skip navigation

CrimeSolutions.gov

Add your conference to our Justice Events calendar

PUBLICATIONS

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 239592     Find in a Library
Title: Secure View Version 3.4.0 Evaluation Report
Corporate Author: NIJ Criminal Justice Electronic Crime Technology Ctr of Excellence
United States of America
Date Published: 08/2012
Page Count: 18
Sale Source: National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
Document: PDF 
Type: Test/Measurement
Language: English
Country: United States of America
Annotation: This report describes the features and manufacturer claims for Secure View, which can acquire and analyze data from over 4,000 mobile phones, followed by the presentation of results from its performance testing by the National Institute of Justice’s Electronic Crime Technology Center of Excellence (NIJ ECTCOE).
Abstract: Secure View is a software platform that installs onto a computer work-station, and it includes a toolkit of cable and hardware for connecting devices to the work-station. The target customers for Susteen’s Secure View are State and local law enforcement organizations that maintain a separate unit for forensic examinations of digital media. Secure View is a forensic-grade acquisition and analysis tool that is capable of creating reports that can be customized with an organization’s and investigator’s information and notes. It is designed to assist law enforcement investigators with the logical acquisition of and reporting on examinations of cell phones. The performance testing of Secure View found that the software is easy to operate and has a straightforward extraction procedure. Once information has been extracted from a device, the data are easy to read. Connection issues during testing were overcome by deselecting items that were not able to be extracted. Secure View performs logical extractions, which means that deleted data have a low chance of being recovered. Reporting is limited and lacks customization, but it does provide space for the investigator’s name and department. Secure View’s Link Graph ability to combine multiple extractions and show connections between devices could be useful during an investigation that involves multiple devices. Extensive figures
Main Term(s): Computer related crime
Index Term(s): Testing and measurement ; Computer software ; Equipment evaluation ; Computer aided investigations ; Computer evidence
   
  To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=261658

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.