Investigate in isolation.
Transfer with confidence.
Some investigations require disconnected environments. Export encrypted evidence packages and import them securely — maintaining chain of custody across air-gapped systems.

Secure evidence transfer between environments
When direct sync isn't an option
Some investigative environments can't connect to your backend server. Export & Import bridges that gap securely.
Dark web investigations
Capture evidence on isolated VMs configured for Tor access, then transfer to your main system without exposing your network
Air-gapped environments
Work in secure facilities with no network access to external servers — evidence still moves safely when you're ready
High-security workflows
Maintain strict network separation between investigation and production environments while preserving evidence integrity
Cross-environment transfers
Move sensitive captures between online and secured systems with full encryption and verification
Three steps. Full encryption. Chain of custody intact.
Export
From your isolated environment, export captures as encrypted ZIP packages. Set a password, and the system generates separate archives for screenshots, images, source code, and metadata.
Transfer
Move the encrypted archives using your preferred secure method — USB drive, encrypted cloud storage, or any transfer mechanism that meets your security requirements.
Import
On your CMS connected to the backend, import the archives with your password. The system validates integrity, processes the files, and syncs everything to your secure storage.
Your evidence arrives exactly as captured — verified and ready for case integration.
Security that matches your requirements
Evidence transfers demand the same protection as the investigation itself.
CEK/KEK encryption
Content encryption keys wrapped with key encryption keys — the same model used by enterprise security systems
Password protection
You control the encryption password — archives are unreadable without it, even if intercepted
Integrity verification
Import validates that files haven't been modified — any tampering is detected before processing
Chain of custody
Full audit trail from original capture through export, transfer, and import — documented at every step
Complete evidence packages
Export creates multiple encrypted archives containing everything from your capture:
All packages share a Capture ID. Import all of them together to reconstruct the complete evidence record.
Built for high-security investigations
Law Enforcement
Dark web task forces capturing evidence on isolated systems
Federal Agencies
Air-gapped environments with strict network separation requirements
Corporate Security
Incident response teams working in isolated forensic environments
Available to all paid subscribers
Export & Import is included with every paid Forensic OSINT subscription. No additional configuration required — the feature is ready when you need it.
Ready to use Export & Import? View detailed instructions →
Evidence moves securely. Integrity stays intact.
Start capturing in any environment. Transfer when you're ready.

