Triage- the word is normally associated with hospitals, where doctors and nurses prioritize patients’ treatments based on the severity of their condition. The concept has been around since the Napoleonic wars and is responsible for saving innumerable lives ever since.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


How to Start an Android Forensic Scan with MDI
As you get started performing an advanced logical forensic acquisition of an Android device with Mobile Device Investigator®, you will want to learn how to attach an Android device to your forensic computer. This short video will show you how you can quickly and easily collect digital evidence from Android mobile phones and tablets.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

macOS Mojave Forensics
The best tools for rapid digital forensic investigations just got better with ADF's release of new software versions to support the collection of artifacts with Mac OS Mojave Forensics and MacOS High Sierra as well as from Windows.

HTCIA Conference Highlights
This week, hundreds of leading law enforcement officials from the US, Canada and Europe descended on the Omni Shoreham Hotel in Washington, DC to participate in the High Technology Crime Investigation Association's annual law enforcement conference. The event featured 72 speakers over the three days of sessions and training and was kicked off with an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police.
Other notable speakers included representatives from:
- The National White Collar Crime Center (NW3C)
- Ohio Division of State Fire Marshal - Forensic Lab
- Naval Criminal Investigative Service
- New Jersey Office of the Attorney General
- Virginia Department of Forensic Science
- Portland Police Bureau

Attend HTCIA Pre-Conference Training
Attend HTCIA Pre-conference Training in Washington, DC on August 19th where we will be hosting two hands-on lab sessions for digital investigators. Conference attendees arriving early can register to attend one of two sessions:
- Directly Scanning a Suspect's Computer or Devices
- Child Exploitation Investigations Done in Record Time
The High Technology Crime Investigation Association's International Conference (HTCIA) & Training Expo is one of the oldest and most respected technology investigation and law enforcement conferences in the world. This year, the event will be held in Washington, DC at the historic Omni Shoreham Hotel and will feature an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police (RMCP).
Conference sessions include a variety of topics including:
Get Your News (once a month)
Posts by Tag
- Digital Forensics (102)
- Law Enforcement (73)
- Digital Evidence Investigator (71)
- How To Video (56)
- Mobile Device Investigator (52)
- Triage-Investigator (48)
- United States (48)
- Triage-G2 (47)
- DEI PRO (40)
- Computer Forensics (38)
- Crimes Against Children (36)
- Digital Evidence (36)
- ICAC Task Force (36)
- Triage (33)
- Forensic Triage (32)
- Triage-G2 PRO (30)
- Triage-Investigator PRO (29)
- Mobile Forensics (27)
- Project Vic (27)
- Cyber Crime (26)
- Mobile Device Forensics (26)
- Forensic Analysis (25)
- Child Exploitation (23)
- ICAC (22)
- AllinForensics (21)
- iOS Forensics (20)
- Law Enforcement Conferences (19)
- CAID (18)
- United Kingdom (18)
- Android Forensics (17)
- Cyber Forensics (16)
- DEI PRO Field Tablet (15)
- Forensic Software (15)
- Military (15)
- CSAM (14)
- Police (14)
- High Tech Crime (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Field Forensics (12)
- Sheriff (12)
- Canada (11)
- Human Trafficking (11)
- Internet Investigation (11)
- Military Police (11)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- Search Profiles (10)
- Forensic Training (9)
- IIOC (9)
- Mobile Triage Kits (9)
- Site Exploitation (9)
- technology (9)
- Counter Terrorism (8)
- DOMEX (8)
- Apple Mac Forensics (7)
- Computer Forensic Lab (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Hash Sets (7)
- Project VIC UK (7)
- Prosecutors (7)
- forensics (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- MDI Field Tablet (6)
- Photo Forensics (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- Griffeye (5)
- IPOC (5)
- Identity Operations (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Certified Forensic Computer Examiner (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Artificial Intelligence (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Detective (2)
- Drone Forensics (2)
- Forensic Lab Solutions (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Analytics (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Machine Learning (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)