top of page

Nexus LE Walktrough Guide

Nexus LE is a tool that helps in streamlining the investigations of cases where there is a suspicion of child abuse material possession.

/// more text here

 

Videntifier has prepared a pre-configured test environment to allow potential users of Nexus LE to test the functionality of the system.

 

The purpose of this guide is to in a pre-configured environment, using test data provided by Videntifier.

Setting up for the evaluation of Nexus LE

Intro for setup - mention the email with the links to files


Download the necessary files
Videntifier Nano
Sample data volume
Griffeye Plugins
Install Nano
Mounting the sample data volume
Installing the Griffeye Plugins
Connecting to Nexus LE

 

The Nexus LE Workflow

Intro for setup - mention the email with the links to files


Download the necessary files
Videntifier Nano
Sample data volume
Griffeye Plugins
Install Nano
Mounting the sample data volume
Installing the Griffeye Plugins
Connecting to Nexus LE

 

Step 1 - Calculate Hashes

The first step is calculating the hashes for the visual content on the volume you want to examine. The hash calculation is performed by Videntifier Nano, which is a Windows application.

 

Before proceeding, make sure that you have downloaded and installed Videntifier Nano on your computer and that you have downloaded and mounted the sample data volume.

 

To calculate hashes for the images and videos on the data volume:

 

  1. Start Videntifier Nano. The main application window is displayed
     

  2. Click Create device container to create a new device container. A device container contains information about one or more volumes that together make up one hardware device. For this sample, there will be only one volume in the device container.

  3. Enter a name for the device container. You can choose whatever name you like, but for this demo, name the device container 123-45678-999

  4. Click Add folder. In the file selection dialog that appears, navigate to the volume containing the sample data and click Open.

  5. Videntifier Nano scans the volume for images and videos and displays the number of items found. To start calculating the hashes for the images and videos, click the Calculate button in the lower-right corner of the window.

  6. After a few seconds, the calculation of the hashes completes and a hash archive has been generated, containing the hashes for the images and videos found.

    To locate the hash archive, click the Get File button. This will open a window containing the hash archive. The file will be named after the container, with the file extension ‘.tar’. In this particular example, the file would be named ‘123-45678-999.tar’. You will use this file in Step 2.

 

This completes Step 1.

Step 2 - Uploaded the hashes to Nexus LE Server

When a hash archive has been created using the Videntifier Nano tool, it needs to be uploaded to the Nexus LE Server so it can be processed.

 

Add a border and possibly an icon to the following text:

Note: In a real scenario, a case can contain multiple hash archive files, for example, if multiple volumes were seized. In such an instance, you might want to use the Videntifier Nano tool to create a hash archive for each volume.

 

To upload a hash archive:

 

  1. Open the Nexus Processing Server in your web browser.

  2. Click the Create Case link to create a new case. A dialog box is displayed.

    Enter a name for the case. You can use any name you like for the case. You can also enter a case reference ID if you prefer, or you can leave the Reference ID field blank.

  3. Click the newly created case to open it.

  4. Locate the hash archive you created in Step 1 (123-45678-999.tar) and drag it to the drop zone on the right side of the window to upload it.

 

This completes Step 2.

Step 3 - Analyze the hashes in Nexus LE Server

Hash archive files are processed on a case level. The identification process starts automatically when a hash archive file is added to a case. The identification processing task does the following:

 

  • Uses the hash databases from the local LE identification database to check whether any entry in the fingerprint file matches known CSAM content. For this demonstration, a custom database has already been created, named Case database (Blacklist).

  • Uses the hash databases from the local LE identification database to check whether any entry in the fingerprint file matches known non-relevant content (whitelist). For this demonstration, a custom whitelist database has already been created, named Case database (Whitelist).

  • Optionally, it is possible to check uploaded fingerprinting files against the global Nexus platform. This platform utilizes various databases of known harmful content and can identify and flag known CSAM content. For this demonstration, an example Nexus database has already been created, named Harmful content (Blacklist)

 

After the identification process has completed, information about identified files is displayed and it is possible to list the files that were identified.

 

The duplicate identification task needs to be started manually. This task identifies duplicates of images and videos.

 

To start the duplicate identification task

  • Click the Calculate duplicates link. As this task can be time-consuming, a dialog box is displayed, and you need to confirm that you want to start the task.

 

Once the task completes, the name of the link changes to Get duplicate export and information will be displayed about the number of duplicates found.

 

Download the analysis result files as they will be used in Step 5:

  • Click the Download VIC Export link to download the match information file.

  • Click the Get duplicate export link to download the duplicate information file.

bottom of page