I bet almost every officer who has worked an ICAC case has dealt with MEGA.nz. You send a request for information to MEGA and you are pleasantly surprised at how fast of a response you get. But there is only one problem, You open a MEGA export zip file. Inside, a maze of JSON files—dense, cryptic, and filled with unfamiliar keys like session_details
, bsi_timestamp
, and outshares
. You know there’s valuable information in there like IP addresses, login times, maybe even evidence of links being sent. But parsing it manually? That’s a full day gone. And worse, you still have to make it understandable to someone who’s never seen a JSON file in their life. I decided to build this parser after I saw multiple cases get ignored because the investigators working them got overwhelmed with the information and felt they couldn't understand it. Much less explain it to a jury.
If that’s you, you’re not alone.
As a law enforcement officer, you don’t have time to become a developer just to decode digital evidence. You need clear, actionable insights, fast. That’s exactly why I built the MEGA Parser. A GUI based tool that transforms MEGA JSON exports into human-readable, court-ready reports. It even maps IP addresses and lets you tag key data points for custom PDF or HTML reports.
In this post, you’ll get a walkthrough of what the tool does, see how it works through screenshots, and find out how to access it securely via Search.org Scripts.
Let’s break it down.
What is the MEGA Parser & Why It Exists
The MEGA Parser was built for one reason: to help law enforcement officers make sense of MEGA.nz exports without having to wade through raw JSON data or write a single line of code.
When MEGA responds to law enforcement, they will provide a .bsiexport.zip
file. Inside that zip? JSON file(s) full of account metadata: timestamps, user activity, shared folders, session IPs, and more. The problem? None of it is easily formatted for non tech savvy investigators. Even experienced analysts can spend hours just trying to parse the timestamps, let alone explain them to someone in court.
That’s where the MEGA Parser comes in.
It’s a GUI-based tool that reads those JSON files, automatically decodes all relevant fields, and uses MEGA’s own internal glossary to show exactly what each key means.
Hovering the mouse over a category shows the definition of that category.
That means no more second-guessing what purge_protected
or pro_level
is supposed to mean. It’s all right there, explained clearly next to the data.
In short: it turns MEGA’s raw data into a structured, readable, and court-presentable format with just a few clicks.
Core Features
The MEGA Parser uses a straightforward graphical interface. You just load the JSON file, and the tool takes care of the rest organizing data into expandable trees, tabs, and tables.
📘 MEGA Glossary Integration
Every field from the MEGA export is cross-referenced with MEGA’s official glossary. Hover over a term like parked_accounts
, and you’ll see exactly what it means no Googling or guesswork.
🏷️ Tag & Report Key Evidence
Right-click any field to tag it. Tagged items get highlighted and can be exported into a clean summary either in PDF or HTML format. This is perfect for preparing case notes, reports, or courtroom exhibits.
🌍 IP Address Geolocation (with Map View)
The tool uses the ipinfo.io API to geolocate IP addresses found in the data. Those IPs are then plotted on an interactive map helping you spot patterns, track movement, or show jurisdictional relevance.
📆 Timeline Table
Session start times, login activity, and other timestamped data are collated into a timeline view. This lets you trace a user’s actions over time without digging through nested JSON.
📤 Export as PDF or HTML
Once you've tagged your key items, you can export everything including IP maps and tagged items into a professional-looking report. Only report what you want. It’s built for court, for colleagues,
and for clarity.
MEGA Parser is hosted securely on Search.org Scripts, accessible only to verified law enforcement.
Comments
Post a Comment