axe10app - Capabilities & Comparison

available
  
read-only
axe10 APPLICATIONS (prices in £ sterling / user account / year) for local desktop deployment
LE - CM LE - III COMBO CVL LEGAL JUSTICE Lite
£295 £425 £595 FREE with COMBO £235 £125 FREE
Branding
Brand your axe10 application
 
 
 
 
 
 
 

Apply an Organisation Logo and name, so it displays on login and you take apparent ownership

 
Apply User Avatar
 
 
 
 
 
 
 
Allow users in your organisation the right to apply their own avatar, but only when the organisation does not apply a logo  
eDISCLOSURE
Unused Material
 
 
 
 
 
 
 

Material that is not used in the evidence report is stored in the case eBundle and each item of unused material is recorded in the Unused Material Report.

 
Sensitive Material
 
 
 
 
 
 
 

Material that is sensitive is marked as sensitive; is redacted in the evidence report, and recorded in a separate Sensitive Material Report that is stored in the Case eBundle. A copy can be removed from the case bundle without compromising the integrity of the case. A Competent Authority can manage Sensitive Material with CM or COMBO. In LEGAL & JUSTICE, Sensitive Material has no mamgement capability. Only the status is available as 'read-only', so marked as sensitive is redacted in the report.

 
Distribution Process
 
 
 
 
 
 
 

The all activity in the distribution process is logged and hashed. III requires CM to distribute safely. COMBO is good for everyhting.

 
eFORENSICS
Deployment Log
 
 
 
 
 
 
 

Allows the investigator to apply details of the deployment. Read-only in LEGAL & JUSTICE

 
Decision Log
 
 
 
 
 
 
 

Allows the investigator to detail the decision processes. In the case eBundle, Decision log items display in a dedicated Decision Log report. By default, the Decision Log does not display in the evidence report and can be removed from the case eBundle without compromising the forensic integrity of the case eBundle.

 
Notes Log
 
 
 
 
 
 
 

Allows the researcher to make notes that are not reported.

 
Audit Log
 
 
 
 
 
 
 

Logs with a timestamp all online activity and records all material gathered with both from online (III & COMBO) & offline (CM & COMBO) resources. An audit trail is generated, tracking: Case Data & Settings changes, Case Import/Export and all other activity performed with axe10. For browsing activity unrelated to a case, deploy the Brave browser.

 
Material Hashing
 
 
 
 
 
 
 

Material is hashed at point of collection. On export, a new hashes file is auto-generated. This file will contain the hashes applied to each item of material.

 
Video Log
 
 
 
 
 
 
 

Video Log of the whole investigation process is recorded. This option is available only when axe10 Cloud is deployed.

 
III (OSINT) Capabilities & Inherent Tools
Online Search Capability
 
 
 
 
 
 
 

A Search capability used to locate intelligence and material from multiple search engines, social media platforms and pre-selected databases. Some advanced search capabillities are automatically applied.

 
Secure Search
 
 
 
 
 
 
 

Search capabilities in Toolbox 1 and Toolbox 2 allow for a search string to be recorded while searching with any popular search engine. Some advanced search capabillities are automatically applied.

 
Grab ID
 
 
 
 
 
 
 

Extract the user ID of accounts on Facebook, Instagram or Twitter, to enable some of the axe10 tools to locate more intelligence & material.
Or to use it with third-party apps.

 
Facebook Advanced Search
 
 
 
 
 
 
 

With the advanced search function, it's easier and quicker to locate information regarding Facebook users.

 
Instagram Tools
 
 
 
 
 
 
 

Process Followers & Process Following. Compiles list with followers / following of a instagram account. List is limited to a maximum of 10.000 users, due to instagram's API restrictions. Tools can be accessed either from Toolbox 2, while on a profile page, or from the "Instagram" identifier search options, after it is filled with the profile url. List can either be downloaded locally or applied to the case as a csv file.

 
Twitter Advanced Search
 
 
 
 
 
 
 

Extract data from any public Twitter account, using functions (Convert @name to ID, Download a user’s timeline, Find conversations between two users, etc.) provided by the TweetBeaver site.

 
Page Archive 1
 
 
 
 
 
 
 

A built-in on demand archiving tool, that allows to save a copy of a web page (with the source code, javascript removed), for future reference. The archive is also accessible offline, from both the Audit Log and the exported case bundle. For the Lite version, access is provided also through Evidence Manager. Location of the source and Timestamp is logged in the Audit file.

 
Take screenshot – Complete
 
 
 
 
 
 
 

Take a screenshot of a web page, visible or not in the browser.
For an accurate complete screenshot, you should scroll down to the bottom of the page before taking the screenshot. Where the height of the screenshot exceeds 1 page height of A4, the screenshot is split into multiple images, as required. Each screenshot image is applied to the report.

 
Take screenshot – Visible
 
 
 
 
 
 
 

Take a screenshot of the part of a web page, visible in the browser.

 
Take Screenshot – Selection
 
 
 
 
 
 
 

Take a screenshot of a selected area of a web page.
The selection screenshot can be edited before being applied to the case.

 
Selection Screenshot Edit Tools
 
 
 
 
 
 
 

The “Selection Screenshot” function allows for the screenshot to be edited, before it is applied to the case.
Once the screenshot area is selected, the following edit tools become available:

  • Move Tool – move the screenshot selection to a different location on the webpage.
  • Resize Tool - resize the are selected screenshot area.
  • Blur Tool – apply a blur effect to selected sections of the screenshot. The blur tool has two options: the round and square shapes.
  • Cover Tool – select an area of the screenshot to cover. The cover tool has two options: the brush or the square selection.
  • Eyedropper – pick a colour from the selected screenshot area, for the cover tool.
  • Undo/Redo – undo/redo any edit to the screenshot that was performed with any of the edit tools.
 
Screenshot Security
 
 
 
 
 
 
 

Each screenshot is saved with a filename that includes an UNIX timestamp.
Each screenshot is recorded in the Audit Log with the ISO timestamp and the source URL.
A hash value is created for each screenshot.
A Research File displays the screenshot with the timestamp, source URL and hash value.
Where a Research Report that displays the screenshot, the timestamp and the source URL display adjacent to the image.
Research Doc is a specific feature to axe10 Lite that contains the outline of the research. Each screenshot is recorded in the Audit Log with the ISO timestamp and the source URL.
A complementary security measure consists in screenshots for each hashed document.

 
Screenshot Comments
 
 
 
 
 
 
 

A Coment can be applied to each screenshot, with option to display the comment in the research report.

 
Image Editor
 
 
 
 
 
 
 

The image editor may be used to make amendments to the image files applied to the case. The image format evidence, applied to the case, may be edited inside axe10 File Explorer with the same tools presented earlier and in the Lite version can be edited also in Evidence Manager.

 
Add Offline Material
 
 
 
 
 
 
 

Add any material file type to the case from a local drive or device on a LAN.

 
View EXIF Data
 
 
 
 
 
 
 

View any available EXIF data from jpeg & tiff (directly with ax10) files in any website, the axe10 generated report or axe10 file explorer.

 
View on map location from EXIF Data
 
 
 
 
 
 
 

Determine the location from where a photograph was taken by opening the coordinates from the extracted EXIF data, directly in Google Maps.

 
Whois
 
 
 
 
 
 
 

A specific search tool, redirects to http://spyonweb.com, https://domainbigdata.com, https://www.whois.com/whois to perform a domain lookup of the active website.

 
Wayback Machine
 
 
 
 
 
 
 

Provides access to archive.org database through sidebar, right click on webpage and afterwards inside axe10 toolbox 2 → Wayback Machine → Access archive.org database to locate any existing previous versions of the active web page.

 
Apply text/image to report
 
 
 
 
 
 
 

Apply text and images to the case, directly from a web page, and automatically record the source and timestamp of the evidence being attached and applied to the Audit File.

 
Case Processing
Create New Case
 
 
 
 
 
 
 

The ability to start a new case, before starting a new investigation, to offer the Audit Log the chance to record everything.

 
Import Existing Cases
 
 
 
 
 
 
 

Load case previously researched with axe10 by uploading the case eBundle.

 
Case Instructions
 
 
 
 
 
 
 

Apply "Instructions and Lawful Basis" when creating a new case. Either apply in the 'new case' screen, or apply and edit in Case Data & Settings. The User has the option to attach an instruction document.
Also, the option to show or hide instructions in the generated report.

 
Security Classification
 
 
 
 
 
 
 

Apply a GSC classification to each material item, from a drop down list.

 
axe10 File Explorer
 
 
 
 
 
 
 

Opens a tab in the browser, where all material is presented and various editing and disclosure options are made available. Read-only for LEGAL & JUSTICE

 
Report Manager Lite
 
 
 
 
 
 
 

A processing activity in axe10 Lite, providing editable fields, so that tags might be filtered and organised for each editable field.  To organise an axe10Lite case, creating order and hierarchy, the Drag&Drop function allows all editable items to be ordered as required. Each editable field allows for text to be applied that displays in the report.

 
Structure a case with POLE Categories & Dataset selection
 
 
 
 
 
 
 

With the POLE structure, axe10 complies with standard data model deployed by law enforcement.
The POLE structure supports People, Objects, Locations and Events (POLE) categorisation of material.
With the option to choose from various predefined POLE Items (People, Objects, Locations, Events) and Identifiers, any investigator can work on a case with multiple subjects and associates, so that complex cases can be managed.

 
Apply Data-sets to POLE Items
 
 
 
 
 
 
 

Select from 100s of available Datasets organised in POLE groups (eg: Name, Date of Birth, Phone numbers) with an option to apply new and custom datasets.

 
View DataSet Sources
 
 
 
 
 
 
 

View the source of material in a dataset.

 
Reorder POLE Items, Datasets & report sections
 
 
 
 
 
 
 

Reorder elements in the sidebar, with drag and drop.
Reordering elements in the sidebar will cause the appropriate reordering in the generated report.

 
Case Export (Case eBundle)
 
 
 
 
 
 
 

Case Export with auto-generated Case eBundles; that update with each export containing all processing since the previous export. All axe10app family  members have Case Export but with differing capabilities:

  • axe10 LE CM – Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx) and Report (PDF); Decision Log html file; DoNotModify.json – the case file. Unused Materials folder – contains a file for each category of unused material: non-sensitive, sensitive and undisclosed, in .docx format.
  • axe10 LE III–  Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx) and Report (PDF); Decision Log HTML file; DoNotModify.json – the case file.
  • axe10 COMBO–  Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx) and Report (PDF); Decision Log HTML file; DoNotModify.json – the case file.
  • axe10 CVL contains: Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx); Decision Log HTML file; DoNotModify.json – the case file.
  • axe10 LEGAL – same as axe10 LE
  • axe10 JUSTICE – same as axe10 LE
  • axe10 Lite contains: Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research Doc (docx); Decision Log HTML file; Notes HTML file; DoNotModify.json – the case file.

 

 
Reporting
Brand your Research Report
 
 
 
 
 
 
 

Inside each report generated by axe10 you can insert your own logo that will be displayed on the cover.

 
Research File
 
 
 
 
 
 
 

Preview the Research File within the browser and export as an MS Word doc. Not forensically secure, but provided in response to user requests.

 
Research Report
 
 
 
 
 
 
 

A forensically secure verbose report, generated from a template in PDF and editable inside axe10. Reports the entities and identifiers applied to the case. Within the Report template, variables are recorded that are relevant to the type of identifier input record.

 
Report Summary
 
 
 
 
 
 
 

Provides at the beginning of the report a specific editable section accessible through Case Data & Settings where a summary of the evidence presented in the overall report may be inserted.

 
Research Doc
 
 
 
 
 
 
 

Research Doc is a specific feature to axe10 Lite that contains the outline of the research. This is an MS Doc and is not forensically secure, and has been provided as a consequence of user requests.

 
Preview research doc
 
 
 
 
 
 
 

Preview within the browser for a general view.

 
Research Report Template
 
 
 
 
 
 
 

The report template applies text to each dartaset and variables update relevant to the type of data.

 
Research Report Editing
 
 
 
 
 
 
 

The Research Report is a forensically secure PDF that can be edited at any time within axe10 and the security is preserved.

 
Safe Report Management (Evidence Report editing)
 
 
 
 
 
 
 

The Evidence report is in PDF and is editable within axe10. Edit in axe10 preserves the forensic integrity of the report. The report is divided into sections, to allow for safe edit without compromising the resources of the computer. Each POLE category, or sub-category is a separate section.
This makes long reports (with lots of images) more manageable easier to edit. No lag, no crashes.

 
Research Report Auto-save
 
 
 
 
 
 
 

At specific time intervals the report shall be auto-saved. The specific setting can be found in the Preferences Menu, and can be edited.

 
Table of Contents in the Research Report
 
 
 
 
 
 
 

Automatic or Manual edit table of contents. Any changes made to the table of contents are available with the Manual mode, afterwards it will be exported in the generated PDF, several other options are available in PDF Settings. Auto page numbering is applied.

 
Research Report Export
 
 
 
 
 
 
 

The report is exported as a forensically secure PDF.

 
Security
Forensically Secure
 
 
 
 
 
 
 

Material gathered with axe10 and saved to a axe10 case eBundle is forensically secure. However, preservation in axe10 LITE deoes not meet procedural legislation guidelines. Do no rely on axe10 LITE for safe litigation of any matter.

 
Material Hashing
 
 
 
 
 
 
 

Material is hashed at the point of collection. When exporting, a new hashes file is auto-generated. This file will contain and report material hashes. All hashes are preserved and stored in the exported case eBundle.

 
Imaging Security of hash files
 
 
 
 
 
 
 

An image of all hashes is auto-generated to provide an additional layer of security.

 
Audit Log
 
 
 
 
 
 
 

All websites visited are logged with a timestamp and record of the URL  Links to any user taken archives. Records all Case Data & Settings changes and Case Import/Export activity, etc. Everything that happens inside the browser while axe10 is active will be logged. For any other internet activity, it is recommended to use a different browser.

 
Data Stored Locally
 
 
 
 
 
 
 

All material gathered during the investigation is stored on the local computer of the investigator. Axeten cannot access research data. For case data to be stored on your server or other networked drive, contact Axeten.

 
User Access Control
 
 
 
 
 
 
 

All axe10app versions require secure user access. This allows for safe sharing of a computer. After login, only the case being investigated by that user shall be accessible, although, any user with access rights to another case eBundle, can import and process that case eBundle.

 
Integrated III (OSINT) HELP
OSINT Sources
 
 
 
 
 
 
 

Hundreds of curated links to information websites in multiple jurisdictions

 
OSINT Resources
 
 
 
 
 
 
 

Links to tools and methodologies that assist the research process

 
axe10 Training & Support
Free Online Training
 
 
 
 
 
 
 

Available 2 times each week for any user with an active account of CM, III and COMBO. LEGAL & JUSTICE MIGHT INCUR A FEE. The is no free training for axe10 LITE

 
'How to' Videos
 
 
 
 
 
 
 

8 videos available but only for axe10 LITE

 
A way to receive live training for axe10 Lite
 
 
 
 
 
 
 
join an III (OSINT) training  
III (OSINT) Training
Axeten provides III (OSINT) training  
Gain skills and knowledge while learning how to use the axe10 Lite application  

 

1 GDPR Awareness

axe10 Lite for Desktop is Free. axe10 Lite on the Cloud is £100/user/year (Further Explanation)