please wait
 
close window
top menu - tab edge
Home      members Customer Portal     corporate Corporate     partners Partners
Partners
Testimonials
Reseller Application
Map and Directions
In The News

November 2017

PDF November 2017 Gargoyle Investigator datasets released


PDF November 2017 StegoHunt datasets released


PDF November 2017 Discover the Hidden datasets released


PDF noviembre 2017 "Gargoyle Investigator" conjuntos de datos publicados


PDF noviembre 2017 "StegoHunt" conjuntos de datos publicados


PDF noviembre 2017 "Descubra lo oculto" conjuntos de datos publicados


October 2017

PDF October 2017 Gargoyle Investigator datasets released


PDF October 2017 StegoHunt datasets released


PDF October 2017 Discover the Hidden datasets released


PDF octubre 2017 "Gargoyle Investigator" conjuntos de datos publicados


PDF octubre 2017 "StegoHunt" conjuntos de datos publicados


PDF octubre 2017 "Descubra lo oculto" conjuntos de datos publicados


September 2017

PDF September 2017 Gargoyle Investigator datasets released


PDF September 2017 StegoHunt datasets released


PDF September 2017 Discover the Hidden datasets released


PDF septiembre 2017 "Gargoyle Investigator" conjuntos de datos publicados


PDF septiembre 2017 "StegoHunt" conjuntos de datos publicados


PDF septiembre 2017 "Descubra lo oculto" conjuntos de datos publicados


August 2017

PDF August 2017 Gargoyle Investigator datasets released


PDF August 2017 StegoHunt datasets released


PDF August 2017 Discover the Hidden datasets released


PDF agosto 2017 "Gargoyle Investigator" conjuntos de datos publicados


PDF agosto 2017 "StegoHunt" conjuntos de datos publicados


PDF agosto 2017 "Descubra lo oculto" conjuntos de datos publicados


July 2017

PDF July 2017 StegoHunt datasets released


PDF July 2017 Gargoyle Investigator datasets released


PDF July 2017 Discover the Hidden datasets released


PDF julio 2017 "Gargoyle Investigator" conjuntos de datos publicados


PDF julio 2017 "Descubra lo oculto" conjuntos de datos publicados


PDF julio 2017 "StegoHunt" conjuntos de datos publicados


June 2017

PDF June 2017 Discover the Hidden datasets released
WetStone Technologies has posted the June 2017 dataset release for Discover the Hidden.

PDF June 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the June 2017 malware dataset release for Gargoyle Investigator.

PDF June 2017 StegoHunt datasets released
WetStone Technologies has posted the June 2017 dataset release for StegoHunt.

PDF junio 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de junio 2017 de StegoHunt

PDF junio 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de junio 2017 de StegoHunt

PDF junio 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de junio 2017 de Gargoyle Investigator

May 2017

PDF May 2017 StegoHunt datasets released
WetStone Technologies has posted the May 2017 dataset release for StegoHunt.

PDF May 2017 Discover the Hidden datasets released
WetStone Technologies has posted the May 2017 dataset release for Discover the Hidden.

PDF May 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the May 2017 malware dataset release for Gargoyle Investigator.

PDF mayo 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de mayo 2017 de Gargoyle Investigator

PDF mayo 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de mayo 2017 de StegoHunt

PDF mayo 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de mayo 2017 de StegoHunt

April 2017

PDF April 2017 StegoHunt datasets released
WetStone Technologies has posted the April 2017 dataset release for StegoHunt.

PDF April 2017 Discover the Hidden datasets released
WetStone Technologies has posted the April 2017 dataset release for Discover the Hidden.


PDF April 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the April 2017 malware dataset release for Gargoyle Investigator.

PDF abril 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de abril 2017 de Gargoyle Investigator

PDF abril 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de abril 2017 de StegoHunt

PDF abril 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de abril 2017 de StegoHunt

March 2017

PDF March 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the March 2017 malware dataset release for Gargoyle Investigator.

PDF March 2017 StegoHunt datasets released
WetStone Technologies has posted the March 2017 dataset release for StegoHunt.

PDF March 2017 Discover the Hidden datasets released
WetStone Technologies has posted the March 2017 dataset release for Discover the Hidden.

PDF marzo 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de marzo 2017 de Gargoyle Investigator

PDF marzo 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de marzo 2017 de StegoHunt

PDF marzo 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de marzo 2017 de StegoHunt

February 2017

PDF February 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the February 2017 malware dataset release for Gargoyle Investigator.

PDF February 2017 StegoHunt datasets released
WetStone Technologies has posted the February 2017 dataset release for StegoHunt.

PDF February 2017 Discover the Hidden datasets released
WetStone Technologies has posted the February 2017 dataset release for Discover the Hidden.

PDF febrero 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de febrero 2017 de Gargoyle Investigator

PDF febrero 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de febrero 2017 de StegoHunt

PDF febrero 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de febrero 2017 de StegoHunt

January 2017

PDF enero 2017 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de enero 2017 de StegoHunt

PDF enero 2017 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de enero 2017 de StegoHunt

PDF enero 2017 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de enero 2017 de Gargoyle Investigator

PDF January 2017 Discover the Hidden datasets released
WetStone Technologies has posted the January 2017 dataset release for Discover the Hidden.

PDF January 2017 StegoHunt datasets released
WetStone Technologies has posted the January 2017 dataset release for StegoHunt.

PDF January 2017 Gargoyle Investigator datasets released
WetStone Technologies has posted the January 2017 malware dataset release for Gargoyle Investigator.

December 2016

PDF Diciembre 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Diciembre 2016 de StegoHunt

PDF Diciembre 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Diciembre 2016 de StegoHunt

PDF December 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the December 2016 malware dataset release for Gargoyle Investigator.

PDF December 2016 StegoHunt datasets released
WetStone Technologies has posted the December 2016 dataset release for StegoHunt.

PDF December 2016 Discover the Hidden datasets released
WetStone Technologies has posted the December 2016 dataset release for Discover the Hidden.

PDF Diciembre 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Diciembre 2016 de Gargoyle Investigator

November 2016

PDF November 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the November 2016 malware dataset release for Gargoyle Investigator.

PDF November 2016 StegoHunt datasets released
WetStone Technologies has posted the November 2016 dataset release for StegoHunt.

PDF November 2016 Discover the Hidden datasets released
WetStone Technologies has posted the November 2016 dataset release for Discover the Hidden.

PDF Noviembre 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Noviembre 2016 de Gargoyle Investigator

October 2016

PDF October 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the October 2016 malware dataset release for Gargoyle Investigator.

PDF October 2016 StegoHunt datasets released
WetStone Technologies has posted the October 2016 dataset release for StegoHunt.

PDF October 2016 Discover the Hidden datasets released
WetStone Technologies has posted the October 2016 dataset release for Discover the Hidden.

PDF Octubre 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Octubre 2016 de Gargoyle Investigator

PDF Octubre 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Octubre 2016 de StegoHunt

PDF Octubre 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Octubre 2016 de StegoHunt

September 2016

PDF September 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the September 2016 malware dataset release for Gargoyle Investigator.

PDF September 2016 StegoHunt datasets released
WetStone Technologies has posted the September 2016 dataset release for StegoHunt.

PDF September 2016 Discover the Hidden datasets released
WetStone Technologies has posted the September 2016 dataset release for Discover the Hidden.

PDF Septiembre 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Septiembre 2016 de Gargoyle Investigator

PDF Septiembre 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Septiembre 2016 de StegoHunt

PDF Septiembre 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Septiembre 2016 de StegoHunt

August 2016

PDF August 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the August 2016 malware dataset release for Gargoyle Investigator.

PDF August 2016 StegoHunt datasets released
WetStone Technologies has posted the August 2016 dataset release for StegoHunt.

PDF August 2016 Discover the Hidden datasets released
WetStone Technologies has posted the August 2016 dataset release for Discover the Hidden.


PDF Agosto 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Agosto 2016 de Gargoyle Investigator

PDF Agosto 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Agosto 2016 de StegoHunt

PDF Agosto 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Agosto 2016 de StegoHunt

July 2016

PDF July 2016 Discover the Hidden datasets released
WetStone Technologies has posted the July 2016 dataset release for Discover the Hidden.


PDF July 2016 StegoHunt datasets released
WetStone Technologies has posted the July 2016 dataset release for StegoHunt.

PDF July 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the July 2016 malware dataset release for Gargoyle Investigator.

PDF Julio 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Julio 2016 de Gargoyle Investigator

PDF Julio 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Julio 2016 de StegoHunt

PDF Julio 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Julio 2016 de StegoHunt

June 2016

PDF Junio 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Julio 2016 de StegoHunt

PDF Junio 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Junio 2016 de StegoHunt

PDF Junio 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Junio 2016 de Gargoyle Investigator

PDF June 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the June 2016 malware dataset release for Gargoyle Investigator.

PDF June 2016 StegoHunt datasets released
WetStone Technologies has posted the June 2016 dataset release for StegoHunt.

PDF June 2016 Discover the Hidden datasets released
WetStone Technologies has posted the June 2016 dataset release for Discover the Hidden.


May 2016

PDF May 2016 Discover the Hidden datasets released
WetStone Technologies has posted the May 2016 dataset release for Discover the Hidden.


PDF May 2016 StegoHunt datasets released
WetStone Technologies has posted the May 2016 dataset release for StegoHunt.

PDF May 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the May 2016 malware dataset release for Gargoyle Investigator.

PDF Mayo 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Mayo 2016 de Gargoyle Investigator

PDF Mayo 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Mayo 2016 de StegoHunt

PDF Mayo 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Mayo 2016 de "Descubra lo Oculto (Discover the Hidden)

April 2016

PDF April 2016 Discover the Hidden datasets released
WetStone Technologies has posted the April 2016 dataset release for Discover the Hidden.


PDF April 2016 StegoHunt datasets released
WetStone Technologies has posted the April 2016 dataset release for StegoHunt.

PDF April 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the April 2016 malware dataset release for Gargoyle Investigator.

PDF Abril 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Abril 2016 de Gargoyle Investigator

PDF Abril 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Abril 2016 de StegoHunt

PDF Abril 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Abril 2016 de "Descubra lo Oculto (Discover the Hidden)

March 2016

PDF March 2016 Discover the Hidden datasets released
WetStone Technologies has posted the March 2016 dataset release for Discover the Hidden.


PDF March 2016 StegoHunt datasets released
WetStone Technologies has posted the March 2016 dataset release for StegoHunt.

PDF March 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the March 2016 malware dataset release for Gargoyle Investigator.

PDF Marzo 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Marzo 2016 de Gargoyle Investigator .

PDF Marzo 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Marzo 2016 de StegoHunt

PDF Marzo 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Marzo 2016 de "Descubra lo Oculto (Discover the Hidden

February 2016

PDF February 2016 Discover the Hidden datasets released
WetStone Technologies has posted the February 2016 dataset release for Discover the Hidden.


PDF February 2016 StegoHunt datasets released
WetStone Technologies has posted the February 2016 dataset release for StegoHunt.

PDF February 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the February 2016 malware dataset release for Gargoyle Investigator.

PDF Febrero 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Febrero 2016 de Gargoyle Investigator .

PDF Febrero 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Febrero 2016 de StegoHunt

PDF Febrero 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Febrero 2016 de "Descubra lo Oculto (Discover the Hidden)

January 2016

PDF January 2016 Discover the Hidden datasets released
WetStone Technologies has posted the January 2016 dataset release for Discover the Hidden.


PDF January 2016 StegoHunt datasets released
WetStone Technologies has posted the January 2016 dataset release for StegoHunt.

PDF January 2016 Gargoyle Investigator datasets released
WetStone Technologies has posted the January 2016 malware dataset release for Gargoyle Investigator.

PDF Enero 2016 "Descubra lo oculto" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Enero 2016 de "Descubra lo Oculto (Discover the Hidden)

PDF Enero 2016 "Gargoyle Investigator" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Enero 2016 de Gargoyle Investigator .

PDF Enero 2016 "StegoHunt" conjuntos de datos publicados
WetStone Technologies ha publicado los conjuntos de datos de Enero 2016 de StegoHunt

December 2015

PDF December 2015 Discover the Hidden datasets released
WetStone Technologies has posted the December 2015 dataset release for Discover the Hidden.


PDF December 2015 StegoHunt datasets released
WetStone Technologies has posted the December 2015 dataset release for StegoHunt.

PDF December 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the December 2015 malware dataset release for Gargoyle Investigator.

November 2015

PDF November 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the November 2015 malware dataset release for Gargoyle Investigator.

PDF November 2015 Discover the Hidden datasets released
WetStone Technologies has posted the November 2015 dataset release for Discover the Hidden

PDF November 2015 StegoHunt datasets released
WetStone Technologies has posted the Novemeber 2015 dataset release for StegoHunt.

October 2015

PDF October 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the October 2015 malware dataset release for Gargoyle Investigator.

PDF October 2015 Discover the Hidden datasets released
WetStone Technologies has posted the October 2015 dataset release for Discover the Hidden.

PDF October 2015 StegoHunt datasets released
WetStone Technologies has posted the October 2015 dataset release for StegoHunt.

September 2015

PDF September 2015 StegoHunt datasets released
WetStone Technologies has posted the September 2015 dataset release for StegoHunt.

PDF September 2015 Discover the Hidden datasets released
WetStone Technologies has posted the September 2015 dataset release for Discover the Hidden.

PDF September 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the September 2015 malware dataset release for Gargoyle Investigator.

August 2015

PDF August 2015 StegoHunt datasets released
WetStone Technologies has posted the August 2015 dataset release for StegoHunt.

PDF August 2015 Discover the Hidden datasets released
WetStone Technologies has posted the August 2015 dataset release for Discover the Hidden.

PDF August 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the August 2015 malware dataset release for Gargoyle Investigator.

July 2015

PDF July 2015 StegoHunt datasets released
WetStone Technologies has posted the July 2015 dataset release for StegoHunt.

PDF July 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the July 2015 malware dataset release for Gargoyle Investigator.

PDF July 2015 Discover the Hidden datasets released
WetStone Technologies has posted the July 2015 dataset release for Discover the Hidden.

June 2015

PDF June 2015 StegoHunt datasets released
WetStone Technologies has posted the June 2015 malware dataset release for StegoHunt.

PDF June 2015 Gargoyle Investigator datasets released
WetStone Technologies has posted the June 2015 malware dataset release for Gargoyle Investigator.

April 2015

link C-TAK version 2.0 now available on EnCase® App Central
WetStone Technologies is pleased to announce that C-TAK (Cyber Threat Analytics Knowledgebase) version 2.0, our EnScript, is now available on EnCase® App Central.

May 2014

PDF WetStone Releases C-TAK v1.2 for EnCase® App Central @ CEIC 2014
WetStone is pleased to announce the release of C-TAK v1.2, our popular EnCase® App Central application. C-TAK provides investigators the ability to instantly add cyber threat detection to any EnCase investigation.

October 2013

PDF WetStone Chosen as Distributor of AIS's WiFi Investigator
AIS is pleased to announce WetStone Technologies as a distributor of their WiFi Investigator product. Effective October 1, 2013, WetStone Technologies has assumed marketing, sales, technical support and distribution of WiFi Investigator to the global marketplace.

July 2013

link C-TAK, Unveling cyber threats that can impact investigations.
Guidance's Featured App of the Month!
This step by step tutorial will give you a quick glance at how C-TAK can easily aid in your investigations.

May 2013

link Chet Hosmer Speaks at George Mason Cybersecurity Innovation Forum
Chet Hosmer presents on Steganography and the evolving threat of data hiding. The forum is hosted by George Mason's MS in Management of Secure Information Systems program.

April 2013

link New C-TAK App now available at EnCase App Central
Just released! Cyber-Threat Analytics Knowledgebase, (C-TAK) a new App available at the EnCase App Central Store. C-TAK allows investigators to rapidly identify and categorize cyber threats found during EnCase investigations.


November 2012

PDF US-LATT is Microsoft Windows 8 Ready
US-LATT (the leading live investigation and triage solution for law enforcement) Version 2.3.1 contains support for the latest Microsoft Windows operating system along with a host of other new features including IPv6 support, collection of user assist and pre-fetch data and support for NTFS token configuration.

October 2012

link DFI ranks "Steganography and Smart Phones" #2 in the top five articles of 2012
A large number of data hiding Apps for Android, iOS, and Windows mobile platforms are rapidly emerging. In this article, Chet Hosmer helps you identify them and the resulting covert communications.

June 2012

link Fair-Witness Lite iOS Application Released
For over a decade now we have provided secure time stamping services to clients all over the world through our Sovereign Time product line. Now iOS users can snap photos with the Fair-Witness App and embed and bind a Sovereign Time generated trusted and auditable timestamp inside the photo. Once embedded, the photograph can be verified not to have changed and the time it was taken to be factually provable.

May 2012

link US-LATT is selected as SC Magazine's Recommended Product
For the 2012 Digital Forensic Tool Group Test, SC Magazine selects US-LATT as the Recommended Product. It's "portable and easy to use, and a excellent product for anyone in law enforcement and well worth considering in larger organizations that need to perform triage forensics, " states SC Magazine. US-LATT is an outgrowth of the National Institute of Justice (NIJ) sponsored research project.

March 2012

link Protocol Data Hiding
Data hiding vulnerabilities in the Transmission Control Protocol (TCP) demonstrated a very simple and straight-forward method for hiding data in the TCP initial handshake sequence. In some ways, this served as a warning that hiding information within a data stream was not only plausible but was also simple and practical. As with most cyber security related warnings of this type, there was an initial outcry to develop more secure protocols that could mitigate such threats.

link View DACS Webinar
This webinar will delve deep into the complexity and flexibility that is built into modern file and data structures, and how criminals utilize this to their advantage. Both Data Hiding and new Steganography methods will be discussed. In addition, Chet will discuss current and future mitigating strategies, as well as new approaches to these structures that could systemically reduce these vulnerabilities.

February 2012

link Now Available: The DFI News Digital Magazine
Featured article located on Page 21, written by Chief Scientist, Chet Hosmer. Discovering The Hidden, The Future of Steganography.

link Steganography and Smart Phones
Over the course of the past year, a new crop of data hiding and steganography programs have emerged. These new Apps run on Android, iOS, and Windows mobile platforms. As one would expect, the ability to conceal, hide, and protect private information on smart mobile platforms is essential. In addition to the obvious benefits of protecting confidential information, there is a need for the ability to communicate covertly using these devices.

May 2011

PDF WetStone's T.A.P.S. Receives 5 Star Rating
WetStone s Trait Analytic Profiling Search (T.A.P.S.) reflects technology that was created under a research grant funded by the National Institute of Justice (NIJ). This technology was reviewed by SC Magazine as part of a Forensic Group Test and received an overall 5 star rating.

March 2011

PDF WetStone Technologies Releases Tool to Law Enforcement
WetStone today announced the release of (Trait Analytical Profiling Search). This new offering employs new Fibonacci hashing that speeds hostile program discovery by over 50 fold.

October 2010

PDF WetStone Technologies Releases Gargoyle Investigator Version 4.0


PDF Allen Corporation Cyber Security Solution Earns McAfee Compatible Status


August 2010

PDF WetStone Technologies and The Netherlands Forensic Institute Announce Partnership
An International Expansion of Cyber Security Innovation


WetStone's USLATT Receives 5 Star RatingWetStone's USLATT Receives 5 Star Rating
This technology recieved an overall five star rating in SC Magazine's group tested technologies.

WetStone Announces New Live Acquistion and Triage ToolWetStone Announces New Live Acquistion and Triage Tool


July 2010

DFI Webinar Series: Windows FE and Live Forensic Triage<VIEW WEBINAR NOW>DFI Webinar Series: Windows FE and Live Forensic Triage
Chet Hosmer will discuss Windows Forensic Edition during the DFI News webinar series: Thu, Jul 29, 2010 1:30 PM - 3:00 PM

WetStone Announces G-FLASH   WetStone Announces G-FLASH
Gargoyle Investigator FLASH is our newest tool designed to simplify your investigations.


New Training: Mining for P2P EvidenceNew Training: Mining for P2P Evidence
Learn to use the latest tools, techniques and methodologies to extract and examine information from P2P activities.


Steganography: Deciphering Hidden Messages<br>LISTEN LIVE<br> July 13th, 12:06pmSteganography: Deciphering Hidden Messages
LISTEN LIVE
July 13th, 12:06pm

The Kojo Nnamdi Show
Guests: Chet Hosmer & Gary Kessler
Last month's arrest of 10 Russian operatives shined a spotlight on a little-known but burgeoning espionage technology known as steganography. We explore the latest in cybercrime spy technology and the challenges it presents to law enforcement.

Under the cover of bright sunlightUnder the cover of bright sunlight
GSN Editor's Note: When GSN learned that the alleged Russian spy ring in the United States was using deception techniques such as "steganography," we decided to turn to a true expert in steganography for a description of this little-understood field.

Spy case shines light on steganographySpy case shines light on steganography
Former GCN reporter Patience Wait reported on steganography back in 2005. Wait talked with Chet Hosmer , CEO of software company WetStone Technologies, which makes software tools that agents can use to find the clues to these hidden messages.

Russian spy ring hid secret messages on the web Russian spy ring hid secret messages on the web
Chet Hosmer, chief scientist at cyberdetective company WetStone Technologies, in Conway, South Carolina a division of Allen Corporation says there is a large and growing number of cases. "Because some of this is being exposed [now], doesn't mean it hasn't been going on," he explains.

June 2010

Spies draw attention to long-obscure field of steganographySpies draw attention to long-obscure field of steganography
"Steganography is like beaming a Bat Signal into the sky that only a person with special glasses can see. It's like a digital dead drop." Stated Chet Hosmer

link Technologies old and new played roles in cracking Russian spy ring
There are an estimated 250 steganography programs available today, according to digital forensics expert Chet Hosmer.

Steganography Used In Russian Spy RingSteganography Used In Russian Spy Ring
Sensitive intelligence about US delivered with the use of Steganography.

Whispering in the Dark .. A new wave of criminal communicationWhispering in the Dark .. A new wave of criminal communication
By Chet Hosmer
The risk and threat posed by steganography has been argued vigorously for over a decade. There exist a couple of undisputed facts...

May 2010

HTCIA, AtlantaHTCIA, Atlanta
WetStone will hold labs at HTCIA, Atlanta September 20 - 22!

December 2009

SC Magazine Ranks Gargoyle A Top Product  In The Past 20 Years!SC Magazine Ranks Gargoyle A Top Product In The Past 20 Years!


November 2009

The 2009 Techno Forensics and Digital Investigations Conference Raises Important QuestionsThe 2009 Techno Forensics and Digital Investigations Conference Raises Important Questions


October 2009

PDF Allen Corporation's Cyber Security Division Joins McAfee Security Innovation Alliance


PDF Navigating Children Through the Next Generation of Cyber Threats


September 2009

The Evolution of the One-Way Cryptographic Hash The Evolution of the One-Way Cryptographic Hash
By Chet Hosmer

Steganography meets VoIP in hacker worldSteganography meets VoIP in hacker world
"The best way to combat suspected use of steganography to leak corporate data is to look for the telltale signs - known steganography programs on company computers"

July 2009

Practical forensicsPractical forensics
SC Magazine

June 2009

Find Incriminating Contraband in ImagesFind Incriminating Contraband in Images
By Chet Hosmer
The purpose of steganography is not to simply keep information private, but rather to hide the mere existence of such information or communications while also keeping them private....

WMV WetStone to Present Techno Forensics..
WetStone announced today their sponsorship of the 2009 Techno Forensics and Digital Investigation Conference.


May 2009

PDF Gargoyle Investigator Version 3.2.2 Now Available!
WetStone today announced the release of Gargoyle Investigator Forensic Pro Version 3.2.2.

April 2009

PDF WetStone Unveils USLATT Technology at NIJ Conference
Chet Hosmer, WetStone/Allen Chief Scientist addresses NIJ to unveil USLATT technology to support state and local law enforcement.

March 2009

PDF WetStone/Allen Cyber Security Chief Addresses Council of Europe
Chet Hosmer, WetStone/Allen Chief Scientist addresses council of Europe on key cybercrime technical and training challenges at this years Octopus conference in Strasboug, France.

January 2009

PDF WetStone & Cyber Security Technologies Introduce Live Investigation Suite
WetStone and Cyber Security Technologies Launch the new Live Investigation suite at DoD Cyber Crime Conference.

PDF WetStone and Paraben Announce Partnership
WetStone and Paraben announce partnership at DoD Cyber Crime Conference.

October 2008

link WetStone Technologies Awarded DOJ Grants
US Department of Justice Awards two grants to WetStone Technologies, Inc.

August 2008

link Spy vs. Spy
IEEE Spectrum interviews Chet Hosmer.
Steganography uses innocuous documents, usually an image file, as carriers for secret messages. Unlike encryption, steganography encodes the message while at the same time concealing the fact that a message is being sent at all.

July 2008

PDF WetStone Offers Investigation Products and Trainings on GSA Schedule
WetStone Technologies, Inc. announced the availability of their Digital Investigation Suite of products and training through the GSA Schedule of its parent company, Allen Corporation of America, Inc.

May 2008

PDF LiveDiscover Forensic Edition Receives SC Magazines 5 Star Rating
LiveDiscover Forensic Edition (FE) received a 5 Star rating from SC Magazine s forensic group test. Results are available in the May issue of SC Magazine (www.scmagazine.com).

April 2008

PDF WetStone Named SC Magazines 2008 Best Computer Forensics Solution
WetStone Technologies, Inc., the leader in computer forensics and digital investigation technologies, has won the 2008 SC Magazine's Readers Trust Award program. Gargoyle Investigator Forensic Pro Edition was named Best Computer Forensics Solution at the exclusive, SC Magazine Awards Gala, held in conjunction with the annual RSA Conference.

January 2008

PDF WetStone Selected as Digital Forensic Innovator by SC Magazine
SC Magazine (the leading industry magazine for IT security professionals) selected WetStone as the 2008 innovator in digital forensic technology in the December 2007 issue.

PDF WetStone Named Readers Trust Finalist Best Computer Forensics Solution
WetStone Technologies Inc. the leader in digital investigation products, has been named a finalist for the 2008 SC Magazine Awards, for outstanding achievement in information technology (IT) security. Gargoyle Investigator™ Forensic Pro Edition was nominated in the Reader Trust Award Best Computer Forensics Solution category of the competition.

November 2007

PDF WetStone and Data Duplication, Ltd. Ink deal
WetStone Technologies Inc. and Data Duplication, Ltd. have signed an agreement where by Data Duplication, Ltd. will serve as WetStone’s exclusive distributor in Europe. Data Duplication, Ltd. will provide production and distribution services for WetStone’s unique digital investigation products, training and services.

October 2007

PDF WetStone Partners with Pennsylvania College in Support of National Security Awareness Month
WetStone Technologies, Inc., a division of Allen Corporation of America is joining forces with the Pennsylvania College of Technology in Williamsport, Pa., to offer a one-time educational seminar in support of National Security Awareness Month, designated for the month of October.

September 2007

PDF WetStone Technologies, Inc. Named 2007 Tibbetts Award Winner
We are proud to announce WetStone Technologies, Inc., a division of Allen Corporation of America has been selected as one of the winners of the 2007 Tibbetts Awards. WetStone will receive the award on October 10th at the Westin hotel located at 1400 M Street NW in Washington, D.C.

July 2007

PDF Journal of Digital Forensic Practice-Discovering Hidden Evidence
Over the past decade methods, techniques and technologies, to conceal digital evidence and communicate covertly have increased alarmingly. Steganography, the Internet and peer-to-peer networking provide criminals, gangs and terrorists with covert methods of communication concealment of evidence

May 2007

PDF WetStone Introduced Secure Auditable Timestamp Plug-In For EnScript®
WetStone Technologies announces today at the CEIC 2007 show in Las Vegas, NV the release of an EnScript® plug-in that directly integrates trusted 3rd party time stamping into any EnScript.

April 2007

PDF Gargoyle Investigator™ Forensic Pro Receives 5 Star and Best Buy Rating
Gargoyle Investigator™ Forensic Pro receives 5 Star and Best Buy Rating from SC Magazine Group Test. The Forensic Group Test conducted by SC Magazine has been completed and the results are available in the April issue of SC Magazine.

PDF LiveWire Investigator™ Receives 5 Star and Lab Approved Rating
LiveWire Investigator™ receives 5 Star and Lab Approved Rating from SC Magazine Group Test. The Forensic Group Test conducted by SC Magazine has been completed and the results are available in the April issue of SC Magazine.

PDF Gargoyle Investigator™ Version 3.0 Released
WetStone Technologies, Inc. is proud to announce Gargoyle Investigator™ Version 3.0. WetStone’s Gargoyle Investigator™ application is a popular digital investigation tool that provides investigators with the ability to triage computers for the presence of malware, (malicious software).

February 2007

PDF WetStone Technologies, Inc. Named SC Magazine’s 2007 Best Computer Forensics Solution
WetStone Technologies, Inc., the leader in computer forensics software, has won a 2007 Reader Trust Award in the 10th annual SC Magazine Award program for outstanding achievement in Information-Technology (IT) security. Its Gargoyle Investigator™ Enterprise Edition was named the Best Computer Forensics Solution at a gala ceremony held in San Francisco in conjunction with the recent RSA Conference, the world’s leading information-security event.

January 2007

PDF Gargoyle Enterprise Module (GEM) Released
WetStone Technologies, Inc. introduces a new on-demand enterprise malware investigation capability at the DoD Cyber Crime trade show in St. Louis, MO. This new capability provides cyber crime investigators with a new capability in the fight against the increased proliferation of malicious software within enterprise computing environments. The Gargoyle Enterprise Module (GEM) allows customers to execute malware discovery across their enterprise to root out malicious code infiltration and use.

PDF DCCI Finds Gargoyle to Be an Effective Tool for Law Enforcement and Forensic Communities
WetStone Technologies, Inc. is proud to announce that the Defense Cyber Crime Institute (DCCI) has found “Gargoyle to be an effective tool for Law Enforcement and forensic communities”

PDF Allen Corporation of America Acquires WetStone Technologies
Allen Corporation of America, ranked by Deloitte & Touche as the third fastest growing technology company in Virginia, has acquired WetStone Technologies, a Cortland, New York based cyber security company. In signing documents ratifying the transaction, Allen Corporation of America’s Chief Executive Officer, Carl von Sternberg, cited the increasing need to satisfy client unease about cyber security.

PDF DCCI Gargoyle Investigator Test Report
DCCI testing found Gargoyle Investigator to be an effective tool for Law Enforcement and forensic communities. Download the report to see how the tool was tested.

December 2006

PDF LiveWire Investigator™ Version 3.1.1.C MalWare Discovery Capability
WetStone Technologies, Inc. announces the availability of LiveWire Investigator™ Version 3.1.1C. LiveWire Investigator™ allows investigators to perform on-demand forensic examinations of live running computers and servers.

August 2006

PDF Malware Investigator Boot Camp - Now Available!
WetStone Techologies, Inc. - a leading producer of digital forensic investigation products, is proud to announce the availability of its latest intensive training course: Malware Investigator Boot Camp.

PDF Live Forensics is the Future for Law Enforcement
Collecting possible evidence in real time, while desktop computers and servers are running, could provide the opportunity to build criminal cases while creating a window to prevent illegal acts as well, from distribution of child pornograhphy to thwarting terrorists plots...

PDF Malwares Tangled Roots
Government Computer News (GCN) interviews malware experts to discuss how identifying the source of cyber intrusions is a complicated task.

June 2006

PDF WetStone & Security Horizon Join Forces/Digital Investigation Training via GSA Schedule
WetStone Technologies and Security Horizon today announced the availability of two advanced digital investigation training classes through the Government Services Administration {GSA} Schedule. LiveWire Investigator™ and Steganography Investigator, both developed by WetStone, are available in either an open or closed enrollment environment, and may be purchased through Security Horizon.

PDF Advanced version of Gargoyle Investigator released at Techno Security 2006
WetStone Technologies today announced a new advanced version of Gargoyle Investigator™ today at Techno Security, 2006 in Myrtle Beach, SC. Gargoyle Investigator Version 2.4 allows for the direct integration of investigative results from popular forensic products such as Encase® Forensic Edition from Guidance™ and FTK from Access Data®, speeding the process of investigating malicous software usage by suspects under investigation.

October 2005

link ABC Television
"Every known warfare that has ever been conducted, this kind of technology is used because there's one thing that we know about warfare, the ability to command control and communicate is absolutely critical and you need to be able to do that securely and covertly." States Chet Hosmer


August 2005

PDF Gargoyle Investigator Auditor Edition Now Includes Digital Timestamping
WetStone Technologies today announced the inclusion of their Digital Evidence Time Stamping, (DETS) tool into their Gargoyle Investigator Auditor Edition. This new product combination fulfills the digital auditor s need to validate the who , what and especially the authenticated when of digital evidence discovery during an investigation.

July 2005

PDF Live Network Scan of IP Addresses Yields Comprehensive Enterprise Information
WetStone Technologies today announced the release of LiveDiscover, the newest addition to their popular line of live digital investigation products. Digital investigation – whether performed by law enforcement personnel, corporate IT department heads, security specialists, or digital auditors for regulation compliance – must start with a snapshot of the current Enterprise networking state.

June 2005

PDF Digital arms race shows cybersecurity threat facing U.S.
Government Computer News (GCN) interviews Chet Hosmer at the Techno Security Conference held in Myrtle Beach, SC.

January 2005

PDF Investigation of 'Live' Systems Now Available
WetStone Technologies and Cyber Security Technologies, (CST) have announced a partnership to offer the first “Live Wire Investigation Training” course. “Live Wire” investigation will allow law enforcement, government agency and corporate security professionals to investigate and collect evidence from “live” running computer systems under their control in real-time.