Disclosure notice: This is a true account of a frontline investigation – written in collaboration with Semantics 21. This may contain accounts that some readers find upsetting.
This case study is based on a real experience shared by a law enforcement/investigation agency professional and written in collaboration with Semantics 21. It is presented in a first-person format to reflect the original voice and lived reality of the investigator, with all identifying information removed or adapted in accordance with UK GDPR and safeguarding standards.
Introduction
When a voyeurism case leads to a seized computer and a suspicious device, the questions start piling up fast. Is this a one-off? How much media is there? And more importantly — can you even link the files back to the device when it has no branding, no metadata, and no obvious signature?
That was the situation facing one investigator. They had a suspect, a computer and a recovered hidden camera but the device appeared custom-built and unbranded — cobbled together from components purchased online.
No camera model, no serial number and no typical trail but S21 LASERi-X found something others didn’t.
The investigator exported all image and video content from the suspect’s computer into a single analysis within S21 LASERi-X. Their goal: to identify which files originated from the spy device.
They began by loading a sample image from the device as a reference. As expected, standard tools couldn’t identify any embedded manufacturer data — and neither could other software.
But S21 LASERi-X went further.

Building the Case, Frame by Frame
It surfaced hidden EXIF metadata not shown by typical viewers and buried within that was an unusual parameter. Something inconsistent. Possibly unique.
Using that one detail, the investigator ran a search for all media files that shared the same EXIF trait. In seconds, the grid updated with matching files.
The matched images confirmed everything: same position, same vantage point, same device. Not only did the files show multiple victims whose privacy had been violated — they also captured the suspect in the act of placing the hidden device.
This wasn’t just evidence, it was the full story.
Without S21 LASERi-X’s extended EXIF inspection, the investigator would have been forced to visually review every image and video on the suspect’s drive — a task that could have taken days or weeks.
Instead, a single search revealed everything.
“What others missed, S21 LASERi-X revealed — turning obscured data into a clear trail.”
What if That Parameter Had Gone Unnoticed?
If the investigator had relied solely on typical metadata viewers or data carving tools, the connection would never have been made.
The spy device would have remained just a piece of hardware and its media, just a flood of unlabelled files.
But with S21 LASERi-X, hidden patterns became clear and the case moved from suspicion to certainty.

S21 solutions mentioned

S21 LASERi-X
The complete solution for rapid victim identification, CSAM categorisation and media review
Share your experience, inspire others
Have a story of your own? Whether you’d like to be credited or remain anonymous, we’d love to hear from you. Your experience could help rescue a victim, safeguard a child, or take a dangerous offender off the streets. Please get in touch — your words could make a difference.
Request a demo or sales information pack
Please complete the form with valid company or agency information, including a company or agency-issued email address. We will need to confirm your credentials before issuing a free trial licence.