In order for your digital evidence to be used in a court of law you should take care in your evidence collection procedures from digital devices. Best practices for collection are designed to help you maintain the integrity of evidence. Individual agencies may have their own policies and procedures in place but overall general practices may be similar.
Digital Forensic News & Events


How to Preserve Digital Evidence: The Importance of Data Collection
The preservation of digital evidence begins at the crime scene. It is imperative for all parties involved including forensic investigators to take active measures in the preservation and collection of digital evidence. Not only are computer data and digital evidence fragile, but forensic investigators must also consider laws when seizing and accessing electronic devices and the evidence stored in them.

Phones, Drones, and Automobiles: Cross-Platform Digital Forensics
Getting the "big picture" of a case is challenging when digital forensic data is spread across different disparate evidence types or a large of media sources. Experts from several leading forensic companies shared best practices for collecting, analyzing, and reporting on evidence from multiple mobile phones, a drone, and several vehicles used in a fictional homicide investigation related to suspected fentanyl trafficking. The speakers were:

The Need for Digital Forensics Tools for Financial Crimes
As the world’s financial systems advance in digital technology and cryptocurrency, the need for digital forensics grows greater. The use of blockchain technology has allowed crimes to go undetected through the eyes of a regular investigator. These crimes no longer take months of in-depth planning and deception before executing but can now be committed within minutes because of the processing power of computers and the speed of the internet. Crimes such as:

Remove an iTunes Password set in ADF Digital Forensics Tools
The Encrypt backup feature in iTunes locks and encodes your information. In this short How To video, Director of Training, Rich Frawley shows investigators how to remove the known iTunes backup password, if required.

ADF as an Innovator in Digital Forensic Software
Triage- the word is normally associated with hospitals, where doctors and nurses prioritize patients’ treatments based on the severity of their condition. The concept has been around since the Napoleonic wars and is responsible for saving innumerable lives ever since.

How to Start an Android Forensic Scan with MDI
As you get started performing an advanced logical forensic acquisition of an Android device with Mobile Device Investigator®, you will want to learn how to attach an Android device to your forensic computer. This short video will show you how you can quickly and easily collect digital evidence from Android mobile phones and tablets.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

macOS Mojave Forensics
The best tools for rapid Mac forensics investigations just got better with ADF's release of new software versions to support the collection of artifacts with Mac OS Mojave Forensics and MacOS High Sierra as well as from Windows.

HTCIA Conference Highlights
This week, hundreds of leading law enforcement officials from the US, Canada and Europe descended on the Omni Shoreham Hotel in Washington, DC to participate in the High Technology Crime Investigation Association's annual law enforcement conference. The event featured 72 speakers over the three days of sessions and training and was kicked off with an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police.
Other notable speakers included representatives from:
- The National White Collar Crime Center (NW3C)
- Ohio Division of State Fire Marshal - Forensic Lab
- Naval Criminal Investigative Service
- New Jersey Office of the Attorney General
- Virginia Department of Forensic Science
- Portland Police Bureau

Attend HTCIA Pre-Conference Training
Attend HTCIA Pre-conference Training in Washington, DC on August 19th where we will be hosting two hands-on lab sessions for digital investigators. Conference attendees arriving early can register to attend one of two sessions:
- Directly Scanning a Suspect's Computer or Devices
- Child Exploitation Investigations Done in Record Time
The High Technology Crime Investigation Association's International Conference (HTCIA) & Training Expo is one of the oldest and most respected technology investigation and law enforcement conferences in the world. This year, the event will be held in Washington, DC at the historic Omni Shoreham Hotel and will feature an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police (RMCP).
Conference sessions include a variety of topics including:
Posts by Tag
- Digital Forensics (165)
- Digital Evidence Investigator (93)
- Law Enforcement (91)
- Mobile Device Investigator (77)
- Computer Forensics (73)
- How To Video (70)
- DEI PRO (69)
- Digital Evidence (64)
- Mobile Forensics (59)
- Crimes Against Children (57)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (52)
- Mobile Device Forensics (50)
- ICAC Task Force (48)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Child Exploitation (42)
- Triage (42)
- Triage-Investigator PRO (40)
- Cyber Crime (39)
- ICAC (33)
- Human Trafficking (31)
- DEI PRO Field Tablet (30)
- Forensic Analysis (29)
- Project Vic (29)
- iOS Forensics (29)
- CSAM (28)
- Cyber Forensics (28)
- Law Enforcement Conferences (28)
- Android Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- United Kingdom (24)
- Forensic Training (22)
- CAID (20)
- Military (20)
- Internet Investigation (19)
- Police (19)
- Apple Mac Forensics (17)
- Field Forensics (17)
- Mobile Forensics Video (17)
- Custom Search Profiles (16)
- Digital Media Investigator (16)
- Financial Crime (16)
- High Tech Crime (16)
- Military Police (16)
- Canada (14)
- Computer Forensic Lab (13)
- Search Profiles (13)
- Sheriff (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Photo Forensics (12)
- Cryptocurrency Forensics (11)
- Cybersecurity (11)
- Digital Devices (11)
- mobile device (11)
- ADF Authorized Partner (10)
- Artificial Intelligence (10)
- Culture Code (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- Cloud Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Machine Learning (4)
- Press Release (4)
- Probation (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Africa (3)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Virtual Reality (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Thailand (1)
- Vehicle Forensics (1)
- Wildlife Trafficking (1)