with the assumption that frames rates are consistent, presenting results that are not true. Learn more about how you as an officer, investigator, accident reconstructionist or forensic engineers can prevent mistakes during investigations by using the software experts use; iNPUT-ACE.
This demo will show how iNPUT-ACE is able to read proprietary files, extract raw original data in a meaningful way that help you better understand issues that occur when viewing video from DVR’s and proprietary readers. The demo will also show you some good workflows for a better understanding of how speed and frame rates impact our understanding of events in use of force and traffic reconstruction. For a product demonstration, please visit our website or email email@example.com. Kelly Watt
Prosecuting attorney Jonathan Hak offers a dire warning to experts who rely on video evidence without the requisite training or the slightest understanding of the effects of digital video compression. Hak, who specializes in admissibility issues relating to video evidence, authors a blog dedicated to helping experts avoid career-ending mistakes on the stand.
Hak’s latest paper offers an insightful and articulate dissection of a forensic engineering analysis of video evidence and of the excoriating judicial decision that followed. The paper describes in detail the work of a forensic engineer who, without any training in video examinations, video compression, deinterlacing, or image timing analysis, nevertheless opined on the meaning of the video images.
In Patel v. City of Madison, Alabama and Parker in the United States District Court for the Northern District of Alabama (Case 5:15-CV-0253-VEH), the Plaintiff claimed he was seriously injured during an altercation with police. Mr. Patel hired a Forensic Engineer to analyze the video in order to conduct measurements to prove his case. To rebut the Plaintiff’s expert, the police hired Grant Fredericks, a Certified Forensic Video Expert with over 30 years of experience as a video analyst. Fredericks employed the powerful iNPUT-ACE video analysis software to demonstrate to the court that all of the Plaintiff’s opinions were in error.
iNPUT-ACE provides a simple user interface that exposes potential frailties in video evidence; it provides accurate data relating to image timing; it guides biomechanical engineers and traffic crash experts through the discovery of critical elements of video compression; and it helps to direct examiners to hidden detail in video images. Most importantly, iNPUT-ACE offers a comprehensive training program to quickly build video examination competency among non-video experts.
Jonathan Hak provides a detailed analysis in his case study of how the engineering expert ventured outside of his area of expertise, diving head first into the deep end of video examination without the assistance of a tool like iNPUT-ACE and without the accompanying training.
The clear take-a-way from Hak’s article is that anyone who intends to comment about video evidence in an expert report, or who intends to offer expert testimony at trial, must have undertaken appropriate training, using appropriate tools.
The trial judge noted that the Defendants’ expert employed proper techniques and tools to support his analysis of the video and his rebuttal of the engineer’s evaluation of the video images. Grant Fredericks leveraged the power of iNPUT-ACE to quickly and accurately examine and interpret the reliability of the video images. “When uninformed and misleading (intended or not) expert evidence is presented to the trier of fact, we run the risk of the trier reaching the wrong conclusion and therefore a miscarriage of justice occurs,” writes Hak.
iNPUT-ACE takes this caution seriously, providing a comprehensive hands-on and web-based video training program for non-video experts. Visit one of our video Investigator Training classes in a city near you or call us for a web demonstration to see how iNPUT-ACE can raise your level of competency when dealing with video evidence.
The American Academy of Pediatrics (AAP) recently released findings from a comprehensive study on the impact social media has on kids and families. Although there are real benefits to kids using sites like Facebook, including increased communication, access to information and help in developing a sense of self, there can be serious downsides to all this online sharing too.
Social networking is on the rise, and the study found that 22 percent of teenagers log onto their favorite social media sites more than 10 times a day, and that 75 percent own cell phones. This level of engagement online increases the risks of cyberbullying, “Facebook depression” (a new phenomenon where “de-friending” and online bullying lead to symptoms of depression), exposure to inappropriate content, and sexting.
Just as we prepare our kids for life in the real world, we should prepare them for life in the online world. Read on for tips that every parent should keep in mind.
To safely encourage an internet-savy child check out these Kid-Friendly Social Networking Sites
No Underage Facebooking
Did you know that no one under the age of 13 is permitted to join Facebook? However, there is no real way for Facebook to truly enforce it, because anyone can lie about their year of birth. You need to make sure that your child stays away from Facebook until 13 AND until you are comfortable with him or her having an account. There are measures put in place, such as reporting an underage child, but ultimately, it should be the parent who has the say on when and if that account gets created.
Use Filtering Software
There are software suites you can purchase to monitor your child’s Internet usage; many even enable you to view the exact keys that were typed, time spent online and all computer activity in general. Popular programs such as Net Nanny and PureSight PC let you monitor social media sites, block chats, filter content and much more. You can even monitor your child’s cell phone with a software program like My Mobile Watchdog.
Create Ground Rules
If your kids are old enough to be using the computer on their own, they are old enough to understand that there are rules they need to abide by. Breaking them should not have a lesser consequence than if they broke a rule in the offline world. The best way for families to agree on ground rules is to create a contract that all parties must sign. The Family Online Safety Institute (FOSI) encourages parents and kids to have an open discussion about what these rules mean, and offers a good example of a contract here.
You don’t need to be a super sleuth and spy on your kid’s every online move, but it is important to be aware of the kinds of sites he is frequenting and the people he is associating with. You get to know the friends he’s hanging out with at school, and his online friends shouldn’t be any different. One of the contract rules should be that you have full access to his Facebook friends and can take a look whenever you wish.
Another fantatsic tool to use is Tomoko Discovery, an enterprise online evidence authentication platform that solves simple and complex challenges, from collection to preservation of Evidence from social media and online sources. Their groundbreaking technology makes Tomoko Discovery the only platform that offers the preservation of evidence through Authenticated Desktop and Webcam Recording.
Since 2016, Tomoko Discovery has made it easier for people to securely collect and preserve Court Admissible Evidence from social media and online sources.
Today, more than 1000 users trust Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/
Source & For Further Tips: https://www.parenting.com/gallery/social-media-monitoring-kids
By: Gwenn Schurgin O’Keeffe, MD
“What’s the harm?” That’s the age-old rhetorical question parents ask when trying to
convince themselves that the new shiny toy or gizmo on the block is safe for their children.
In the age of electronics, this question has been asked about every new device:
video cassette recorders, televisions, radios, Walkmen, MP3 players, cell phones
used as phones, smart phones, tablets, gaming systems, apps, and now social media.
As with issues in the nondigital world, safety with social media is a balance between
common sense and understanding the rules of what one is using. Social media is a
tool. Like all tools, whether there is harm or not depends on how it is used. Used
correctly, there should not be a need for concern. Used incorrectly, problems could
Technology is faceless so it is tempting to forget that issues can occur from its use.
Technology seems like a mere tool, an extension of the ability to connect and communicate.
With a device in hand, we forget that there are people at the other end. With
interactions with people, however, complications can arise from miscommunications
to true harm, such as privacy breaches and bullying.
With face-to-face connections, we are not so brazen. We take more care in how we
interact. We are careful in our choice of words and our mannerisms. We teach our
Pediatrics Now, PO Box 5336, Wayland, MA 01778, USA
E-mail address: DrGwenn@pediatricsnow.com
Social media Cyber-bullying Sexting Family media plan Texting
Social media is everywhere and used by adults and children.
Social media can have a positive impact on child development in terms of fostering
communication, socialization, and learning.
Social medial can have a negative impact on child development with such issues as
bullying, sexting, and inappropriate content contributing to additional issues.
Social media can have positive and negative issues on family health and needs to be used
within a family with attention and care with a focus on the ages of the children at home.
Access the full PDF here: PDF
A powerful solution to assist in securely collecting and preserving social media and online information is Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/
With so much interaction done online, it’s increasingly tricky to know when your child is potentially in danger.
The line between trusting your child (and respecting their privacy) and policing them out of concern is a fine one for parents to tread.
As such, police have shared a list of ‘secret texting codes’ children are using.
These codes are also regularly used by sex pests looking to groom children online.
The list of abbreviations includes codes for ‘get naked on cam’, ‘parents are watching’, and ‘see you for sex’.
A spokesman for Newry and Mourne PSNI, said: “As a follow up to the text talk post just to clarify that this was an American resource and indeed some of the codes may not be being used here but it is something to be aware off if you see cryptic messages on your kids devices.
“Also prevention is better than cure so speak to your kids about their online activity, what they are using and respect the age limits of social media platforms – is it proper to set up a kid with a Facebook account at eight years old?
Sexting is most likely to have negative consequences when the person sending the sext has been pressured into doing it.
Don’t just talk to girls about sexting. MediaSmarts’ research shows that boys are just as likely to send sexts as girls, and boys’ sexts are more likely to be forwarded.
MediaSmarts’ research suggests that sexts that are forwarded reach a fairly wide audience, so it’s important that kids understand how big an impact sharing sexts can have.
A powerful tool to securely collect and preserve social media and online info is Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/