Cryptocurrency has expanded in use since it was created in 2009. The idea of creating a decentralized currency to avoid the regulation of banks and governments created a new avenue not only for criminals but also for terrorist organizations. Terrorists such as jihadists around the world have been trading crypto coins to purchase weapons and drugs to continue their attacks on innocent civilians.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


How to Have a Digital Forensic Triage Process that Works Field to Lab
In this 3-minute "How To" video, you'll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.

Using Stealth Mode: Counterterrorism Operations
Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

Cyber Response for Missing Child Investigations: NCPTF Conference
This week kicks off the 2020 National Child Protection Task Force Conference. In response to the COVID-19 pandemic, NCPTF has moved the conference and training online as a virtual event with the focus on cyber response for missing child investigations. The topic is of vital importance since so many children around the world are online and at increased risk during the pandemic.

Using Text Analysis in Sensitive Site Exploitation
Military forward operators can benefit from text analysis and translation
ADF Solutions, the leading provider of sensitive site exploitation software, now includes the ability for military forward operators to leverage the power of text analysis to speed their investigations of structured and unstructured data in over 200 languages.

Sensitive Site Exploitation and Triage-G2: Just like Jack Ryan
When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in.

ADF Adds New Digital Forensic Analysis Capabilities with Rosoka
ADF & Rosoka Bring the Power of Entity Extraction and Multi-Lingual Translation to the Front-Line in Triage-G2Ⓡ
Bethesda, Maryland: ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the ability for on-scene and lab investigators to leverage the power of Rosoka to speed their investigations of structured and unstructured data in over 200 languages.
Rosoka text analytics brings the power of automated multilingual entity extraction directly into ADF digital forensics software through a tightly integrated user experience. Rosoka text analytics runs locally on the investigator’s computer, processing documents in over 200 languages to identify entities, and locations in unstructured documents. Learn more about the partnership at www.adfsolutions.com/partner/rosoka

2019 IACP Technology Conference
This week, nearly 1,000 law enforcement professionals from across the United States and around the world are meeting in Jacksonville, Florida for to discuss and discover new technologies designed to promote public safety, police safety and policing techniques.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

Digital Forensics: On-Scene in Texas
Join ADF Digital Forensic Specialist, Rich Frawley as he presents "On-Scene Digital Investigation Best Practices: From Search Warrant to Court Ready Paperwork" at the Techno Security & Digital Forensics conference in San Antonio, Texas. The Techno event is a follow up to the top rated Techno Security & Digital Forensics Myrtle Beach event earlier this year where ADF was a Gold Sponsor.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (132)
- Law Enforcement (89)
- Digital Evidence Investigator (85)
- How To Video (68)
- Mobile Device Investigator (63)
- Computer Forensics (58)
- Triage-Investigator (56)
- Triage-G2 (55)
- DEI PRO (53)
- United States (53)
- Crimes Against Children (49)
- Digital Evidence (49)
- ICAC Task Force (45)
- Forensic Triage (42)
- Triage (42)
- Mobile Forensics (41)
- Triage-G2 PRO (41)
- Triage-Investigator PRO (40)
- Mobile Device Forensics (37)
- Child Exploitation (36)
- Cyber Crime (36)
- Forensic Analysis (29)
- ICAC (29)
- Project Vic (29)
- DEI PRO Field Tablet (26)
- Law Enforcement Conferences (26)
- Cyber Forensics (24)
- AllinForensics (23)
- CSAM (23)
- iOS Forensics (23)
- Human Trafficking (22)
- Android Forensics (21)
- United Kingdom (21)
- CAID (20)
- Forensic Software (19)
- Forensic Training (18)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Military (17)
- Custom Search Profiles (16)
- Field Forensics (16)
- Police (16)
- Apple Mac Forensics (15)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Computer Forensic Lab (11)
- Counter Terrorism (10)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- RAM Capture (10)
- technology (10)
- Computer Triage (9)
- Cryptocurrency Forensics (9)
- DOMEX (9)
- Digital Devices (9)
- IIOC (9)
- Photo Forensics (9)
- Prosecutors (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- mobile device (7)
- ADF Authorized Partner (6)
- Artificial Intelligence (6)
- Classifier (6)
- DFIR (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cyber Security (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- iOS (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- District Attorney (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Dark Web (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- PhotoDNA (2)
- Technology Partner (2)
- Video Forensics (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)