Blue Bear LACE Software

Blue Bear LACE Software is a powerful framework of automated tools to effectively process the enormous load of still image and video media evidence files linked to child exploitation cases. Provides tools to help in the identification of victims, suspects, witnesses, crime scenes and related cases.

A secure means for cross jurisdiction collaboration between police services worldwide. Includes automated image appearance matching, automated face detection and extraction, face identification, lightning fast evidence media categorization, integrated reporting and case writing, and interfaces to existing computer forensic tools.

LACE ( Law enforcement Against Child Exploitation) technology is a decisive tool in the global fight against Child Exploitation. Its objective is to design and develop software that gives law enforcement and justice communities the solutions they need to do their jobs effectively, efficiently and successfully.

 

 

 

LACE offers police services

  • a dramatic reduction in the number of media-evidence files (images and videos) that require manual review
  • a reduction in investigator stress levels
  • a reduction in case analysis time, by up to a factor of ten or more
  • a reduction in case trial preparation and summary time
  • Integration with forensic softwares like Xways ; Encase and FTK
  • a mean to identify abused children and suspects using advanced facial identification; and
  • a mean to collaborate and share information with other linked ICE units worldwide
  • a mean to decompose videos in storyboards and match any type of videos with any other format
  • a mean to export standard hash and visual signatures for CETS, PhotoDNA, C4P-C4All, and several country specific national databases

 

Features

 

 

LACE Uses a police oriented workflow and polished graphical user interface to reduce investigator workload by processing more cases in less time and with significantly reduced stress.

 

 

  • Multiple workstations can concurrently access LACE for work on different cases - allows each investigator to work on their own case at their own desk simultaneously
  • Carves Image and Video files from E01,S01, RAW, or DD files from Encase, Xways and FTK - fully compatible with existing forensic tools
  • Extracts image and video files directly from physical drives - carves from allocated and unallocated space
  • Extracts images and videos from a Window's folder or Drive (logical carve: DVD, USB, CD etc..)
  • Scans ISO/BIN/CUE/ZIP/RAR archives and copy protected DVDs
  • Automatically segregates password protected archives
  • Scans all types of thumbs.db and thumbscache
  • Scans Shadow Copy backups - also automatically de-duplicates Shadow Copy files
  • Carves images and videos from embedded files - includes any document type and Emails
  • Compatible with C4P/C4All for both of the import of the Index.xml and export of completed cases
  • Compatible with CETS for export and reporting including exporting PhotoDNA signatures
  • Directly import results from the Netherlands Forensic Institute "SIEVE" package
  • Search the accumulated database directly by Hash, EXIF, Image, and Face
  • Add multiple exhibits to a case: - A case can include any number of exhibits (evidence sources; HD's, USB devices, CD/DVD's) and these exhibits can be reviewed and reported individually or as a single complete case.
  • Automatically de-duplicates and matches images - tolerates rotations, cropping, watermarking, changes in resolution or format, colour vs. BW vs. Sepia, damaged files, and minor alterations like obscured eyes-faces: not fooled by "hash change" programs
  • Employs a unique Zero False Positive visual matching technology - places uncertain matches in the Unknown category for manual review
  • Automatically categorizes media files matched from previously processed cases - the accumulated database typically allows 80% to 90+% of case files to be automatically categorized
  • Filters out irrelevant/junk files - the gifs, icons, borders, and edges that accumulate in temp directories
  • Identifies new unknown and relevant media-evidence files for manual review - Efficiently categorize the new files and automatically add them to the accumulated database
  • Includes a "Skin Filter" to aid in quickly identifying possible illegal images
  • Includes a "Similar Image Finder" that will identify images having a similar background, including similar persons, or taken in a similar environment.
  • Includes "Image Sub-Search" which enables searches for specific objects and colours that may be present in other images
  • Full EXIF Data Reporting/Filtering - Allows analysis and filtering of gallery and reports by manufacturer specific EXIF data including device Serial Numbers.
  • Automatically detects and extracts faces from case media-evidence files
  • Uses automated facial identification to detect facial images of a victims and suspects from previously processed cases
  • Securely share case results (categorized hash sets and visual signatures) in any format with other agencies.
  • Includes Standard hash exports for CETS, PhotoDNA, C4P/C4All, and several country specific national databases.
  • Export hash sets/bookmarks back into Encase, FTK, and other forensic packages.

 

Advanced Technology for Increasingly Complex Crimes

  • Supports MySQL, MS-SQL, PostGres, IBMdb2, and Oracle databases - not tied to any specific database
  • Creates databases of victims, suspects, witnesses, and crime scene locations - easily create victim "series" from image files or extracted faces
  • Helps identify victims, and suspects - immediately know if your current case involves a known victim
  • Enables direct collaboration and securely shares information across linked police jurisdictions, worldwide - Simple tools for exporting and importing hash sets, visual signatures, and databases in almost any format.

 

 

Advanced Evidence Processing

 

LACE applies the following processes to new cases:

  • Automatic pre-categorization of innocuous (irrelevant) media evidence files using BlueBear ??s Automated Innocuous Categorization System (AICS),
  • Automated de-duplication of case media-evidence files using digital hash checksum
  • Automated de-duplication of case media-evidence files using advanced image matching,
  • Automated categorization of case media-evidence files against database(s) of pre-categorized media-evidence files using digital hash checksum and advanced image matching,
  • Automated multi-view face detection & face extraction from case media-evidence files,
  • Facial identification of victims, suspects, & witnesses across cases.

 

 

Multi-view Face Detection and Extraction

 

LACE ?? technology automatically detects and extracts faces from case files. Extracted faces are stored in a database and matched to similar faces both within the current case and to other cases. An investigator can quickly scroll through, edit, and select faces for further investigation or to include in case reports. LACE also includes a unique single face search capability allows an investigator to search the accumulated face database using any image file.

 

 

 

Court Acceptable Reports

 

LACE generates reports for prosecutors that refer back to computer forensic information which links media- evidence files previously categorized as child exploitation to the offender's seized computer media. Safeguards ensure reliability of the forensic integrity process. The LACE Reports Wizard permits investigators to effortlessly and quickly select images and case related metadata to efficiently create court acceptable case and individual image reports. Reports can be generates in many formats including; PDF, DOC, ODF, HTML, CSV, and Text

 

 

We also recommend