When conducting digital forensic investigations that involve live (up and running) computers, it is imperative to collect volatile memory so that all your bases covered and so that no vital evidence is lost. A live analysis conducted in the correct manner will yield the results you are looking for in your investigation. It has become commonplace and an accepted practice to collect data from a live computer, especially in cases of child exploitation. ADF software makes it easy for detectives and investigators to perform a RAM capture in the proper manner with as little intrusion as possible.
Digital Forensic News & Events


ADF Releases Digital Forensic Software to Power Field Investigations
Investigate on-scene with a single license for smartphones, tablets, and computers

Create an iOS Forensic Backup with DEI PRO
Digital Evidence Investigator PRO enables front-line field investigators to quickly create an iOS forensic backup of an iOS mobile device on-scene or back in the lab. In this short video, ADF Digital Forensic Training Manager, Rich Frawley, will show you how to easily backup an iOS device with DEI PRO.

Learn to Create an Android Forensic Backup with DEI PRO
Digital Evidence Investigator PRO enables front line field investigators to quickly create a forensic backup of an Android device on-scene or back in the lab. In this short video, ADF Digital Forensic Specialist, Rich Frawley, will show you how to easily backup an Android device with DEI PRO.

Digital Forensic Image Recognition and Classification
Front line investigators and digital forensic examiners are encountering an ever increasing number of images in almost every investigation they perform. This exponential growth in the volume of images can challenge investigators searching for illicit online activity, Child Sexual Abuse Material (CSAM), extremist propaganda, or other types of image content.
In this short video, ADF digital forensic specialist, Rich Frawley, demonstrates ADF's digital forensic image recognition and classification capabilities.

How to Scan a non OS Drive or Partition
When making decisions on scene it is critically important for an investigator to scan and analyze the Operating System Drive or Partition, or what is commonly referred to as the C:\ drive. ADF digital forensic software tools give investigators out-of-the-box Search Profiles designed to quickly scan and analyze OS partitions with targeted paths that would not be present on a non OS partition.
If you come across a non OS drive or partition, a storage partition, or external storage drive, instead of using the built-in Comprehensive Search Profiles, you can create a Custom Search Profile for non operating system drives using Digital Evidence Investigator®.

Collecting Files by Targeted Folders to Speed a Forensic Investigation
Digital Evidence Investigator® gives investigators the ability to customize Search Profiles and determine exactly what and where you want to look for digital evidence. This is especially convenient when looking to tailor a search for a forensic triage type scan or a targeted collection. This is accomplished by using the Targeted Folders Option when creating a custom file capture.

New Mobile Device Investigator® iOS and Android Smartphones
ADF Solutions’ New Software Delivers Forensic Capabilities to Police and Investigators
Bethesda, Maryland: ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the release of Mobile Device Investigator® the newest forensic software to investigate iOS and Android devices. Qualified professionals can request a free trial of Mobile Device Investigator™ at www.tryadf.com.

How to Add a Custom File Type to an ADF Search Profile
When conducting an investigation, it is important to be flexible and follow the direction of your investigation with as few obstacles as possible. If your examination brings you a new file type, such as a video generated by a hand held camera, or a proprietary file created by a unique software, you want to be able to search for, or collect these files types right away either on-scene or back in the lab.

Using Forensic Triage for Early Case Assessment
When you're faced with a mountain of digital evidence, how do you start sifting through it? For law enforcement, litigation support, and incident response agencies organizing and prioritizing digital media and electronically stored information (ESI) is crucial.
Adopting an Early Case Assessment (ECA) methodology helps expedite and improve overall case efficiency and productivity; reducing backlogs and increasing turnaround times.
Posts by Tag
- Digital Forensics (167)
- Digital Evidence Investigator (95)
- Law Enforcement (93)
- Mobile Device Investigator (79)
- Computer Forensics (75)
- DEI PRO (72)
- How To Video (70)
- Digital Evidence (66)
- Mobile Forensics (63)
- Crimes Against Children (59)
- Triage-Investigator (57)
- Triage-G2 (56)
- Mobile Device Forensics (55)
- United States (54)
- ICAC Task Force (49)
- Child Exploitation (44)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Triage (42)
- Cyber Crime (41)
- Triage-Investigator PRO (40)
- ICAC (34)
- CSAM (32)
- Human Trafficking (32)
- DEI PRO Field Tablet (31)
- iOS Forensics (31)
- Law Enforcement Conferences (30)
- Project Vic (30)
- Cyber Forensics (29)
- Forensic Analysis (29)
- Android Forensics (28)
- Knowledge Base Video (26)
- United Kingdom (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- Forensic Training (22)
- CAID (21)
- Military (21)
- Police (20)
- Internet Investigation (19)
- Apple Mac Forensics (17)
- Custom Search Profiles (17)
- Field Forensics (17)
- High Tech Crime (17)
- Military Police (17)
- Mobile Forensics Video (17)
- Digital Media Investigator (16)
- Financial Crime (16)
- Canada (15)
- ADF Authorized Partner (14)
- Sheriff (14)
- Artificial Intelligence (13)
- Computer Forensic Lab (13)
- Prosecutors (13)
- Search Profiles (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Cybersecurity (12)
- Digital Devices (12)
- Photo Forensics (12)
- mobile device (12)
- Cryptocurrency Forensics (11)
- technology (11)
- Culture Code (10)
- Early Case Assessment (10)
- IIOC (10)
- RAM Capture (10)
- iOS (10)
- DOMEX (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Cloud Forensics (7)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Griffeye (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Machine Learning (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- Africa (4)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Press Release (4)
- Probation (4)
- Product Release (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Facial Analytics (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Screen Recording (2)
- Screen Shots (2)
- Sex Offender Management (2)
- Social Media Discovery (2)
- Technology Partner (2)
- Thailand (2)
- Virtual Reality (2)
- Wildlife Trafficking (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- eDiscovery (1)