Triage- the word is normally associated with hospitals, where doctors and nurses prioritize patients’ treatments based on the severity of their condition. The concept has been around since the Napoleonic wars and is responsible for saving innumerable lives ever since.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


How to Start an Android Forensic Scan with MDI
As you get started performing an advanced logical forensic acquisition of an Android device with Mobile Device Investigator®, you will want to learn how to attach an Android device to your forensic computer. This short video will show you how you can quickly and easily collect digital evidence from Android mobile phones and tablets.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

macOS Mojave Forensics
The best tools for rapid digital forensic investigations just got better with ADF's release of new software versions to support the collection of artifacts with Mac OS Mojave Forensics and MacOS High Sierra as well as from Windows.

HTCIA Conference Highlights
This week, hundreds of leading law enforcement officials from the US, Canada and Europe descended on the Omni Shoreham Hotel in Washington, DC to participate in the High Technology Crime Investigation Association's annual law enforcement conference. The event featured 72 speakers over the three days of sessions and training and was kicked off with an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police.
Other notable speakers included representatives from:
- The National White Collar Crime Center (NW3C)
- Ohio Division of State Fire Marshal - Forensic Lab
- Naval Criminal Investigative Service
- New Jersey Office of the Attorney General
- Virginia Department of Forensic Science
- Portland Police Bureau

Attend HTCIA Pre-Conference Training
Attend HTCIA Pre-conference Training in Washington, DC on August 19th where we will be hosting two hands-on lab sessions for digital investigators. Conference attendees arriving early can register to attend one of two sessions:
- Directly Scanning a Suspect's Computer or Devices
- Child Exploitation Investigations Done in Record Time
The High Technology Crime Investigation Association's International Conference (HTCIA) & Training Expo is one of the oldest and most respected technology investigation and law enforcement conferences in the world. This year, the event will be held in Washington, DC at the historic Omni Shoreham Hotel and will feature an opening keynote from Chief Superintendent Jeff Adam, C/Supt. DG Technical Investigation Services for the Royal Canadian Mounted Police (RMCP).
Conference sessions include a variety of topics including:
Get Your News (once a month)
Posts by Tag
- Digital Forensics (104)
- Law Enforcement (75)
- Digital Evidence Investigator (71)
- How To Video (57)
- Mobile Device Investigator (55)
- Triage-Investigator (49)
- Triage-G2 (48)
- United States (48)
- DEI PRO (43)
- Computer Forensics (40)
- Crimes Against Children (38)
- ICAC Task Force (38)
- Digital Evidence (37)
- Triage (36)
- Forensic Triage (35)
- Triage-G2 PRO (32)
- Triage-Investigator PRO (31)
- Mobile Device Forensics (29)
- Mobile Forensics (29)
- Cyber Crime (27)
- Project Vic (27)
- Child Exploitation (26)
- Forensic Analysis (26)
- ICAC (23)
- iOS Forensics (22)
- AllinForensics (21)
- Android Forensics (19)
- Law Enforcement Conferences (19)
- CAID (18)
- DEI PRO Field Tablet (18)
- United Kingdom (18)
- CSAM (16)
- Cyber Forensics (16)
- Military (16)
- Forensic Software (15)
- High Tech Crime (14)
- Police (14)
- Field Forensics (13)
- Human Trafficking (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Military Police (12)
- Mobile Triage Kits (12)
- Sheriff (12)
- Canada (11)
- Internet Investigation (11)
- Culture Code (10)
- Early Case Assessment (10)
- Forensic Training (10)
- RAM Capture (10)
- Search Profiles (10)
- IIOC (9)
- Site Exploitation (9)
- technology (9)
- Computer Forensic Lab (8)
- Counter Terrorism (8)
- DOMEX (8)
- Hash Sets (8)
- MDI Field Tablet (8)
- forensics (8)
- Apple Mac Forensics (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Photo Forensics (7)
- Project VIC UK (7)
- Prosecutors (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- Griffeye (6)
- Identity Operations (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Artificial Intelligence (3)
- Certified Forensic Computer Examiner (3)
- Forensic Lab Solutions (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Data Analytics (2)
- Detective (2)
- Drone Forensics (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Machine Learning (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)