axe10app - Capability Comparison

axe10 APPLICATIONS (prices in £ sterling / user account / year) for local desktop deployment
LE - CM LE - III (OSINT) CVL LEGAL JUSTICE Lite
£495 £405 £595 £235 £125  FREE
Branding
Brand your axe10 application
 
 
 
 
 
 

Apply an Organisation Logo and name, so it displays on login and you take apparent ownership

 
User Avatars
 
 
 
 
 
 
Allow users in your organisation the right to apply their own avatar, but only when the organisation does not apply a logo  
eDISCLOSURE
Unused Material
 
 
 
 
 
 

Material that is not used in the evidence report is stored in the case bundle and each file is recorded in the Unused Material Report.

 
Sensitive Material
 
 
 
 
 
 

Material that is sensitive is marked as sensitive; is redacted in the evidence report, and recorded in a separate Sensitive Material Report that is stored in the Case Bundle. A copy can be removed from the case bundle without compromising the integrity of the case.

 
Distribution Process
 
 
 
 
 
 

The all activity in the distribution process is logged and hashed.

 
eFORENSICS
Deployment Log
 
 
 
 
 
 

Allows the investigator to apply details of the deployment.

 
Decision Log
 
 
 
 
 
 

Allows the investigator to detail the decision processes. In the case eBundle, Decision log items display in a dedicated Decision Log report. The Decision Log does not display in the evidence report and can be removed from the case eBundle without compromising the forensic integrity of the case eBundle.

 
Notes Log
 
 
 
 
 
 

Allows the researcher to make notes that are not reported.

 
Audit Log
 
 
 
 
 
 

Logs with a timestamp all websites the user visits. Links to any user gathered archives. An audit trail is generated, tracking: Case Data & Settings changes, Case Import/Export and all other activity performed with axe10. For browsing activity unrelated to a case, deploy the Brave browser.

 
Material Hashing
 
 
 
 
 
 

Material hasshed at point of collection. On export, a new hashes file is auto-generated. This file will contain all report resources hashes.

 
Video Log
 
 
 
 
 
 

Video Log of the whole investigation process is recorded. This option is available only when axe10 Cloud is deployed.

 
III (OSINT) Capabilities & Inherent Tools
Evidence Search Feature
 
 
 
 
 
 

The Search Feature may be used to search the evidence applied to the case, with various search engines.

 
Expansive Search
 
 
 
 
 
 

The Expansive Search allows for the evidence applied to the case to be further investigated, by conducting searches with different search engines and on various online databases and social media platforms.

 
Grab ID
 
 
 
 
 
 

Extract the user ID of accounts on Facebook, Instagram or Twitter, to enable some of the axe10 tools to access more public information.
Or to use it with third-party apps.

 
Facebook Advanced Search
 
 
 
 
 
 

With the advanced search function, it's easier and quicker to locate information regarding Facebook users.

 
Instagram Tools
 
 
 
 
 
 

Process Followers & Process Following. Compiles list with followers / following of a instagram account. List is limited to a maximum of 10.000 users, due to instagram's API restrictions. Tools can be accessed either from Toolbox 2, while on a profile page, or from the "Instagram" identifier search options, after it is filled with the profile url. List can either be downloaded locally or applied to the case as a csv file.

 
Twitter Advanced Search
 
 
 
 
 
 

Extract data from any public Twitter account, using functions (Convert @name to ID, Download a user’s timeline, Find conversations between two users, etc.) provided by the TweetBeaver site.

 
Page Archive 1
 
 
 
 
 
 

A built-in on demand archiving tool, that allows to save a copy of a web page (with the source code, javascript removed), for future reference. The archive is also accessible offline, from both the Audit Log and the exported case bundle. For the Lite version, access is provided also through Evidence Manager. Location of the source and Timestamp is logged in the Audit file.

 
Take screenshot – Complete
 
 
 
 
 
 

Take a screenshot of a web page, visible or not in the browser.
For an accurate complete screenshot, you should scroll down to the bottom of the page before taking the screenshot. Where the height of the screenshot exceeds 1 page height of A4, the screenshot is split into multiple images, as required. Each screenshot image is applied to the report.

 
Take screenshot – Visible
 
 
 
 
 
 

Take a screenshot of the part of a web page, visible in the browser.

 
Take Screenshot – Selection
 
 
 
 
 
 

Take a screenshot of a selected area of a web page.
The selection screenshot can be edited before being applied to the case.

 
Selection Screenshot Edit Tools
 
 
 
 
 
 

The “Selection Screenshot” function allows for the screenshot to be edited, before it is applied to the case.
Once the screenshot area is selected, the following edit tools become available:

  • Move Tool – move the screenshot selection to a different location on the webpage.
  • Resize Tool - resize the are selected screenshot area.
  • Blur Tool – apply a blur effect to selected sections of the screenshot. The blur tool has two options: the round and square shapes.
  • Cover Tool – select an area of the screenshot to cover. The cover tool has two options: the brush or the square selection.
  • Eyedropper – pick a colour from the selected screenshot area, for the cover tool.
  • Undo/Redo – undo/redo any edit to the screenshot that was performed with any of the edit tools.
 
Screenshot Security
 
 
 
 
 
 

Each screenshot is saved with a filename that includes an UNIX timestamp.
Each screenshot is recorded in the Audit Log with the ISO timestamp and the source URL.
A hash value is created for each screenshot.
A Research File displays the screenshot with the timestamp, source URL and hash value.
Where a Research Report that displays the screenshot, the timestamp and the source URL display adjacent to the image.
Research Doc is a specific feature to axe10 Lite that contains the outline of the research. Each screenshot is recorded in the Audit Log with the ISO timestamp and the source URL.
A complementary security measure consists in screenshots for each hashed document.

 
Screenshot Comments
 
 
 
 
 
 

Each screenshot can be accompanied by a comment that will appear or not in the Research Doc, depending by the researcher that checks or not that specific comment, check box.

 
Image Editor
 
 
 
 
 
 

The image editor may be used to make amendments to the image files applied to the case. The image format evidence, applied to the case, may be edited inside axe10 File Explorer with the same tools presented earlier and in the Lite version can be edited also in Evidence Manager.

 
Add Offline Material
 
 
 
 
 
 

Add any material file type to the case from the web or from a local drive.

 
View EXIF Data
 
 
 
 
 
 

View any available EXIF data from jpeg & tiff (directly with ax10) files in any website, the axe10 generated report or axe10 file explorer.

 
View on map location from EXIF Data
 
 
 
 
 
 

View where a photograph was taken by opening the coordinates from the extracted EXIF data, directly in Google Maps.

 
Whois
 
 
 
 
 
 

A specific search tool, redirects to http://spyonweb.com, https://domainbigdata.com, https://www.whois.com/whois to perform a domain lookup of the active website.

 
Wayback Machine
 
 
 
 
 
 

Provides access to archive.org database through sidebar, right click on webpage and afterwards inside axe10 toolbox 2 → Wayback Machine → Access archive.org database to locate any existing previous versions of the active web page.

 
Apply text/image to report
 
 
 
 
 
 

Apply text and images to the case, directly from a web page, and automatically record the source and timestamp of the evidence being attached and applied to the Audit File.

 
Case Processing
Create New Case
 
 
 
 
 
 

The ability to start a new case, before starting a new investigation, to offer the Audit Log the chance to record everything.

 
Import Existing Cases
 
 
 
 
 
 

Load case previously researched with axe10 by uploading the case eBundle.

 
Case Instructions
 
 
 
 
 
 

Apply "Instructions and Lawful Basis" when creating a new case. Either apply in the 'new case' screen, or apply and edit in Case Data & Settings. The User has the option to attach an instruction document.
Also, the option to show or hide instructions in the generated report.

 
Security Classification
 
 
 
 
 
 

Apply a GSC classification to each material item, from a drop down list.

 
axe10 File Explorer
 
 
 
 
 
 

Opens a tab in the browser, where all material is presented and various editing and disclosure options are made available.

 
Report Manager Lite
 
 
 
 
 
 

A processing activity in axe10 Lite, providing editable fields, so that tags might be filtered and organised for each editable field.  To organise an axe10Lite case, creating order and hierarchy, the Drag&Drop function allows all editable items to be ordered as required. Each editable field allows for text to be applied that displays in the report.

 
Structure a case with POLE Categories & Identifiers
 
 
 
 
 
 

With the POLE structure, axe10 complies with standard data model deployed by law enforcement.
The POLE structure supports People, Objects, Locations and Events (POLE) categorisation of material.
With the option to choose from various predefined POLE Items (People, Objects, Locations, Events) and Identifiers, any investigator can work on a case with multiple subjects and associates, so that complex cases can be managed.

 
Apply Identifiers to POLE Items
 
 
 
 
 
 

Select from 100s of available identifiers organised in POLE groups (eg: Name, Date of Birth, Phone numbers) with an option to apply new and custom identifiers.

 
View Identifier Sources
 
 
 
 
 
 

View the source of the identifier.

 
Reorder POLE Items, Identifiers & report sections
 
 
 
 
 
 

Reorder elements in the sidebar, with drag and drop.
Reordering elements in the sidebar will cause the appropriate reordering in the generated report.

 
Case Export (Case eBundle)
 
 
 
 
 
 

Case Export with auto-generated Case eBundles; that update with each export containing all processing since the previous export. All axe10app family  members have Case Export but with differing capabilities:

  • axe10 LE CM – Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx) and Report (PDF); Decision Log html file; DoNotModify.json – the case file. Unused Materials folder – contains a file for each category of unused material: non-sensitive, sensitive and undisclosed, in .docx format.
  • axe10 LE III–  Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx) and Report (PDF); Decision Log HTML file; DoNotModify.json – the case file.
  • axe10 CVL contains: Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research File (docx); Decision Log HTML file; DoNotModify.json – the case file.
  • axe10 LEGAL – same as axe10 LE
  • axe10 JUSTICE – same as axe10 LE
  • axe10 Lite contains: Attachments main folder – contains an attachments sub-folder for each identifier, Instruction, Summary; Audit folder: audit HTML file, Archives folder; Court Documents folder – not hashed, may be used to upload copies of completed documents, so that all documents relating to the case might reside in the case eBundle; Hashes folder – contains a sub-folder with hashes from each export (export UNIX timestamp as name) – the hash file in 2 formats HTML and jpeg (the image can be split in multiple files); REPORT folder – with Research Doc (docx); Decision Log HTML file; Notes HTML file; DoNotModify.json – the case file.

 

 
Reporting
Brand your Research Report
 
 
 
 
 
 

Inside each report generated by axe10 you can insert your own logo that will be displayed on the cover.

 
Research File
 
 
 
 
 
 

Preview the Research File within the browser and export as an MS Word doc. Not forensically secure, but provided in response to user requests.

 
Research Report
 
 
 
 
 
 

A forensically secure verbose report, generated from a template in PDF and editable inside axe10. Reports the entities and identifiers applied to the case. Within the Report template, variables are recorded that are relevant to the type of identifier input record.

 
Report Summary
 
 
 
 
 
 

Provides at the beginning of the report a specific editable section accessible through Case Data & Settings where a summary of the evidence presented in the overall report may be inserted.

 
Research Doc
 
 
 
 
 
 

Research Doc is a specific feature to axe10 Lite that contains the outline of the research. This is an MS Doc and is not forensically secure, and has been provided as a consequence of user requests.

 
Preview research doc
 
 
 
 
 
 

Preview within the browser for a general view.

 
Research Report Template
 
 
 
 
 
 

The report template applies text to each identifier and variables update relevant to the type of identifier.

 
Research Report Editing
 
 
 
 
 
 

The Research Report is a forensically secure PDF that can be edited at any time within axe10 and the security is preserved.

 
Safe Report Management (Evidence Report editing)
 
 
 
 
 
 

The Evidence report is in PDF and is editable within axe10. Edit in axe10 preserves the forensic integrity of the report. The report is divided into sections, to allow for safe edit without compromising the resources of the computer. Each POLE category, or sub-category is a separate section.
This makes long reports (with lots of images) more manageable easier to edit. No lag, no crashes.

 
Research Report Auto-save
 
 
 
 
 
 

At specific time intervals the report shall be auto-saved. The specific setting can be found in the Preferences Menu, and can be edited.

 
Automatic or Manual Table of Contents in the Research Report
 
 
 
 
 
 

Any changes made to the table of contents are available with the Manual mode, afterwards it will be exported in the generated PDF, several other options are available in PDF Settings. Auto page numbering is applied.

 
Research Report Export
 
 
 
 
 
 

The report is exported as a forensically secure PDF.

 
Security
Forensically Secure
 
 
 
 
 
 

Material gathered with axe10 and saved to a axe10 case eBundle is forensically secure.

 
Material Hashing
 
 
 
 
 
 

Material is hashed at the point of collection. When exporting, a new hashes file is auto-generated. This file will contain and report material hashes. All hashes are preserved and stored in the exported case eBundle.

 
Imaging Security of hash files
 
 
 
 
 
 

An image of all hashes is auto-generated to provide an additional layer of security.

 
Audit Log
 
 
 
 
 
 

All websites visited are logged with a timestamp and record of the URL  Links to any user taken archives. Records all Case Data & Settings changes and Case Import/Export activity, etc. Everything that happens inside the browser while axe10 is active will be logged. For any other internet activity, it is recommended to use a different browser.

 
Data Stored Locally
 
 
 
 
 
 

All material gathered during the investigation is stored on the local computer of the investigator. Axeten cannot access research data.

 
User Access Control
 
 
 
 
 
 

All axe10app versions require secure user access. This allows for safe sharing of a computer. After login, only the case being investigated by that user shall be accessible, although, any user with access rights to another case eBundle, can import and process that case eBundle.

 
Integrated III (OSINT) HELP
OSINT Sources
 
 
 
 
 
 

Hundreds of curated links to information websites in multiple jurisdictions

 
OSINT Resources
 
 
 
 
 
 

Links to tools and methodologies that assist the research process

 
axe10 Training & Support
Free Online Training
 
 
 
 
 
 

Available 3 times each week for any user with an active account

 
'How to' Videos
 
 
 
 
 
 

8 videos available

 
A way to receive live training for axe10 Lite
 
 
 
 
 
 
join an III (OSINT) training  
III (OSINT) Training
Axeten provides III (OSINT) training  
Gain skills and knowledge while learning how to use the axe10 Lite application  

 

1 GDPR Awareness

axe10 Lite for Desktop is Free. axe10 Lite on the Cloud is £100/user/year (Further Explanation)