skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 239592     Find in a Library
  Title: Secure View Version 3.4.0 Evaluation Report
  Document URL: PDF 
  Corporate Author: NIJ Criminal Justice Electronic Crime Technology Ctr of Excellence
United States of America
  Date Published: 08/2012
  Page Count: 18
  Annotation: This report describes the features and manufacturer claims for Secure View, which can acquire and analyze data from over 4,000 mobile phones, followed by the presentation of results from its performance testing by the National Institute of Justice’s Electronic Crime Technology Center of Excellence (NIJ ECTCOE).
  Abstract: Secure View is a software platform that installs onto a computer work-station, and it includes a toolkit of cable and hardware for connecting devices to the work-station. The target customers for Susteen’s Secure View are State and local law enforcement organizations that maintain a separate unit for forensic examinations of digital media. Secure View is a forensic-grade acquisition and analysis tool that is capable of creating reports that can be customized with an organization’s and investigator’s information and notes. It is designed to assist law enforcement investigators with the logical acquisition of and reporting on examinations of cell phones. The performance testing of Secure View found that the software is easy to operate and has a straightforward extraction procedure. Once information has been extracted from a device, the data are easy to read. Connection issues during testing were overcome by deselecting items that were not able to be extracted. Secure View performs logical extractions, which means that deleted data have a low chance of being recovered. Reporting is limited and lacks customization, but it does provide space for the investigator’s name and department. Secure View’s Link Graph ability to combine multiple extractions and show connections between devices could be useful during an investigation that involves multiple devices. Extensive figures
  Main Term(s): Computer related crime
  Index Term(s): Testing and measurement ; Computer software ; Equipment evaluation ; Computer aided investigations ; Computer evidence
  Sale Source: National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
  Type: Test/Measurement
  Country: United States of America
  Language: English
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.