From ForensicsWiki
Revision as of 07:27, 21 December 2018 by DrRichardAdams (Talk | contribs) (ISEEK Demo download Page)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


ISEEK is the embodiment of a patented process[1]. It is an automated tool that can be deployed to run concurrently across any number of computer systems where it operates invisibly in accordance with an encrypted set of instructions. The results of ISEEK's processing are encrypted and sent to a location specified in the set of instructions which can be a local drive, a network share or cloud storage.

​Stand-alone utilities enable the creation of the encrypted set of instructions (ISEEKDesigner) and the ability to review and process the contents of encrypted results containers (ISEEKExplorer).

Once ISEEK has been used to reduce the data load for further review, another stand-alone utility (ISEEKExtractor) enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. An API is also provided to enable the encrypted results containers to be directly accessed.

ISEEK Key Features

Runs without the need for indexing

Searches across all drives and network shares

No installation required

No dongles involved

Defensible and verifiable data collection

Fast search engine featuring parallel processing

Searches 'live' documents, spreadsheets, e-mail, archives, and more

Produces 256 AES encrypted, password-protected output stores

Export responsive content to review tools

Automatic file inclusions and exclusions

Captures metadata on all files collected

The requirement for De-Nisting is removed

A conference paper introducing ISEEK is available here:

External links