Investigate in isolation.
Transfer with confidence.

Some investigations require disconnected environments. Export encrypted evidence packages and import them securely — maintaining chain of custody across air-gapped systems.

Schedule a Demo
Secure encrypted transfer between isolated investigation environment and main system

Secure evidence transfer between environments

When direct sync isn't an option

Some investigative environments can't connect to your backend server. Export & Import bridges that gap securely.

visibility_off

Dark web investigations

Capture evidence on isolated VMs configured for Tor access, then transfer to your main system without exposing your network

wifi_off

Air-gapped environments

Work in secure facilities with no network access to external servers — evidence still moves safely when you're ready

security

High-security workflows

Maintain strict network separation between investigation and production environments while preserving evidence integrity

sync_alt

Cross-environment transfers

Move sensitive captures between online and secured systems with full encryption and verification

Three steps. Full encryption. Chain of custody intact.

1

Export

From your isolated environment, export captures as encrypted ZIP packages. Set a password, and the system generates separate archives for screenshots, images, source code, and metadata.

arrow_forward
2

Transfer

Move the encrypted archives using your preferred secure method — USB drive, encrypted cloud storage, or any transfer mechanism that meets your security requirements.

arrow_forward
3

Import

On your CMS connected to the backend, import the archives with your password. The system validates integrity, processes the files, and syncs everything to your secure storage.

Your evidence arrives exactly as captured — verified and ready for case integration.

Security that matches your requirements

Evidence transfers demand the same protection as the investigation itself.

enhanced_encryption

CEK/KEK encryption

Content encryption keys wrapped with key encryption keys — the same model used by enterprise security systems

password

Password protection

You control the encryption password — archives are unreadable without it, even if intercepted

verified_user

Integrity verification

Import validates that files haven't been modified — any tampering is detected before processing

history

Chain of custody

Full audit trail from original capture through export, transfer, and import — documented at every step

Complete evidence packages

Export creates multiple encrypted archives containing everything from your capture:

screenshot_monitorScreen Captures
imageDownloaded Images
codeMHTML Source Code
descriptionCapture Metadata

All packages share a Capture ID. Import all of them together to reconstruct the complete evidence record.

Built for high-security investigations

local_police

Law Enforcement

Dark web task forces capturing evidence on isolated systems

account_balance

Federal Agencies

Air-gapped environments with strict network separation requirements

corporate_fare

Corporate Security

Incident response teams working in isolated forensic environments

check_circle

Available to all paid subscribers

Export & Import is included with every paid Forensic OSINT subscription. No additional configuration required — the feature is ready when you need it.

Evidence moves securely. Integrity stays intact.

Start capturing in any environment. Transfer when you're ready.

Schedule a Demo →

Minimum Requirements:

  • 8 Characters
  • 1 Upper
  • 1 Lower
  • 1 Digit