axe10 APPLICATIONS for local desktop deployment |
LE - CM | LE - III | COMBO | CVL | LEGAL | JUSTICE | Lite |
---|---|---|---|---|---|---|---|
Branding | |||||||
Brand your axe10 application |
|
|
|
|
|
|
|
Apply an Organisation Logo and name, so it displays on login and you take apparent ownership |
|||||||
Apply User Avatar |
|
|
|
|
|
|
|
Allow users in your organisation the right to apply their own avatar, but only when the organisation does not apply a logo | |||||||
eDISCLOSURE | |||||||
Unused Material |
|
|
|
|
|
|
|
Material that is not used in the evidence report is stored in the case eBundle and each item of unused material is recorded in the Unused Material Report. |
|||||||
Sensitive Material |
|
|
|
|
|
|
|
Material that is sensitive is marked as sensitive; is redacted in the evidence report, and recorded in a separate Sensitive Material Report that is stored in the Case eBundle. A copy can be removed from the case bundle without compromising the integrity of the case. A Competent Authority can manage Sensitive Material with CM or COMBO. In LEGAL & JUSTICE, Sensitive Material has no mamgement capability. Only the status is available as 'read-only', so marked as sensitive is redacted in the report. |
|||||||
Distribution Process |
|
|
|
|
|
|
|
The all activity in the distribution process is logged and hashed. III requires CM to distribute safely. COMBO is good for everyhting. |
|||||||
eFORENSICS | |||||||
Deployment Log |
|
|
|
|
|
|
|
Allows the investigator to apply details of the deployment. Read-only in LEGAL & JUSTICE |
|||||||
Decision Log |
|
|
|
|
|
|
|
Allows the investigator to detail the decision processes. In the case eBundle, Decision log items display in a dedicated Decision Log report. By default, the Decision Log does not display in the evidence report and can be removed from the case eBundle without compromising the forensic integrity of the case eBundle. |
|||||||
Notes Log |
|
|
|
|
|
|
|
Allows the researcher to make notes that are not reported. |
|||||||
Audit Log |
|
|
|
|
|
|
|
Logs with a timestamp all online activity and records all material gathered with both from online (III & COMBO) & offline (CM & COMBO) resources. An audit trail is generated, tracking: Case Data & Settings changes, Case Import/Export and all other activity performed with axe10. For browsing activity unrelated to a case, deploy the Brave browser. |
|||||||
Material Hashing |
|
|
|
|
|
|
|
Material is hashed at point of collection. On export, a new hashes file is auto-generated. This file will contain the hashes applied to each item of material. |
|||||||
Video Log |
|
|
|
|
|
|
|
Video Log of the whole investigation process is recorded. This option is available only when axe10 Cloud is deployed. |
|||||||
III (OSINT) Capabilities & Inherent Tools | |||||||
Online Search Capability |
|
|
|
|
|
|
|
A Search capability used to locate intelligence and material from multiple search engines, social media platforms and pre-selected databases. Some advanced search capabillities are automatically applied. |
|||||||
Secure Search |
|
|
|
|
|
|
|
Search capabilities in Toolbox 1 and Toolbox 2 allow for a search string to be recorded while searching with any popular search engine. Some advanced search capabillities are automatically applied. |
|||||||
Grab ID |
|
|
|
|
|
|
|
Extract the user ID of accounts on Facebook, Instagram or Twitter, to enable some of the axe10 tools to locate more intelligence & material. |
|||||||
Facebook Advanced Search |
|
|
|
|
|
|
|
With the advanced search function, it's easier and quicker to locate information regarding Facebook users. |
|||||||
Instagram Tools |
|
|
|
|
|
|
|
Process Followers & Process Following. Compiles list with followers / following of a instagram account. List is limited to a maximum of 10.000 users, due to instagram's API restrictions. Tools can be accessed either from Toolbox 2, while on a profile page, or from the "Instagram" identifier search options, after it is filled with the profile url. List can either be downloaded locally or applied to the case as a csv file. |
|||||||
Twitter Advanced Search |
|
|
|
|
|
|
|
Extract data from any public Twitter account, using functions (Convert @name to ID, Download a user’s timeline, Find conversations between two users, etc.) provided by the TweetBeaver site. |
|||||||
Page Archive 1 |
|
|
|
|
|
|
|
A built-in on demand archiving tool, that allows to save a copy of a web page (with the source code, javascript removed), for future reference. The archive is also accessible offline, from both the Audit Log and the exported case bundle. For the Lite version, access is provided also through Evidence Manager. Location of the source and Timestamp is logged in the Audit file. |
|||||||
Take screenshot – Complete |
|
|
|
|
|
|
|
Take a screenshot of a web page, visible or not in the browser. |
|||||||
Take screenshot – Visible |
|
|
|
|
|
|
|
Take a screenshot of the part of a web page, visible in the browser. |
|||||||
Take Screenshot – Selection |
|
|
|
|
|
|
|
Take a screenshot of a selected area of a web page. |
|||||||
Selection Screenshot Edit Tools |
|
|
|
|
|
|
|
The “Selection Screenshot” function allows for the screenshot to be edited, before it is applied to the case.
|
|||||||
Screenshot Security |
|
|
|
|
|
|
|
Each screenshot is saved with a filename that includes an UNIX timestamp. |
|||||||
Screenshot Comments |
|
|
|
|
|
|
|
A Coment can be applied to each screenshot, with option to display the comment in the research report. |
|||||||
Image Editor |
|
|
|
|
|
|
|
The image editor may be used to make amendments to the image files applied to the case. The image format evidence, applied to the case, may be edited inside axe10 File Explorer with the same tools presented earlier and in the Lite version can be edited also in Evidence Manager. |
|||||||
Add Offline Material |
|
|
|
|
|
|
|
Add any material file type to the case from a local drive or device on a LAN. |
|||||||
View EXIF Data |
|
|
|
|
|
|
|
View any available EXIF data from jpeg & tiff (directly with ax10) files in any website, the axe10 generated report or axe10 file explorer. |
|||||||
View on map location from EXIF Data |
|
|
|
|
|
|
|
Determine the location from where a photograph was taken by opening the coordinates from the extracted EXIF data, directly in Google Maps. |
|||||||
Whois |
|
|
|
|
|
|
|
A specific search tool, redirects to http://spyonweb.com, https://domainbigdata.com, https://www.whois.com/whois to perform a domain lookup of the active website. |
|||||||
Wayback Machine |
|
|
|
|
|
|
|
Provides access to archive.org database through sidebar, right click on webpage and afterwards inside axe10 toolbox 2 → Wayback Machine → Access archive.org database to locate any existing previous versions of the active web page. |
|||||||
Apply text/image to report |
|
|
|
|
|
|
|
Apply text and images to the case, directly from a web page, and automatically record the source and timestamp of the evidence being attached and applied to the Audit File. |
|||||||
Case Processing | |||||||
Create New Case |
|
|
|
|
|
|
|
The ability to start a new case, before starting a new investigation, to offer the Audit Log the chance to record everything. |
|||||||
Import Existing Cases |
|
|
|
|
|
|
|
Load case previously researched with axe10 by uploading the case eBundle. |
|||||||
Case Instructions |
|
|
|
|
|
|
|
Apply "Instructions and Lawful Basis" when creating a new case. Either apply in the 'new case' screen, or apply and edit in Case Data & Settings. The User has the option to attach an instruction document. |
|||||||
Security Classification |
|
|
|
|
|
|
|
Apply a GSC classification to each material item, from a drop down list. |
|||||||
axe10 File Explorer |
|
|
|
|
|
|
|
Opens a tab in the browser, where all material is presented and various editing and disclosure options are made available. Read-only for LEGAL & JUSTICE |
|||||||
Report Manager Lite |
|
|
|
|
|
|
|
A processing activity in axe10 Lite, providing editable fields, so that tags might be filtered and organised for each editable field. To organise an axe10Lite case, creating order and hierarchy, the Drag&Drop function allows all editable items to be ordered as required. Each editable field allows for text to be applied that displays in the report. |
|||||||
Structure a case with POLE Categories & Dataset selection |
|
|
|
|
|
|
|
With the POLE structure, axe10 complies with standard data model deployed by law enforcement. |
|||||||
Apply Data-sets to POLE Items |
|
|
|
|
|
|
|
Select from 100s of available Datasets organised in POLE groups (eg: Name, Date of Birth, Phone numbers) with an option to apply new and custom datasets. |
|||||||
View DataSet Sources |
|
|
|
|
|
|
|
View the source of material in a dataset. |
|||||||
Reorder POLE Items, Datasets & report sections |
|
|
|
|
|
|
|
Reorder elements in the sidebar, with drag and drop. |
|||||||
Case Export (Case eBundle) |
|
|
|
|
|
|
|
Case Export with auto-generated Case eBundles; that update with each export containing all processing since the previous export. All axe10app family members have Case Export but with differing capabilities:
|
|||||||
Reporting | |||||||
Brand your Research Report |
|
|
|
|
|
|
|
Inside each report generated by axe10 you can insert your own logo that will be displayed on the cover. |
|||||||
Research File |
|
|
|
|
|
|
|
Preview the Research File within the browser and export as an MS Word doc. Not forensically secure, but provided in response to user requests. |
|||||||
Research Report |
|
|
|
|
|
|
|
A forensically secure verbose report, generated from a template in PDF and editable inside axe10. Reports the entities and identifiers applied to the case. Within the Report template, variables are recorded that are relevant to the type of identifier input record. |
|||||||
Report Summary |
|
|
|
|
|
|
|
Provides at the beginning of the report a specific editable section accessible through Case Data & Settings where a summary of the evidence presented in the overall report may be inserted. |
|||||||
Research Doc |
|
|
|
|
|
|
|
Research Doc is a specific feature to axe10 Lite that contains the outline of the research. This is an MS Doc and is not forensically secure, and has been provided as a consequence of user requests. |
|||||||
Preview research doc |
|
|
|
|
|
|
|
Preview within the browser for a general view. |
|||||||
Research Report Template |
|
|
|
|
|
|
|
The report template applies text to each dartaset and variables update relevant to the type of data. |
|||||||
Research Report Editing |
|
|
|
|
|
|
|
The Research Report is a forensically secure PDF that can be edited at any time within axe10 and the security is preserved. |
|||||||
Safe Report Management (Evidence Report editing) |
|
|
|
|
|
|
|
The Evidence report is in PDF and is editable within axe10. Edit in axe10 preserves the forensic integrity of the report. The report is divided into sections, to allow for safe edit without compromising the resources of the computer. Each POLE category, or sub-category is a separate section. |
|||||||
Research Report Auto-save |
|
|
|
|
|
|
|
At specific time intervals the report shall be auto-saved. The specific setting can be found in the Preferences Menu, and can be edited. |
|||||||
Table of Contents in the Research Report |
|
|
|
|
|
|
|
Automatic or Manual edit table of contents. Any changes made to the table of contents are available with the Manual mode, afterwards it will be exported in the generated PDF, several other options are available in PDF Settings. Auto page numbering is applied. |
|||||||
Research Report Export |
|
|
|
|
|
|
|
The report is exported as a forensically secure PDF. |
|||||||
Security | |||||||
Forensically Secure |
|
|
|
|
|
|
|
Material gathered with axe10 and saved to a axe10 case eBundle is forensically secure. However, preservation in axe10 LITE deoes not meet procedural legislation guidelines. Do no rely on axe10 LITE for safe litigation of any matter. |
|||||||
Material Hashing |
|
|
|
|
|
|
|
Material is hashed at the point of collection. When exporting, a new hashes file is auto-generated. This file will contain and report material hashes. All hashes are preserved and stored in the exported case eBundle. |
|||||||
Imaging Security of hash files |
|
|
|
|
|
|
|
An image of all hashes is auto-generated to provide an additional layer of security. |
|||||||
Audit Log |
|
|
|
|
|
|
|
All websites visited are logged with a timestamp and record of the URL Links to any user taken archives. Records all Case Data & Settings changes and Case Import/Export activity, etc. Everything that happens inside the browser while axe10 is active will be logged. For any other internet activity, it is recommended to use a different browser. |
|||||||
Data Stored Locally |
|
|
|
|
|
|
|
All material gathered during the investigation is stored on the local computer of the investigator. Axeten cannot access research data. For case data to be stored on your server or other networked drive, contact Axeten. |
|||||||
User Access Control |
|
|
|
|
|
|
|
All axe10app versions require secure user access. This allows for safe sharing of a computer. After login, only the case being investigated by that user shall be accessible, although, any user with access rights to another case eBundle, can import and process that case eBundle. |
|||||||
Integrated III (OSINT) HELP | |||||||
OSINT Sources |
|
|
|
|
|
|
|
Hundreds of curated links to information websites in multiple jurisdictions |
|||||||
OSINT Resources |
|
|
|
|
|
|
|
Links to tools and methodologies that assist the research process |
|||||||
axe10 Training & Support | |||||||
Free Online Training |
|
|
|
|
|
|
|
Available 2 times each week for any user with an active account of CM, III and COMBO. LEGAL & JUSTICE MIGHT INCUR A FEE. The is no free training for axe10 LITE |
|||||||
'How to' Videos |
|
|
|
|
|
|
|
8 videos available but only for axe10 LITE |
|||||||
A way to receive live training for axe10 Lite |
|
|
|
|
|
|
|
join an III (OSINT) training | |||||||
III (OSINT) Training | |||||||
Axeten provides III (OSINT) training | |||||||
Gain skills and knowledge while learning how to use the axe10 Lite application |
1 GDPR Awareness
axe10 Lite for Desktop is Free. axe10 Lite on the Cloud is £100/user/year (Further Explanation)