{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Phil Froklage","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/phil-froklage\/","title":"Finding Evidence that Other Tools Miss - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"x4aDybGZHq\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/kristina-hegstrom-computer-forensic-examiner-comal-county-texas\/\">Finding Evidence that Other Tools Miss<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/kristina-hegstrom-computer-forensic-examiner-comal-county-texas\/embed\/#?secret=x4aDybGZHq\" width=\"600\" height=\"338\" title=\"&#8220;Finding Evidence that Other Tools Miss&#8221; &#8212; Magnet Forensics\" data-secret=\"x4aDybGZHq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2021\/04\/MF_RC_CaseStudy_KristinaHegstrom.jpg","thumbnail_width":488,"thumbnail_height":488,"description":"Examiners use AXIOM to rebuild chat history from popular\u2014even encrypted\u2014instant messaging and social media apps including WhatsApp, Snapchat, Grindr, Facebook, Instagram, and many others. By rebuilding messages into the familiar chat bubble format, AXIOM easily presents evidence to non-technical stakeholders like prosecutors, judges and juries.&nbsp; &#8220;I was able [to use AXIOM to] easily display chat &hellip; Continued"}