Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Cyber Response for Missing Child Investigations: NCPTF Conference
This week kicks off the 2020 National Child Protection Task Force Conference. In response to the COVID-19 pandemic, NCPTF has moved the conference and training online as a virtual event with the focus on cyber response for missing child investigations. The topic is of vital importance since so many children around the world are online and at increased risk during the pandemic.

Using Text Analysis in Sensitive Site Exploitation
Military forward operators can benefit from text analysis and translation
ADF Solutions, the leading provider of sensitive site exploitation software, now includes the ability for military forward operators to leverage the power of text analysis to speed their investigations of structured and unstructured data in over 200 languages.

Sensitive Site Exploitation and Triage-G2: Just like Jack Ryan
When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in.

ADF Adds New Digital Forensic Analysis Capabilities with Rosoka
ADF & Rosoka Bring the Power of Entity Extraction and Multi-Lingual Translation to the Front-Line in Triage-G2Ⓡ
Bethesda, Maryland: ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the ability for on-scene and lab investigators to leverage the power of Rosoka to speed their investigations of structured and unstructured data in over 200 languages.
Rosoka text analytics brings the power of automated multilingual entity extraction directly into ADF digital forensics software through a tightly integrated user experience. Rosoka text analytics runs locally on the investigator’s computer, processing documents in over 200 languages to identify entities, and locations in unstructured documents. Learn more about the partnership at www.adfsolutions.com/partner/rosoka

2019 IACP Technology Conference
This week, nearly 1,000 law enforcement professionals from across the United States and around the world are meeting in Jacksonville, Florida for to discuss and discover new technologies designed to promote public safety, police safety and policing techniques.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

Digital Forensics: On-Scene in Texas
Join ADF Digital Forensic Specialist, Rich Frawley as he presents "On-Scene Digital Investigation Best Practices: From Search Warrant to Court Ready Paperwork" at the Techno Security & Digital Forensics conference in San Antonio, Texas. The Techno event is a follow up to the top rated Techno Security & Digital Forensics Myrtle Beach event earlier this year where ADF was a Gold Sponsor.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (102)
- Law Enforcement (73)
- Digital Evidence Investigator (71)
- How To Video (56)
- Mobile Device Investigator (52)
- Triage-Investigator (48)
- United States (48)
- Triage-G2 (47)
- DEI PRO (40)
- Computer Forensics (38)
- Crimes Against Children (36)
- Digital Evidence (36)
- ICAC Task Force (36)
- Triage (33)
- Forensic Triage (32)
- Triage-G2 PRO (30)
- Triage-Investigator PRO (29)
- Mobile Forensics (27)
- Project Vic (27)
- Cyber Crime (26)
- Mobile Device Forensics (26)
- Forensic Analysis (25)
- Child Exploitation (23)
- ICAC (22)
- AllinForensics (21)
- iOS Forensics (20)
- Law Enforcement Conferences (19)
- CAID (18)
- United Kingdom (18)
- Android Forensics (17)
- Cyber Forensics (16)
- DEI PRO Field Tablet (15)
- Forensic Software (15)
- Military (15)
- CSAM (14)
- Police (14)
- High Tech Crime (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Field Forensics (12)
- Sheriff (12)
- Canada (11)
- Human Trafficking (11)
- Internet Investigation (11)
- Military Police (11)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- Search Profiles (10)
- Forensic Training (9)
- IIOC (9)
- Mobile Triage Kits (9)
- Site Exploitation (9)
- technology (9)
- Counter Terrorism (8)
- DOMEX (8)
- Apple Mac Forensics (7)
- Computer Forensic Lab (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Hash Sets (7)
- Project VIC UK (7)
- Prosecutors (7)
- forensics (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- MDI Field Tablet (6)
- Photo Forensics (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- Griffeye (5)
- IPOC (5)
- Identity Operations (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Certified Forensic Computer Examiner (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Artificial Intelligence (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Detective (2)
- Drone Forensics (2)
- Forensic Lab Solutions (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Analytics (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Machine Learning (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)