Remove an iTunes Password set in ADF Digital Forensics Tools

The Encrypt backup feature in iTunes locks and encodes your information. In this short How To video, Director of Training, Rich Frawley shows investigators how to remove the known iTunes backup..

Go to News article
Virtual National Law Enforcement Training on Child Exploitation NLETC

The 2021 National Law Enforcement Training on Child Exploitation training conference will be held online this year. This annual training event is designed to train and educate prosecutors, digital..

Go to News article
macOS Forensics: Live Scan Macs with T2 or M1 chips

Investigators can now scan all available Mac computers (including macs with T2 or M1 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the..

Go to News article
Digital Forensics Lab: How to Reduce Forensic Backlogs

On-scene, it can be impractical for investigators to seize all the digital devices they locate so investigators that are able to triage on-scene only seize devices with relevant data.

Without..

Go to News article
Using CAID Hashes in a Child Sexual Abuse Material Investigation

Digital Media Investigators throughout the United Kingdom rely on the Child Abuse Image Database (CAID) in their digital investigations involving Child Sexual Abuse Material (CSAM)

Go to News article

Posts by Tag

See all

Recent Posts