{"id":1884,"date":"2016-11-25T15:03:47","date_gmt":"2016-11-25T20:03:47","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1884"},"modified":"2024-12-11T18:51:45","modified_gmt":"2024-12-11T18:51:45","slug":"review-of-belkasoft-evidence-center-bec","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/","title":{"rendered":"Review of Belkasoft Evidence Center (BEC)"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Introduction\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Hello fellow digital forensic colleagues! This a brief review of the BEC product, but let me preface this first, by stating that anything stated herein is a reflection of my own thought processes and is not representative of my employer or has NOT been influenced by the Belkasoft group. My second prefacing statement: I use a wide variety of tools for analyzing data. I find leveraging this pluralistic diversity of using a variety different tools an asset in that it allows me to view the same data from different perspectives. No software is perfect, our collective use and subsequent reporting of any issues greatly helps improve any product.<\/p>\n<p><!--more--><\/p>\n<p>My first interest in the Belkasoft products was specifically for parsing Instant Messenger (IM) chat communications. I have been watching the Belkasoft products evolve for well over 5 years, with more features and being added to assist examiners.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Belkasoft_Front_Matter\"><\/span>Belkasoft Front Matter<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you are not familiar with the Belkasoft products you can check out their website: <a href=\"https:\/\/belkasoft.com\/\">https:\/\/belkasoft.com\/<\/a>.<\/p>\n<p>A most excellent resource for the reader is also their blog: <a href=\"https:\/\/belkasoft.wordpress.com\/\">https:\/\/belkasoft.wordpress.com\/<\/a>. The blog contains news as well as excellent articles, which provide a great deal of information. All articles are also available at <a href=\"https:\/\/belkasoft.com\/articles\">https:\/\/belkasoft.com\/articles<\/a>.<\/p>\n<p>The intent of this review is to provide an overview of the Belkasoft Evidence Center Ultimate (BEC) 8.0.1762. I will not be examining every intimate detail of BEC, which is beyond the scope of this article. I strongly urge you to obtain a trial version and explore the product.<\/p>\n<p>In addition to BEC, there are two FREE, companion standalone tools, which Belkasoft provides: Belkasoft Acquisition Tool (called BelkaImager), and Belkasoft Live RAM Capturer. BelkaImager is also integrated into BEC and is found under the Tools-&gt;Acquisition. The BelkaImager product can be used for acquiring data from traditional computers, laptops and also mobile devices. Interesting feature of the imager is an ability to download cloud data. Google Drive, Google Plus and iCloud are currently supported.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Starting_BEC_Case_Setup\"><\/span>Starting BEC &amp; Case Setup<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Like other forensic acquisition and analysis products that you may have been exposed to, BEC is a GUI based interface tool.<\/p>\n<p>When starting the product, there seems to be some delay on my examination computer, which I first observed a few releases ago pre version 8. The case setup is consistent regardless of what type of device\/file\/image\/data you are examining. In order to configure BEC options you will need to create a case first. In this product overview an Android image will be used to demonstrate basic product features. During the case creation process please remember to select the appropriate time zone settings and any case description that you feel is necessary.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Open_Case_Dialog_%E2%80%93_New_Case\"><\/span><i>Open Case Dialog \u2013 New Case<\/i><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1855 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case.png\" alt=\"01-new-case\" width=\"667\" height=\"580\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case.png 667w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-300x261.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-512x445.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-32x28.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-28x24.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-56x49.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-64x56.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/01.-New-Case-68x60.png 68w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p style=\"text-align: center;\" align=\"center\"><i>New case creation<\/i><\/p>\n<p>Make sure, that after you create your case, and before you press &#8216;OK&#8217;, that you select Options, which is found on the right side of the &#8216;Open Case&#8217; window. This is not necessary, but can be useful for example to assign temporary folder (in case C drive is small SSD drive, it makes sense to assign another, bigger magnetic drive to store BEC temporary data). Otherwise default options will work well without any further adjustments.<\/p>\n<p>&nbsp;<\/p>\n<p>Within the \u2018Open Case Dialog\u2019 window there are 4 tabs: General, Picture, Video and Hashes.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Open_Case_Dialog_%E2%80%93_Options_and_Tab_Options\"><\/span><i>Open Case Dialog \u2013 Options and Tab Options<\/i><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The tab layout is shown in the screenshots below with default settings.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1856 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options.png\" alt=\"02-options\" width=\"658\" height=\"468\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options.png 658w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-300x213.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-512x364.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-56x40.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/02.-Options-64x46.png 64w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\" \/><\/p>\n<p style=\"text-align: center;\"><i>General BEC options<\/i><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1857 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options.png\" alt=\"03-picture-options\" width=\"337\" height=\"350\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options.png 337w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-289x300.png 289w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-32x32.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-28x28.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-54x56.png 54w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/03.-Picture-Options-62x64.png 62w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/p>\n<p style=\"text-align: center;\"><i>Picture processing options<\/i><\/p>\n<p style=\"text-align: left;\">Note in the Video tab the ability to extract frames automatically.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1858 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options.png\" alt=\"04-video-options\" width=\"579\" height=\"281\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options.png 579w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-300x146.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-512x248.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-56x27.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/04.-Video-Options-64x31.png 64w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/p>\n<p style=\"text-align: center;\"><i>Video processing options<\/i><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1859 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1.png\" alt=\"05-hashset-options-1\" width=\"506\" height=\"399\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1.png 506w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-300x237.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-32x25.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-56x44.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/05.-Hashset-Options-1-64x50.png 64w\" sizes=\"auto, (max-width: 506px) 100vw, 506px\" \/><\/p>\n<p align=\"center\"><i>Hashset analysis options<\/i><\/p>\n<p>The default settings are used which are already checked.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Add_data_source_Window_%E2%80%93_Step_1_What_sources_would_you_like_to_analyze\"><\/span>Add data source Window \u2013 Step 1: What sources would you like to analyze?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After you select your options, BEC will prepare the case and then prompt you to add a data source through the &#8216;Add data source&#8217; window. From this window you can choose one type or multiple types of data sources. In this case, BEC is used to analyse a &#8216;DumpData.bin&#8217; file. This is a physical Image of Android Samsung SM-G900W8, running Android OS 5.1.1, device acquired with UFED 4PC 5.3, a format commonly used when investigators need to <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-locked-android-device\/\">access files on a locked Android during forensic analysis<\/a>. The screenshot below provides a view of the \u2018Add data source Dialog\u2019 window.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Add_data_source_Dialog_%E2%80%93_Data_sources\"><\/span><i>Add data source Dialog \u2013 Data sources<\/i><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Take note of the various type of data sources that can be added for ingestion into BEC.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1861 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source.png\" alt=\"06-add-data-source\" width=\"596\" height=\"528\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source.png 596w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-300x266.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-512x454.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-32x28.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-28x25.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-56x50.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-64x57.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/06.-Add-Data-Source-68x60.png 68w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p>The <i>&#8216;Run hashset analysis<\/i>&#8216; allows an examiner to import hashsets which BEC can leverage in order to perform hash value matches of content.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Add_data_source_Window_%E2%80%93_Step_2_What_would_you_like_to_search_for\"><\/span>Add data source Window \u2013 Step 2: What would you like to search for?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In this window the examiner will hopefully be quite informed about the type of content that is to be searched. As you can see data type categories are shown in the left pane, with the app types supported relative to each operating system. As a humble suggestion, please take the time to really target what you are looking for and try NOT to select everything as shown in the screenshot below.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1862 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts.png\" alt=\"07-select-artifacts\" width=\"606\" height=\"575\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts.png 606w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-300x285.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-512x486.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-32x30.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-28x28.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-56x53.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/07.-Select-Artifacts-64x61.png 64w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>The more artifacts you select, the longer will be the initial analysis. For example, if you are looking inside Android phone, there is no sense to look for Windows artifacts. However, if you are investigating Windows computer, it makes sense to have Android artifacts selected just in case an Android backup is found on the computer. Encrypted files detection can take a good amount of time so if a user is not interested in encryption search, unchecking \u2018Encrypted files\u2019 will speed up the analysis without.<\/p>\n<p>Analyze: Take a moment to review which partition areas you want to look at.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1863 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve.png\" alt=\"08-analyze-or-carve\" width=\"299\" height=\"66\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve.png 299w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-296x66.png 296w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-32x7.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-28x6.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-56x12.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/08.-Analyze-or-Carve-64x14.png 64w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/><\/p>\n<p>This specific Android operating system image has numerous partitions, and in this case, only partition structures which might prove of use are selected for examination.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1864 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options.png\" alt=\"09-advanced-analysis-options\" width=\"527\" height=\"502\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options.png 527w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-300x286.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-512x488.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-32x30.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-28x28.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-56x53.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/09.-Advanced-Analysis-Options-64x61.png 64w\" sizes=\"auto, (max-width: 527px) 100vw, 527px\" \/><\/p>\n<p>If you want to pursue data carving you can check &#8216;<i>Carve<\/i>&#8216; and again specify the partitions, allocated and\/or unallocated space.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1865 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options.png\" alt=\"10-advanced-carving-options\" width=\"550\" height=\"504\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options.png 550w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-300x275.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-512x469.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-32x29.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-28x26.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-56x51.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/10.-Advanced-Carving-Options-64x59.png 64w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>When you have finished optimizing the data searches, for your specific needs, then press the Finish button. Another window will appear asking whether you want to add another data source.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1866 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source.png\" alt=\"11-add-another-data-source\" width=\"298\" height=\"211\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source.png 298w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-296x211.png 296w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-56x40.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/11.-Add-Another-Data-Source-64x45.png 64w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/p>\n<p>If &#8216;<i>Yes<\/i>&#8216; was selected, then &#8216;Add data source Dialog \u2013 Data sources&#8217; dialog window would appear. In this case, &#8216;<i>No<\/i>&#8216; was selected and this initiates the processing of the data source along with specified search selections.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"BEC_Interface\"><\/span>BEC Interface<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The main BEC interface window will present with 3 main areas, which is much like most GUI based digital forensic products:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1867 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm.png\" alt=\"12-bec-interface_sm\" width=\"724\" height=\"612\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm.png 724w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-300x254.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-512x433.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-32x27.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-28x24.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-56x47.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/12.-BEC-Interface_sm-64x54.png 64w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p>Above the tri-pane interface, please note the product toolbar which consists of both icons and text based menu driven interface. Under &#8216;Help&#8217; there is an offline and online help documentation.<\/p>\n<p>If you find the tri pane interface too congested, you have the option of customizing the display of the windows using the floatable, auto-hide, tab, or hide features.<\/p>\n<p>Left Pane: Consists of 3 tabs: Overview, Case Explorer and File System. The tab you select in this area also drives the right upper pane to different view. Clicking actions taken by the user in any of the tabs drive the right upper pane to display certain data source items depending on the tab you are in and type of data being viewed.<\/p>\n<p><b>Overview tab (left tab in left pane):<\/b> This tab will provide a breakdown of the various types of data sorted into categories.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1868 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview.png\" alt=\"13-overview\" width=\"381\" height=\"414\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview.png 381w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-276x300.png 276w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-29x32.png 29w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-26x28.png 26w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-52x56.png 52w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/13.-Overview-59x64.png 59w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><\/p>\n<p><b>Case Explorer tab (middle tab, in left pane):<\/b> This tab provides access to view Timeline data, and data sources. Here you can see that it also shows the partition structures that are contained within the binary dump. If you recall earlier, I only selected to have three partitions ingested for data parsing. It would be nice to have an option to exclude the unselected partitions, from being viewed in this tab.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1889 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer.png\" alt=\"14-case-explorer\" width=\"359\" height=\"711\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer.png 359w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-151x300.png 151w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-8x16.png 8w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-16x32.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-14x28.png 14w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-28x56.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/14.-Case-Explorer-32x64.png 32w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/p>\n<p>Within the Case Explorer tab, data is broken down into data type categories: Browsers, Cloud services, Instant Messengers etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1869 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data.png\" alt=\"15-case-explorer-with-data\" width=\"280\" height=\"446\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data.png 280w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-188x300.png 188w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-10x16.png 10w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-20x32.png 20w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-18x28.png 18w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-35x56.png 35w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/15.-Case-Explorer-With-Data-40x64.png 40w\" sizes=\"auto, (max-width: 280px) 100vw, 280px\" \/><\/p>\n<p><b>File System tab (right tab, in left pane):<\/b> This tab shows all the data sources ingested by BEC. If the data source contains partitions\/volumes which contain file systems that BEC can understand, they will appear here. This is a refined view from the Case Explorer tab. However, I still have to dig to identify the various partitions\/volumes, as they are named with &#8216;vol_xxxxxx&#8217; where xxxxx is the offset value in decimal of the start of the volume. As indicated previously, I am only interested in three partitions. It would be nice if in future BEC releases the actual volume (partition) name was provided, and only volumes selected for analysis were listed, with the option to view unselected volumes if an examiner needs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1870 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System.png\" alt=\"16-file-system\" width=\"233\" height=\"343\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System.png 233w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-204x300.png 204w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-11x16.png 11w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-22x32.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-19x28.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-38x56.png 38w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/16.-File-System-43x64.png 43w\" sizes=\"auto, (max-width: 233px) 100vw, 233px\" \/><\/p>\n<p>Right Upper Pane: This is the data examination area where you can review the parsed data or analyze data structures. The user can add or remove tabs in this area through the &#8216;View&#8217; function on the toolbar.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1871 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu.png\" alt=\"17-view-main-menu\" width=\"341\" height=\"470\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu.png 341w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-218x300.png 218w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-12x16.png 12w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-23x32.png 23w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-20x28.png 20w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-41x56.png 41w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/17.-View-Main-Menu-46x64.png 46w\" sizes=\"auto, (max-width: 341px) 100vw, 341px\" \/><\/p>\n<p>Right Lower Pane: This pane consists of 4 tabs: Task Manager, Item Properties, Hex Viewer and Search Results.<\/p>\n<p><b>Task Manager:<\/b> Here you can observe any tasks that are running, scheduled, or completed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1872 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager.png\" alt=\"18-task-manager\" width=\"535\" height=\"384\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager.png 535w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-300x215.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-512x367.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-56x40.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/18.-Task-Manager-64x46.png 64w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/p>\n<p>Item Properties: Here you can inspect the properties of a single item that has been selected from a parsed data source in the Case explorer (left pane) and viewed within a correlated tab in the right upper pane. An example is shown in the following screenshot, following the arrows, with review of the touch.db file (Case Explorer in the left pane), the database structure viewed in the right pane upper pane, in SQLite viewer, and examination of a specific record, Item Properties (right lower pane) in the touch.db file, experience_members table. The actual database (.db) file is identified in the \u2018Current file\u2019 information bar.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1873 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm.png\" alt=\"19-item-properties_sm\" width=\"650\" height=\"469\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm.png 650w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-300x216.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-512x369.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-16x12.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-56x40.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/19.-Item-Properties_sm-64x46.png 64w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><b>Hex Viewer:<\/b> This is located in the lower right pane, Hex Viewer tab. From the previous example, highlighting a record (row) in the SQLite database file, Data tab, locates that data in the Hex Viewer showing the offset it is located at. There is also a &#8216;Type Converter&#8217; which assists with data decoding.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1874 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm.png\" alt=\"20-hex-viewer_sm\" width=\"650\" height=\"424\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm.png 650w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-300x196.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-512x334.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-16x10.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/20.-Hex-Viewer_sm-184x120.png 184w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><b>Search Results:<\/b> This tab displays the search results. To initiate a search access the search function from the search icon in the toolbar.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1875 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button.png\" alt=\"21-search-toolbar-button\" width=\"525\" height=\"102\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button.png 525w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-300x58.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-512x99.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-32x6.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-28x5.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-56x11.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/21.-Search-Toolbar-Button-64x12.png 64w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>Then select what you would like to search, data source(s) and the profiles to search in:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1876 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search.png\" alt=\"22-search\" width=\"552\" height=\"555\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search.png 552w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-150x150.png 150w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-298x300.png 298w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-148x148.png 148w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-512x515.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-32x32.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-28x28.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-56x56.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/22.-Search-64x64.png 64w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_Filtering\"><\/span>Data Filtering<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The ability to filter data is important when trying to sift through any amount of information. The filter window is automatically invoked by BEC when you are either in the Case Explorer tab, or Overview tab, looking at a specific category of data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1877 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm.png\" alt=\"23-add-filter-pane_sm\" width=\"650\" height=\"180\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm.png 650w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-300x83.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-512x142.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-32x9.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-28x8.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-56x16.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/23.-Add-Filter-Pane_sm-64x18.png 64w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Select &#8216;Add Filter&#8217;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1878 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2.png\" alt=\"24-add-filter-pane2\" width=\"628\" height=\"319\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2.png 628w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-300x152.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-512x260.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-56x28.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/24.-Add-filter-Pane2-64x33.png 64w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p>Then select one or more of the filter criteria. The filter criteria change based upon the type of data being viewed: Pictures, Videos, Browsers, Instant Messengers, Mailboxes, etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1879 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria.png\" alt=\"25-filter-criteria\" width=\"490\" height=\"569\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria.png 490w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-258x300.png 258w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-14x16.png 14w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-28x32.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-24x28.png 24w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-48x56.png 48w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/25.-Filter-Criteria-55x64.png 55w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/p>\n<p>For examination of a SQLite database, I can use the SQLite Viewer tab (upper right pane) to examine each table and the columns within a table. BEC very nicely displays the number of database records and the number of journaled records (which are part of the number of records count).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1880 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm.png\" alt=\"26-sqlite-viewer_sm\" width=\"650\" height=\"265\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm.png 650w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-300x122.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-512x209.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-32x13.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-28x11.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-56x23.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/26.-SQLite-Viewer_sm-64x26.png 64w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>The colouring of the rows is done by BEC to visually assist with identification of data:<\/p>\n<ul>\n<li>journaled records \u2013 light blue coloured row<\/li>\n<li>examiner selected record \u2013 dark blue coloured row<\/li>\n<li>actual database records \u2013 white coloured row<\/li>\n<li>deleted records \u2013 red coloured row<\/li>\n<\/ul>\n<p>However, what I do note is that, I cannot easily search\/filter any table columns, which would be a useful feature. I cannot invoke the Filter window, whilst in the SQLite viewer tab. I must go back to the Message List tab. I would like to see the ability to filter any item of data from any column.<\/p>\n<p>I can quickly convert the time stamps by right clicking on the &#8216;experience_comment_creation_timestamp&#8217; column and drilling down to &#8216;Choose type&#8217; and selecting UTC Unix time.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1881 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm.png\" alt=\"27-sqlite-column-format_sm\" width=\"650\" height=\"192\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm.png 650w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-300x89.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-512x151.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-16x5.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-32x9.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-28x8.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-56x17.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/27.-SQLite-column-format_sm-64x19.png 64w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Results\"><\/span>Results<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>During my analysis of the parsed binary file, I was able to exclude the Touch app (touch.db) for any data of interest, other than verifying the Touch account user identification information. The date filtering feature, allowed for a quick review of messages for a specific time period. The Timeline view provided me with a nice overview of the activities that occurred on the device in the time period of interest. The SQLite viewer tool, in conjunction with the Hex Viewer, proved very useful in reviewing data that consisted of any deleted recovered artifacts, journaled data, and live database records.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The BEC software usage information presented thus far is certainly not exhaustive, of all the complete features of this product. Depending upon the types of data sources you are examining, there are other areas of the product, which are not demonstrated like those available in the View dropdown menu:<\/p>\n<ul>\n<li>Registry viewer and Plist Viewer data<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1882 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu.png\" alt=\"28-view-main-menu\" width=\"293\" height=\"454\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu.png 293w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-194x300.png 194w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-10x16.png 10w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-21x32.png 21w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-18x28.png 18w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-36x56.png 36w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/28.-View-main-menu-41x64.png 41w\" sizes=\"auto, (max-width: 293px) 100vw, 293px\" \/><\/li>\n<li>Connection graph functions are useful features to view communication relationships between contacts.Also take note of the being able to export the data from BEC to the:<\/li>\n<li>BEC evidence reader, which allow investigators to review the data themselves<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1883 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader.png\" alt=\"29-export-to-evidence-reader\" width=\"353\" height=\"160\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader.png 353w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-300x136.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-32x15.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-28x13.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-56x25.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/29.-Export-to-Evidence-Reader-64x29.png 64w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/p>\n<ul>\n<li>And &#8216;Export to UFDR&#8217;, which exports the data in a UFDR for import into UFED Physical Analyzer.<\/li>\n<\/ul>\n<p>All the numerous benefits of BEC can be reviewed at this link: <a href=\"https:\/\/belkasoft.com\/ec\">https:\/\/belkasoft.com\/ec<\/a><\/p>\n<p>However, as a user of this product one of the key benefits for me is the ability of this product to ingest multiple data sources, with the ability to review data from various types of apps on smart phone platforms.<\/p>\n<p>As noted at the start of this review, software products can be improved with user input to the developer. If you encounter a situation where the data you are examining is not being parsed correctly, missed, and\/or you note an issue with the software, then please make the time to contact Belkasoft so they can provide assistance. When I have contacted Yuri, I have received a timely reply, (usually within 24-48 hours) from Yuri acknowledging any issues. And they (Yuri and his team) have been very responsive, in providing fixes.<\/p>\n<p>In closing, I hope you take the time to review this product on your own and test it for your own needs.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"By_Shafik_G_Punja\"><\/span>By Shafik G. Punja<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h2><span class=\"ez-toc-section\" id=\"About_the_Reviewer\"><\/span>About the Reviewer<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Shafik is a digital forensic examiner for a law enforcement agency, currently assigned to the <a href=\"https:\/\/www.digitalforensics.com\/\">Digital Forensics Team<\/a> (Cyber\/Forensic Unit), and has been working in digital forensics since 2003.<\/p>\n","protected":false},"excerpt":{"rendered":"Introduction Hello fellow digital forensic colleagues! This a brief review of the BEC product, but let me preface&hellip;","protected":false},"author":126,"featured_media":1887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1884","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Review of Belkasoft Evidence Center (BEC)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review of Belkasoft Evidence Center (BEC)\" \/>\n<meta property=\"og:description\" content=\"Introduction Hello fellow digital forensic colleagues! This a brief review of the BEC product, but let me preface&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-25T20:03:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:51:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Review of Belkasoft Evidence Center (BEC)\",\"datePublished\":\"2016-11-25T20:03:47+00:00\",\"dateModified\":\"2024-12-11T18:51:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/\"},\"wordCount\":2378,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Belkasoft-Evidence-Center_1.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/\",\"name\":\"Review of Belkasoft Evidence Center (BEC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Belkasoft-Evidence-Center_1.jpg\",\"datePublished\":\"2016-11-25T20:03:47+00:00\",\"dateModified\":\"2024-12-11T18:51:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Belkasoft-Evidence-Center_1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Belkasoft-Evidence-Center_1.jpg\",\"width\":800,\"height\":598},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/review-of-belkasoft-evidence-center-bec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Review of Belkasoft Evidence Center (BEC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Review of Belkasoft Evidence Center (BEC)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/","og_locale":"en_US","og_type":"article","og_title":"Review of Belkasoft Evidence Center (BEC)","og_description":"Introduction Hello fellow digital forensic colleagues! This a brief review of the BEC product, but let me preface&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-11-25T20:03:47+00:00","article_modified_time":"2024-12-11T18:51:45+00:00","og_image":[{"width":800,"height":598,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Review of Belkasoft Evidence Center (BEC)","datePublished":"2016-11-25T20:03:47+00:00","dateModified":"2024-12-11T18:51:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/"},"wordCount":2378,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/","name":"Review of Belkasoft Evidence Center (BEC)","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg","datePublished":"2016-11-25T20:03:47+00:00","dateModified":"2024-12-11T18:51:45+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/Belkasoft-Evidence-Center_1.jpg","width":800,"height":598},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/review-of-belkasoft-evidence-center-bec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Review of Belkasoft Evidence Center (BEC)"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1884"}],"version-history":[{"count":5,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1884\/revisions"}],"predecessor-version":[{"id":14810,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1884\/revisions\/14810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/1887"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}