Skip to content
Header engineering2b.jpg

intelligent visual forensics

VizX2
Accelerate investigations with intuitive image & video analysis

SUPPORTING DIGITAL CRIME INVESTIGATIONS WITH PRECISION, SECURITY AND SPEED

Every digital investigation begins with collecting vast amounts of evidence including images, videos, and files collected from multiple devices and sources.
Among them may lie the evidence that identifies a victim or reveals the actions of an offender.
Amid this complexity, investigators must act quickly, maintain accuracy, and comply with strict privacy and data-handling standards.

VizX2 was developed to meet that need, saving valuable investigation time while ensuring complete traceability and security.
Developed by ZiuZ Forensics part of the Decos technology group, VizX2  is a visual analysis platform designed for complex digital crime investigations regarding Child Sexual Abuse Material (CSAM).
 
It gives professionals the tools to work faster and smarter, without compromising ethical and legal responsibility

CORE FOCUS

Visual analysis of images and videos
Intuitive in use
Proven capability in the fight against CSAM
Clear case reporting for prosecutors

Why VizX2 
Time-saving automation: Accelerates evidence review.
Efficient case handling: Automates visual analysis and grouping to save investigation time.
Accuracy and reliability: Applies AI, hash-matching, and metadata analysis to ensure every result is traceable and verifiable.
Secure and compliant by design: Operates in isolated, encrypted environments aligned with European data-protection and law-enforcement standards.

image (11).jpg

SECURITY, INTEGRITY AND REPORTING

Engineered for Sensitive Data
Security is the foundation of VizX2 . It is designed for sensitive investigations that demand both speed and protection.
Core Security Features
Audit trail: Comprehensive logs ensure traceability and accountability for every user action.
Logging: Integrated with OpenTelemetry for standardised, auditable observability.
Data retention policies: Configurable lifecycle management to comply with regulatory and operational needs.
Role-based authorization: Fine-grained access ensures users see only permitted data.
Single Sign-On (SSO): Streamlined yet secure authentication for investigators.
No data duplication (no copying of videos, images, documents)
Air-gapped deployment: Operates entirely offline for complete isolation and protection.

image (10).jpg

END TO END WORKFLOW

VizX2 supports various phases of investigation, from evidence triage to final reporting. Each phase of investigation is secured, traceable, and designed for accountability, helping investigators to save time.

“VizX2  has improved the consistency and reliability of our digital investigations while meeting strict security requirements.”
- European Law-Enforcement Partner

image (9).jpg

VizX2 DEMO REQUEST

If you are part of Law Enforcement and would like a free demonstration of AviaTor, please sign-up below and we will reach out to you shortly.

FREQUENTLY ASKED QUESTIONS

What is VizX2 and how does it help us? AviaTor, which stands for Augmented Visual Intelligence and Targeted Online Research, is an efficient database tool that helps classify and prioritise all aspects of NCMEC reports. In addition, AviaTor can automatically crawl online sources for additional information for investigations in accordance with the national legal requirements.

Processing reports of Child Sexual Abuse Material (CSAM) – from industry, the public and NGOs – is very labour-intensive. The combination of classifying, prioritizing and retrieving additional information from online sources makes AviaTor a valuable asset for your organization that will improve both the quality and quantity of your CSAM report processing. This will free up time and resources to focus on identifying perpetrators and saving victims.
How does VizX2 work exactly? AviaTor is a stand-alone database tool developed for law enforcement for the processing and sorting of NCMEC reports. It has the ability to directly receive your incoming NCMEC reports into the database, but you can also load your old reports and backlog into the system.

The user can use the basic database functionalities, as well as set indicators on which AviaTor can sort reports. It can enrich your reports with open-source intelligence (OSINT) data and inventorizes the media attached to the reports based on hash lists to recognize and flag known material and duplicates, among other functionalities.

We would love to show you how AviaTor works exactly during a free demo. Please get in touch with us to set this up.
How do I get access to a demo? If you are a law enforcement agency representative and are interested in learning more about this project sign-up for a demo by submitting the form on this webpage. We will reach out to you in order to better understand your current landscape of processing CSAM reports.
What are the prerequisites for using VizX2? If you are interested in AviaTor, please reach out to us and we will go through all the prerequisites together, to make sure this is the correct fit for your organization.

Every implementation is different. We look at your current processes, software, installation, and integration needs as well as your national legislation, policies and protocols that could influence your LEAs ability to use the tool.
Who was VizX2 developed with? AviaTor was developed with the support from 16 law enforcement agencies across Europe, ZiuZ Forensics, Web-IQ and INHOPE.
What are NCMEC reports? NCMEC reports originate from the National Center for Missing & Exploited Children, a U.S.-based organization dedicated to addressing cases of missing and sexually exploited children.

A key component of NCMEC’s work is the CyberTipline - a centralized reporting system for suspected online child sexual exploitation.

Technology companies such as Google, Meta, TikTok, and Dropbox are legally obligated to report certain types of content or user behavior that may indicate child sexual exploitation to the CyberTipline.

NCMEC reviews these reports, enriches them with additional data such as IP addresses and geolocation information, and then forwards them to the relevant law enforcement agencies - both within the United States and internationally.