Digital forensic software developers need to keep up with new advancements. Investigators need digital forensic tools to keep up with current and future technology. Forensic investigators face the challenge of evolving threats and increasing data volumes.
Digital Forensic News & Events


Cybercrime: What It Is and How To Stay Safe
The development of new technology has changed the ways information is disseminated and accessed. It has allowed individuals to access a variety of information within minutes. Although, with this growing use and dependence on technology the tactics used in cybercrime have evolved to effectively infiltrate these ever-changing systems. Maintaining the knowledge and tools needed to counteract these cybercrime attempts has become paramount. Any user that is dependent on technological gadgets and software can be at risk of cybercrime. In this post, we will discuss what exactly is cybercrime and how to stay safe.

ADF Supported Web Browsers ft. Chromium Based Browsers
This post will list all supported web browsers that ADF tools can investigate including Chromium-based browsers. As a digital investigator, you want to be prepared and ready for anything on-scene and that includes being able to collect digital evidence from mobile and computer devices.

May the 4th be with you
A long, long time ago in a galaxy far far away
(2006 to be exact and the galaxy was Maryland USA)
It was a period of innovation.
Computers, USBs, all kinds of devices ...
Some people were committing digital crimes
from their seemingly hidden bases in the digital world.

Keeping Up to Date With Digital Evidence Investigator PRO
When investigating computer crimes and being called on to conduct computer forensics or forensic phone analysis in the field, it is good to be ready for whatever comes your way. One phrase you commonly hear when talking to anyone in the cybercrime arena is “there has to be more than one tool in the toolbox”, and this is a very true statement, no one tool does it all, and all tools do it slightly differently. You do not use a large Phillips screwdriver to remove a small screw from a picture frame and you do not use an eyeglass screwdriver to remove a wood screw, this is because you know your tools and your toolbox.

Learn Computer Forensics: Collect Saved Web Credentials in the Field
ADF's Quick-Saved Credentials profile is a powerful profile that extracts the usernames and passwords from Web Browsers and is built so it will not trigger antivirus applications when attempting to collect web credentials. This makes the investigator's job easier on-scene, requires less interaction with the device, and allows for more records to be parsed thereby giving the computer forensic investigator the ability to quickly collect critical information for their investigation.
Learn how to use the ADF Quick Saved Credentials Profile to uncover Web credentials in this short 2-minute video tutorial. Collecting saved credentials quickly gives access to accounts that may have been previously unknown and allows investigators to do preservation orders and search warrants.

Meet NCPTF's Teresa Jauregui: Bringing Awareness to Human Trafficking
Meet Teresa Jauregui, Legal Director, for the National Child Protection Task Force, NCPTF.

ICAC Investigations with ADF Tools
Investigating crimes against children has been at the forefront of law enforcement’s initiatives to dedicate the specialized manpower and equipment in order to battle this issue. It is not an easy issue to tackle as it manifests in many different ways and sometimes requires three or more specialized units working together to bring the offenders to justice and then another specialized unit to manage the offenders after release. On top of all the investigation time, we add digital devices to the mix, used to commit and perpetrate these crimes. When it comes time to conduct a search warrant, knock and talk, interview, or victim/witness statement, investigators need a solution to find the relevant data, minimize the number of devices brought back to the lab, minimize the impact to victims, witnesses, and innocent family members.

The Need for Digital Forensics Tools for Financial Crimes
As the world’s financial systems advance in digital technology and cryptocurrency, the need for digital forensics grows greater. The use of blockchain technology has allowed crimes to go undetected through the eyes of a regular investigator. These crimes no longer take months of in-depth planning and deception before executing but can now be committed within minutes because of the processing power of computers and the speed of the internet. Crimes such as:

What is NW3C? (UPDATED JULY 2022)
NW3C stands for the National White Collar Crime Center, an organization that is committed to helping educate law enforcement professionals on a variety of relevant topics. The organization based in Richmond, Virginia has over 70,000 members worldwide and was founded in 1987.

Prepare Evidence Collection Keys for a Digital Forensic Investigation (Updated in 2022)
Getting ready to work off site, out of the lab, out of your office, and in someone else's domain is never an easy task. Whether it's a search warrant, in a client's office, suspect's residence, or some other off-site location, being prepared is the key to your success as a digital forensic investigator.

Entity Extraction, Keywords and Classification of Images and Videos (UPDATED JULY 2022)
ADF prioritizes digital evidence collection and provides investigators and examiners post-scan options to speed investigations. Post scan options let digital forensic investigators get fast and relevant evidence to make decisions on-scene and in the forensic lab.

The END Network Abuse Act and the Fight Against Child Exploitation
The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it’s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and videos, and identified over 15,800 victims of online child exploitation and abuse.

OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

2019 IACP Technology Conference
This week, nearly 1,000 law enforcement professionals from across the United States and around the world are meeting in Jacksonville, Florida for to discuss and discover new technologies designed to promote public safety, police safety and policing techniques.

What is an ICAC Task Force?
Most children in the United States now have access to internet services. The internet enables children to have access to vast amounts of valuable and educative information that facilitates their growth. However, the internet further exposes children to numerous dangers. Some of the risks children are exposed to on the internet include pornography, racist, sexist, violent, and demeaning information.
These risks prompted the formation of the Internet Crimes Against Children (ICAC) Task Force program. The organization is a national network of 61 coordinated task forces that represent over 4,500 local, state, and federal law enforcement and prosecutorial agencies. The state and regional ICAC task forces are maintained and expanded by the ICAC program to address technology-facilitated child exploitation crimes.

The Origin of Digital Forensic Triage
In the early 18th century, triage was used to refer to the action of sorting items according to quality and was taken from the French word trier which means to sort, separate out or cull.
>> Continue reading or watch the Benefits of Triage webinar recording.

2019 National Cybercrime Conference
The Massachusetts Attorney General's Office (AGO) has announced the dates for the 2019 National Cyber Crime Conference (MASS.gov). This year's conference will be held April 29 - May 1, 2019 in Norwood, Massachusetts thanks to Attorney General Maura Healey, the National White Collar Crime Center (NW3C), SEARCH, and the National Attorneys General Training and Research Institute.

Digital Forensic Search Profiles
With more than a dozen out-of-the-box Search Profiles inside Digital Evidence Investigator® (DEI) and all the ADF digital forensic and triage tools, the ADF Digital Forensic team has created software that enables investigators and forensic examiners to capture files, artifacts, and the digital evidence needed in a wide variety of evidence collection situations.
Posts by Tag
- Digital Forensics (167)
- Digital Evidence Investigator (95)
- Law Enforcement (94)
- Mobile Device Investigator (79)
- Computer Forensics (75)
- DEI PRO (72)
- How To Video (70)
- Digital Evidence (66)
- Mobile Forensics (63)
- Crimes Against Children (60)
- Triage-Investigator (57)
- Triage-G2 (56)
- Mobile Device Forensics (55)
- United States (54)
- ICAC Task Force (49)
- Child Exploitation (45)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Triage (42)
- Cyber Crime (41)
- Triage-Investigator PRO (40)
- ICAC (34)
- CSAM (33)
- Human Trafficking (32)
- DEI PRO Field Tablet (31)
- iOS Forensics (31)
- Law Enforcement Conferences (30)
- Project Vic (30)
- Cyber Forensics (29)
- Forensic Analysis (29)
- Android Forensics (28)
- Knowledge Base Video (26)
- United Kingdom (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- Forensic Training (22)
- CAID (21)
- Military (21)
- Police (20)
- Internet Investigation (19)
- Apple Mac Forensics (17)
- Custom Search Profiles (17)
- Field Forensics (17)
- High Tech Crime (17)
- Military Police (17)
- Mobile Forensics Video (17)
- Digital Media Investigator (16)
- Financial Crime (16)
- Canada (15)
- ADF Authorized Partner (14)
- Sheriff (14)
- Artificial Intelligence (13)
- Computer Forensic Lab (13)
- Prosecutors (13)
- Search Profiles (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Cybersecurity (12)
- Digital Devices (12)
- Photo Forensics (12)
- mobile device (12)
- Cryptocurrency Forensics (11)
- technology (11)
- Culture Code (10)
- Early Case Assessment (10)
- IIOC (10)
- RAM Capture (10)
- iOS (10)
- DOMEX (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Cloud Forensics (7)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Griffeye (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Machine Learning (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- Africa (4)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Press Release (4)
- Probation (4)
- Product Release (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Facial Analytics (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Screen Recording (2)
- Screen Shots (2)
- Sex Offender Management (2)
- Social Media Discovery (2)
- Technology Partner (2)
- Thailand (2)
- Virtual Reality (2)
- Wildlife Trafficking (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- eDiscovery (1)