The Encrypt backup feature in iTunes locks and encodes your information. In this short How To video, Director of Training, Rich Frawley shows investigators how to remove the known iTunes backup..
Go to News articleThe 2021 National Law Enforcement Training on Child Exploitation training conference will be held online this year. This annual training event is designed to train and educate prosecutors, digital..
Go to News articleInvestigators can now scan all available Mac computers (including macs with T2 or M1 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the..
Go to News articleOn-scene, it can be impractical for investigators to seize all the digital devices they locate so investigators that are able to triage on-scene only seize devices with relevant data.
Without..
Go to News articleDigital Media Investigators throughout the United Kingdom rely on the Child Abuse Image Database (CAID) in their digital investigations involving Child Sexual Abuse Material (CSAM).
Go to News articleCopyright 2024 | ADF ♥ Digital Forensics.