November 14, 2019
Arsenal is unlike other digital forensics software vendors in the sense that we are consultants involved in casework first and software developers second. We build tools when we find valuable information being left behind by existing tools and techniques. In other words, if existing tools and techniques could deliver what we needed from our electronic evidence, we would happily buy or otherwise leverage them rather than launch ourselves into (often frustrating) software development. We are in a good position to know that our tools offer powerful and unique functionality, and we are doing what we can to make maximum exploitation of electronic evidence more accessible to our customers.
I once heard an interview with Todd McFarlane in which he said his company McFarlane Toys was not in competition with major toy manufacturers, but living in the gaps they left behind. For example, a major toy company might have a large number of requirements for their designers such as only applying a certain number of colors or a certain level of detail to a model. He explained that the models created by his company were not constrained by the same requirements, and were targeted at a different kind of consumer… a consumer who wanted more complex and authentic models. This interview left an impression on me, as he was describing what we do at Arsenal. We don’t build a “does everything” suite, we live in the gaps left by other digital forensics vendors and build surgical tools that expose information we could not have otherwise… which has proven incredibly valuable in our casework, and we hope in yours as well.
If you practice digital forensics and are familiar with the powerful and unique things our tools can do, please let others know… you will be helping us with our mission, as we work hard to help you with yours.
I am announcing today, thanks to some gentle nudging from my team, that Arsenal is dramatically expanding our educational program. We are now providing free subscriptions each semester not only to professors at colleges and universities, but to students as well.
Digital forensics practitioners may not be aware of the nuances of what happens when introducing various BitLocker activities into the mix of hibernation and in-file TRIM.
Once you think through the implications of what can be done not only with multiple document versions extracted from FSD files as ODC Recon has always done, but what can be done with the granular revision information that can be found within FSD files and temporary collaboration data, you should be having a “lean back in the chair” moment.
Join our mailing list to arm yourself with updates about Arsenal tools, training, and research. Our mailing list is double opt-in so you will need to check your email and confirm your subscription before receiving our mailings.
or (617) 277-3625
Terms & Conditions