Supporting digital crime investigations with precision, security, and speed
Every digital investigation begins with collecting vast amounts of evidence including images, videos, and files collected from multiple devices and sources.
Among them may lie the evidence that identifies a victim or reveals the actions of an offender.
Amid this complexity, investigators must act quickly, maintain accuracy, and comply with strict privacy and data-handling standards.
VizX2 was developed to meet that need, saving valuable investigation time while ensuring complete traceability and security.
Developed by ZiuZ Forensics part of the Decos technology group, VizX2 is a visual analysis platform designed for complex digital crime investigations regarding Child Sexual Abuse Material (CSAM).
Developed in collaboration with investigative teams across Europe, VizX2 streamlines unstructured data, minimizes manual workload, and ensures evidential integrity throughout the entire workflow.
It gives professionals the tools to work faster and smarter, without compromising ethical and legal responsibility
CORE FOCUS
Visual analysis of images and videos
Intuitive in use
Proven capability in the fight against CSAM
Clear case reporting for prosecutors
Why VizX2
Time-saving automation: Accelerates evidence review.
Efficient case handling: Automates visual analysis and grouping to save investigation time.
Accuracy and reliability: Applies AI, hash-matching, and metadata analysis to ensure every result is traceable and verifiable.
Secure and compliant by design: Operates in isolated, encrypted environments aligned with European data-protection and law-enforcement standards.
Security, integrity, and reporting
Engineered for Sensitive Data
Security is the foundation of VizX2 . It is designed for sensitive investigations that demand both speed and protection.
1. Core Security Features
Audit trail: Comprehensive logs ensure traceability and accountability for every user action.
Logging: Integrated with OpenTelemetry for standardised, auditable observability.
Data retention policies: Configurable lifecycle management to comply with regulatory and operational needs.
Role-based authorization: Fine-grained access ensures users see only permitted data.
Single Sign-On (SSO): Streamlined yet secure authentication for investigators.
No data duplication (no copying of videos, images, documents)
Air-gapped deployment: Operates entirely offline for complete isolation and protection.
2. System Architecture
Air-gapped deployment: Operates entirely offline for complete isolation and protection.
Database per case: Dedicated databases strengthen segregation and scalability.
Reliable data storage: Built on proven relational database technology.
Secure connectivity: Central proxy manages and monitors all server access.
Performance monitoring: Keeps operational data separate from case content.
3. Reporting
Clear documentation: Reports formatted for judicial and inter-agency use.
Complete traceability: All data interactions logged to maintain evidential integrity and the chain of custody.
Security by Design: Air-gapped. Encrypted. Auditable. Compliant.
VizX2 ensures the highest level of protection for sensitive digital evidence.
End-to-End Workflow
VizX2 supports various phases of investigation, from evidence triage to final reporting. Each phase of investigation is secured, traceable, and designed for accountability, helping investigators to save time.
“VizX2 has improved the consistency and reliability of our digital investigations while meeting strict security requirements.”
- European Law-Enforcement Partner
VizX2 DEMO REQUEST
Frequently Asked Questions
AviaTor, which stands for Augmented Visual Intelligence and Targeted Online Research, is an efficient database tool that helps classify and prioritise all aspects of NCMEC reports. In addition, AviaTor can automatically crawl online sources for additional information for investigations in accordance with the national legal requirements.
Processing reports of Child Sexual Abuse Material (CSAM) – from industry, the public and NGOs – is very labour-intensive. The combination of classifying, prioritizing and retrieving additional information from online sources makes AviaTor a valuable asset for your organization that will improve both the quality and quantity of your CSAM report processing. This will free up time and resources to focus on identifying perpetrators and saving victims.
AviaTor is a stand-alone database tool developed for law enforcement for the processing and sorting of NCMEC reports. It has the ability to directly receive your incoming NCMEC reports into the database, but you can also load your old reports and backlog into the system.
The user can use the basic database functionalities, as well as set indicators on which AviaTor can sort reports. It can enrich your reports with open-source intelligence (OSINT) data and inventorizes the media attached to the reports based on hash lists to recognize and flag known material and duplicates, among other functionalities.
We would love to show you how AviaTor works exactly during a free demo. Please get in touch with us to set this up.
If you are a law enforcement agency representative and are interested in learning more about this project sign-up for a demo by submitting the form on this webpage. We will reach out to you in order to better understand your current landscape of processing CSAM reports.
If you are interested in AviaTor, please reach out to us and we will go through all the prerequisites together, to make sure this is the correct fit for your organization.
Every implementation is different. We look at your current processes, software, installation, and integration needs as well as your national legislation, policies and protocols that could influence your LEAs ability to use the tool.
AviaTor was developed with the support from 16 law enforcement agencies across Europe, ZiuZ Forensics, Web-IQ and INHOPE.
NCMEC reports originate from the National Center for Missing & Exploited Children, a U.S.-based organization dedicated to addressing cases of missing and sexually exploited children.
A key component of NCMEC’s work is the CyberTipline - a centralized reporting system for suspected online child sexual exploitation.
Technology companies such as Google, Meta, TikTok, and Dropbox are legally obligated to report certain types of content or user behavior that may indicate child sexual exploitation to the CyberTipline.
NCMEC reviews these reports, enriches them with additional data such as IP addresses and geolocation information, and then forwards them to the relevant law enforcement agencies - both within the United States and internationally.
READY TO ENTER THE FUTURE?
Our dedicated team of consultants will be happy to show you the unlimited opportunities of VizX2. And help you set up VizX2 for your specific situation.
Let’s join forces in the fight against CSAM!
info@ziuzforensics.com | +31 88 33 26 707