Magnet Outrider

Rapid triage, ultra-simple approach

 

Quickly triage Mac and Windows computers, iOS and Android mobile devices, and external drives for illicit content such as CSAM, usernames, and contacts in the field or the lab with automated insights, enabling examiners and non-technical stakeholders to use Magnet Outrider with confidence.

 

Outrider features

 

Triage mobile devices

 

Save valuable time in the field or in the lab by using Magnet Outrider to quickly scan iOS and Android mobile devices and automatically uncover SMS/MMS messages, illicit apps, device ID, recently used apps, contact list, call logs, and more, in minutes.

 

Key takeaways

 

  1. Lightning-fast mobile scans in under a minute.
  2. Scan multiple mobile devices at the same time.
  3. Use keywords to filter and scan for specific evidence relevant to your case.
  4. Detect the presence of secure folders and multiple user accounts.

Identify actionable evidence fast

 

Get your team real-time intel for interviews, warrants, and seizures by uncovering actionable evidence from mobile devices, computers, and hard drives in under six minutes without having to perform a full extraction. Scan internet browser history, text messages, recent activity, and account information for keywords, specific URLs and file names from an imported NCMEC CyberTip report, or load targeted URLs and keywords into Outrider that are relevant to your case.

 

Key takeaways

 

  1. Use MD5 and our patent pending MAG24 hash matching to locate files from known hashsets like VICS or CAID.
  2. No more manual scans: Outrider automatically counts and displays the number of hits during a scan.
  3. Scan multiple devices for evidence in less than six minutes.
  4. Outrider’s first Gen CSAM detector identifies CSAM that isn’t yet known to authorities.
  5. Load custom keywords or NCMEC reports to find evidence fast.

 

Get started quickly

 

Outrider was designed for speed and simplicity. As a preprogrammed, turnkey solution, Outrider enables even non-technical stakeholders to confidently use Outrider with its preconfigured artifact categories that automatically count and display the number of hits during scans. In less than three steps, you can start running scans in the field or in the lab.

 

Key takeaways

 

  1. Get Outrider up and running in less than three clicks.
  2. Detect known CSAM in a fraction of the time (minutes) with pre-programmed Child Rescue Coalition CSAM detection technology (Neula).
  3. Easy-to-use interface to enable non-technical users to confidentially run scans.

Capture live system artifacts and memory

 

Quickly gather another layer of information by analyzing live system artifacts and processes actively running on the device. Gather additional browsing history, access files that have been unencrypted, and encryption keys.

 

Key takeaways

 

  1. Perform live system scans with option to collect:
    • Valuable operating system artifacts.
    • Capture RAM.
    • Take a screenshot of the desktop.
    • Obtain the external IP address for the system.
  2. Leverage insights to support probable cause for additional search warrant requests.