LACE Uses a police oriented workflow and polished graphical user interface to reduce investigator workload by processing more cases in less time and with significantly reduced stress.
- Multiple workstations can concurrently access LACE for work on different cases - allows each investigator to work on their own case at their own desk simultaneously
- Carves Image and Video files from E01,S01, RAW, or DD files from Encase, Xways and FTK - fully compatible with existing forensic tools
- Extracts image and video files directly from physical drives - carves from allocated and unallocated space
- Extracts images and videos from a Window's folder or Drive (logical carve: DVD, USB, CD etc..)
- Scans ISO/BIN/CUE/ZIP/RAR archives and copy protected DVDs
- Automatically segregates password protected archives
- Scans all types of thumbs.db and thumbscache
- Scans Shadow Copy backups - also automatically de-duplicates Shadow Copy files
- Carves images and videos from embedded files - includes any document type and Emails
- Compatible with C4P/C4All for both of the import of the Index.xml and export of completed cases
- Compatible with CETS for export and reporting including exporting PhotoDNA signatures
- Directly import results from the Netherlands Forensic Institute "SIEVE" package
- Search the accumulated database directly by Hash, EXIF, Image, and Face
- Add multiple exhibits to a case: - A case can include any number of exhibits (evidence sources; HD's, USB devices, CD/DVD's) and these exhibits can be reviewed and reported individually or as a single complete case.
- Automatically de-duplicates and matches images - tolerates rotations, cropping, watermarking, changes in resolution or format, colour vs. BW vs. Sepia, damaged files, and minor alterations like obscured eyes-faces: not fooled by "hash change" programs
- Employs a unique Zero False Positive visual matching technology - places uncertain matches in the Unknown category for manual review
- Automatically categorizes media files matched from previously processed cases - the accumulated database typically allows 80% to 90+% of case files to be automatically categorized
- Filters out irrelevant/junk files - the gifs, icons, borders, and edges that accumulate in temp directories
- Identifies new unknown and relevant media-evidence files for manual review - Efficiently categorize the new files and automatically add them to the accumulated database
- Includes a "Skin Filter" to aid in quickly identifying possible illegal images
- Includes a "Similar Image Finder" that will identify images having a similar background, including similar persons, or taken in a similar environment.
- Includes "Image Sub-Search" which enables searches for specific objects and colours that may be present in other images
- Full EXIF Data Reporting/Filtering - Allows analysis and filtering of gallery and reports by manufacturer specific EXIF data including device Serial Numbers.
- Automatically detects and extracts faces from case media-evidence files
- Uses automated facial identification to detect facial images of a victims and suspects from previously processed cases
- Securely share case results (categorized hash sets and visual signatures) in any format with other agencies.
- Includes Standard hash import/exports for Interpol ICSE DB, CETS, PhotoDNA, C4P/C4All, and several country specific national databases.
- Export hash sets/bookmarks back into Encase, FTK, and other forensic packages.
Advanced Technology for Increasingly Complex Crimes
- Supports MySQL, MS-SQL, PostGres, IBMdb2, and Oracle databases - not tied to any specific database
- Creates databases of victims, suspects, witnesses, and crime scene locations - easily create victim "series" from image files or extracted faces
- Helps identify victims, and suspects - immediately know if your current case involves a known victim
- Enables direct collaboration and securely shares information across linked police jurisdictions, worldwide - Simple tools for exporting and importing hash sets, visual signatures, and databases in almost any format.
Advanced Evidence Processing
LACE applies the following processes to new cases:
- Automatic pre-categorization of innocuous (irrelevant) media evidence files using BlueBear Automated Innocuous Categorization System (AICS),
- Automated de-duplication of case media-evidence files using digital hash
- Automated de-duplication of case media-evidence files using advanced image
- Automated categorization of case media-evidence files against database(s) of
pre-categorized media-evidence files using digital hash checksum and advanced
- Automated multi-view face detection & face extraction from case media-evidence
- Facial identification of victims, suspects, & witnesses across cases.
Multi-view Face Detection and Extraction
LACE technology automatically detects and extracts faces from case files. Extracted faces are stored in a database and matched to similar faces both within the current case and to other cases. An investigator can quickly scroll through, edit, and select faces for further investigation or to include in case reports. LACE also includes a unique single face search capability allows an investigator to search the accumulated face database using any image file.
Court Acceptable Reports
LACE generates reports for prosecutors that refer back to computer forensic information which links media- evidence files previously categorized as child exploitation to the offender's seized computer media. Safeguards ensure reliability of the forensic integrity process. The LACE Reports Wizard permits investigators to effortlessly and quickly select images and case related metadata to efficiently create court acceptable case and individual image reports. Reports can be generates in many formats including; PDF, DOC, ODF, HTML, CSV, and Text