Programs on this page will link you to the sites which offer free LEO related programs or Shareware
Each link will enable you download LEO related tools, some will enable you to directly download from my site.
freeware/ Internet Security & Privacy Tools
Special Resources Group (SRG) is a training organization based on providing the most current and up to date operational methods for military, law enforcement and high level security professionals.
Logicube is the recognized world leader in hard drive / media duplication & computer forensic systems. From the handy, lightweight Echo™ and the Solitaire Turbo™, to the New Forensic SF-5000u and the OmniSCSI - the world's first SCSI hard disk drive duplicator to support both IDE and SCSI master drives, Logicube leads the industry in smart, duplication technologies. Logicube products are now used in virtually all major IT departments, as well as in the world's top law enforcement agencies. http://www.logicube.com/index.html
At CPAL Inc. we combine proprietary criminology theories and algorithms, which are always under constant development in collaboration with world leading criminologists, with state of the art Microsoft technologies to identify patterns in crime.http://www.crimepatterns.com/
Computer Solutions is the technology leader in the
design and manufacture of High-speed
Hard Drive Duplication equipment, Software
Cloning Solutions and Diagnostic
Systems. In addition, Intelligent
Computer Solutions is the preeminent supplier of
Law Enforcement & Computer Forensic Systems
to Law Enforcement personnel ranging from local police
departments to Federal and International agencies. Intelligent
Computer Solutions also provides a full range of Data
Recovery Solutions ranging from self help s/w to professional lab
The U-Spy Store features spy equipment covering surveillance, counter surveillance, security, locksmithing, ninja, hidden cameras and mics, wireless video & audio, bug detectors, recorders, police equipment, personal protection, and hundreds more spy items - even books & videos.
As part of our ongoing R&D efforts, the Foundstone team has created several unique utilities that have
assumed an indispensable place in our security toolkit. Foundstone programmers wrote these utilities, and we
use them in our own security assessments. Foundstone is providing the software free of charge to the public.
online source for high quality hidden cameras, nanny cams, bug detectors,
surveillance systems, spy equipment, room and phone recorders
Trojan Securities was established by former British - USA elite military & law enforcement personnel providing a wide range of very specialized services including bodyguards, intelligence gathering, risk management and high-risk security related solutions. As a result of our success and practical approach, we have built a unique reputation for protection management and security services. Operating globally many multinational corporations rely on us to help safeguard their executives, assets and major investments
The Law Enforcement Equipment Corporation
provides a wide spectrum of equipment for
governments, law enforcement agencies and the
military. There is a need for LEEC products in
virtually every facet of law enforcement, from
security to surveillance to personal protection and
Our clients include every major security agency in
the United States, the scientific community (NASA,
Society for Forensic Sciences, Association for
Advancement of Science), hundreds of regional
and local law enforcement agencies and all
branches of the armed forces in the U.S. http://www.spyzone.com
LAW ENFORCEMENT SECTION
Before ANY products can be sold out of this section
There are strict guidelines you MUST meet.
1: You must supply a letter with company letterhead stating that you
are licsened to sell Law Enforcement products.
2: You must supply US with the purchase order number (PO#), the name
of the Law Enforcement or Government Agency, with contact information
for EACH and EVERY order. All contacts
WILL be verified to the fullest extent before order is processed.
For products without LEO restrictions http://vigilanttech.homestead.com/contents.html
The Worldwide Leader in comprehensive information gathering tools for the Insurance and Law Enforcement Industries.
NeoTrace is a high-speed graphical traceroute integrated
whois and ping. It is extremely
fast, simple to use and returns a wealth of information. NeoTrace is very popular for
detecting network problems and finding net information, it is also a great tool for spam
Protect yourself with these FREE downloads, to include: Super Shedder,Script Defender,DHCP fix, and more .. go to: http://www.analogx.com/contents/download/system.htm
Truster technology offers a number of significant advantages
beyond detecting deception. It distinguishes between levels of
stress with more in-depth and accurate results than any other
voice analyzer. Truster technology is the first voice analyzer of its
kind capable of providing a realtime analysis and diagnosis of the
subject's voice, that can be operated by anyone with a PC and a
Sam Spade is an integrated network query tool for Windows
95, 98, NT4.0 & Windows 2000. It's freeware.http://www.samspade.org/ssw/
D.I.R.T.TM - Data Interception by Remote Transmission is a powerful
remote control monitoring tool that allows stealth monitoring of all
activity on one or more target computers simultaneously from
a remote command center. No physical access is necessary.
Application also allows agents to remotely seize and secure digital evidence prior to
physically entering suspect
ImageFilerLE ( Law Enforcement) is an image management application that
enforcement agencies with the tools to capture and store images. The database can be
searched for specific records or used to create lineups, image arrays and witness displays. http://www.tsionline.net/le.html
Electronics has recently introduced a new surveillance product for law
enforcement. This is a wireless remote controlled pan/tilt/zoom/focus color
camera. The operator's console is packaged in a very compact case making it
very portable. All of the electronics for the camera control, data link and
video transmitter are contained in a small rugged housing separate from the
camera. The camera / P&T can be located up to 20 feet from the transmitter
housing. The camera can be operated up to two miles line-of-sight.
Please visit the WEB site at http://www.gamut-electronics.com/ for more
B.A.I.T.TM - Binary Audit Identification Transfer is a powerful
intrusion detection tool that allows the user to create "trackable"
electronic documents. http://www.codexdatasystems.com/menu.html
Dial in Remote Video Systems Covert Surveillance Products
& Computer Video Recording System http://www.covertsurveillance.com/catalog_index.htm
NoKnock E-Warrant TM is aPPpowerful software application
developed to assist bona fide law
enforcement agencies in the execution of judicial search warrants by stealth via the
internet. NoKnock E-WarrantTM ,employes surreptiticious delivery
and a variety of search, seize and
evidence safeguard method http://www.codexdatasystems.com/menu.html
A 40 hour class on 3D Crime/Crash Scene Reconstruction has been developed
Law Enforcement investigators to learn how to use this cutting edge technology tohttp://user.mc.net/~paulb/ck97class/3dclass.htm
produce accurate three-dimensional models of actual crime/crash scenes.
NetBuster can be used in TWO ways. Either as a NetBus removal tool which
recognises the most usual
NetBus trojans, OR as a fool-the-one-trying-to-netbus-you' tool. When NetBuster
is activated and someone is trying to connect you via NetBus, the NetBuster will log this persons IP adress
together with date and time. This might be useful if you want to report somebody to his internetprovider. You
will also see what the person is TRYING to do, if he's trying to open the CD-Rom, deleting files or whatever.
Most functions up to NetBus 1.70 is supported. If you
want, NetBuster can check if this person has the
NetBus trojan installed on his own system. http://surf.to/netbuster
Search For People &
You are entering an Official United States Government System. Users
system consent to the monitoring, recording and/or disclosure of any data on
the system at the complete discretion of the service provider. Users have no
reasonable expectation of privacy while using this system. Unauthorized
modification of any information stored on this system may result in criminal
The new Birdman WeaponsSystems Barrett M82B1K-PDW .50BMG Entry Weapon
began life as astandard Barrett M82A1 .60 BMGsniper rifle. through a painstakingprocess of
assembly and disassembly, our highly skilled technicians were able to
drastically modify the standard rifle into a fully functional,
double-hand-held Entry Weapon. http://www.birdman.org/
Working deep below your Windows operating system...
Evidence Eliminator employs the exact same sector analysis technology as
available in ultra-high-priced tools available to law-enforcement agencies, for
example the FBI. After identifying and analyzing the unwanted data hidden in
your drives, Evidence Eliminator destroys it with proven methods of
secure disposal similar to US Department of Defense standards for destruction
of classified material. http://www.evidence-eliminator.com/main.shtml
Tracking the predators that prey on our children
NOTE: This is the student
outline for the Forensic Photography section (24 hours of instruction)of the Field
Evidence Technician Course (a 80 hour course) presented by the Center for Criminal Justice Research and
Training, California State University, Long Beach (310)985-4940. Instructor: Steven Staggs http://www.police.ucr.edu/fet-ol.html
AD-aware now includes the detection and removal of Web3000,
Gator, Cydoor, Radiate\Aureate, Flyswat,
Conducent\TimeSink and CometCursor (1.0 and 2.0).
If you have any suggestions how to improve Ad-aware,please email us!http://www.lavasoft.de/free.html
Internet companies, whose apparent "business
model" is the exploitation of consumer trust andTauscan is a powerful Trojan
virus detection and removalTauscan is a powerful Trojan virus detection and removal
engine capable of detecting over one thousand rogue programs that can inflict
serious damage to your system. Tauscan incorporates a
user-friendly interface with many innovative features such
as drag & drop scan, right-click scan and unique setup Wizard
for novice users plus unlimited downloads of virus definition
file updates. engine capable of detecting over one thousand rogu
programs that can inflict serious damage to your
system. Tauscan incorporates a user-friendly interface with
many innovative features such as drag & drop scan, right-click
scan and unique setup Wizard for novice users plus unlimited
downloads of virus definition file updates.
ignorance, are sneaking their spyware systems
into our machines for their own purposes.http://grc.com/optout.htm
Advanced search for Computer Security Experts http://www.samspade.org/t/
*CRIMCASE* Pro©, Version 9.0, is the flagship of Aquila
Software's family of Law Enforcement software. It is a
specialty record keeping program designed for use by the
law Enforcement Professional. *CRIMCASE* Pro assists
the Police Officer in recording information about an arrest,
field investigation, or a traffic stop; as well as A Daily Log
section. Sort/Search capabilities are available in all
sections of *CRIMCASE* Pro. Nineteen different printed
reports are also available.http://www.crimcase.com/
Secure the best equipment to support your personnel
Secure the best available police and security equipment with this
expert reference tool, complete with manufacturers' details for
PC Private Eye is a software product that puts your PC to work even
when you aren't there. It takes control of desktop video conferencing
cameras to detect motion and capture images at home or in the office,
while you are away.http://pcprivateeye.home.att.net/
The Spy Tech Agency Online Catalog is one part of the
largest and most comprehensive websites .Featuring:
Over 6000 products - more than 3000 now online.
Pricing, photos, illustrations, and specifications.
Includes archived historical and restricted products.
Full Solutions custom design from concept to
design and manufacturing.
Field training available on major puchases.
Onsite consulting to law enforcement for
FREE DOWNLOAD - CONTROL PC's OVER THE INTERNET!
NEW NetOp Remote Control v6.5!! -- NetOp is the award-winning, stable
fast & easy remote support & management tool. Control PC's over modems,
networks or the Internet just as if you were in front of them. Download
a FREE fully functional evaluation copy now!
Retina The Network Security Scanner
Retina is a network vulnerability scanner unlike any other. Unrivaled in its capabilities,
Retina provides a continuous security presence in places no other application has
dared go before. While most security scanners confine themselves to searching for
only known vulnerabilities, Retina shatters the mold of the typical security scanner
through its use of state-of-the-art AI (Artificial Intelligence). The AI component allows
Retina to think like a hacker or security analyst would if they were attempting to break
into your network. Thus, Retina eclipses most current security scanners on the market that only look
for known vulnerabilities. Retina searches for both known and unknown vulnerabilities, giving an
organization the most complete network security analysis possible.http://www.eeye.com/html/Products/Retina/overview.html
"Secretly Monitor All Activity on Your PC. It's Like a Security
For Your Computer! It Remains Hidden And Secured By Your Own
Password... Only YOU Will Know it's There!" Monitor your system for fraud and criminal activity
Ensure your computer is not being used for illegal activities
Find the proof you need to prosecute or take disciplinary action. http://www.spydevice.com/
What is KeyKatchTM?
The KeyKatchTM is a tiny recording device
that clips onto your keyboard cable.
It's used to log all keystrokes typed on the computer.
It doesn't require any external power source
and it installs in less than 10 seconds. http://www.codexdatasystems.com/keykatch.html
Shoot up your computer Small program which lets you shoot up your computer, press Esc to get out
The Anarchist Cookbook You will see the index only. If you wish to receive any of the subjects, you must e-mail me and include your Departments name and phone number for verification. LAW ENFORCEMENT ONLY !!
E-mail me on secure server