Investigators face the daunting task of analyzing vast amounts of digital data to uncover critical evidence. Customizable search profiles are a game-changer in the field of digital forensics. By allowing investigators to fine-tune their search criteria and focus on the most relevant data.
Digital Forensic News & Events


How to Review Mobile Forensics Evidence
Data analysis can quickly become overwhelming without proper organization tools. Extracting, analyzing, and reporting on this data efficiently is of paramount importance to investigators.
Mobile Device Investigator (MDI), the analysis section of Mobile Device Investigator, is an invaluable asset for digital forensics professionals.

How to Preview Evidence on a Mobile Device
As smartphones continue to play an ever-increasing role in our lives, law enforcement, and digital forensics professionals are faced with the challenge of efficiently extracting and processing information from these devices. This is where Mobile Device Investigator (MDI) comes into play with Preview Mode, a cutting-edge feature available for iOS and Android devices.

How to Screenshot Mobile Evidence
Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots, investigators can secure valuable information present on the device, ensuring it is not lost or altered.

How to Acquire Evidence on a Mobile Device with Mobile Device Investigator
The ability to extract crucial data from Android and iOS devices efficiently is paramount. As the usage of smartphones continues to soar, investigators and analysts require reliable tools to acquire and preserve data for examination.

How to Scan a Mobile Device with Mobile Device Investigator
In today's digital age, mobile devices have become an integral part of our lives. They store a wealth of personal information, making them an attractive target for malicious actors. Whether you're an investigator, a digital forensics expert, or simply concerned about the security of your own device, being able to scan and analyze mobile devices is crucial. That's where Mobile Device Investigator (MDI) comes in. In this blog post, we'll guide you through scanning a mobile device using MDI.

Proving iOS 16 Investigation: 6 Tips with Recordings and Screenshots
Mobile devices often contain crucial evidence related to criminal activities. Mobile forensics helps extract and analyze data from smartphones, tablets, and other mobile devices to uncover evidence that can be used in criminal investigations. This includes text messages, call logs, photos, videos, location information, social media activity, and more. This information may identify individuals involved in illegal activities, track their communications, understand their network of contacts, and gather intelligence on potential threats to national security.

ADF Solutions Joins the Grayshift Technology Alliances Program
Grayshift has announced that ADF Solutions is a Certified member of Grayshift's Technology Alliances Program, a digital forensics ecosystem that facilitates open, multi-vendor integration and certifications to improve the effectiveness of digital investigations tools. The program ensures that partner tools:
- Fully and accurately parse GrayKey extractions
- Improve cross-product workflows
- Explore integrations aimed at accelerating investigations
The partnership between ADF Solutions and GrayShift is designed to give law enforcement agencies confidence that they can expect accuracy in ingesting and displaying data from GrayKey extractions to speed investigations.

Keeping Up to Date With Digital Evidence Investigator PRO
When investigating computer crimes and being called on to conduct computer forensics or forensic phone analysis in the field, it is good to be ready for whatever comes your way. One phrase you commonly hear when talking to anyone in the cybercrime arena is “there has to be more than one tool in the toolbox”, and this is a very true statement, no one tool does it all, and all tools do it slightly differently. You do not use a large Phillips screwdriver to remove a small screw from a picture frame and you do not use an eyeglass screwdriver to remove a wood screw, this is because you know your tools and your toolbox.

Archiving Phone Backups
With any of the ADF Mobile products, if you are using the default settings, the mobile backups are being saved to the local drive. The mobile backups can be quite large and quickly fill up your drive leaving you no storage space.
Let’s take a look at how to archive your mobile backups with or without the corresponding scan results.

Preview and Collect Digital Evidence with Mobile Device Investigator
With an ever-increasing number of adults owning a smartphone, it is no wonder that more and more crimes now commonly require mobile device evidence collection and analysis. The need for digital forensics tools is increasing around the world. The ultimate field forensics for the front line solution for police, sheriffs, school resource officers, field agents, and investigators. Connect a suspect device via a USB port to quickly collect evidence and perform an advanced logical acquisition (multi-protocol data transfer).

Find Anti-Forensic and Dark Web Traces with ADF Triage Software
Within ADF software and forensic triage products, including Digital Evidence Investigator, Triage-Investigator, or Triage-G2, an investigator can quickly find Dark Web traces. This can be done in Quick Profiles but in this video, Rich Frawley shows how to use an Intermediate Profile to triage a suspect machine to identify Dark Web traces. These can be found in ADF's Anti-Forensic Traces Capture.

How to Have a Digital Forensic Triage Process that Works Field to Lab
In this 3-minute "How To" video, you'll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.

The Best Smartphone Triage: Field or Lab
Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices.

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Get Android and iOS Evidence Fast!
Do you need to acquire digital evidence from an iPhone, Android or tablet device quickly?

Dropbox Forensics for iOS Cloud Storage Capture (UPDATED IN 2022)
As an investigator you want to be prepared to quickly collect evidence on-scene. This means, when performing smartphone forensics, you need to have the best tools to capture the evidence you encounter during your triage, including cloud storage such as Dropbox for iOS.

Mobile Preview Forensic Triage & ADF New Features (UPDATED IN 2022)
At ADF, we are mission driven. We are delighted to serve those who serve and some of our most exciting times are when we are adding new features and capabilities, when we learn how they are being used, and of course, on launch days. We hope you'll love what we've created.

Quick Kik Messenger Forensics for iOS and Android (UPDATED September 2022)
Kik, also known as Kik Messenger, runs on Android, iOS, and Windows operating systems and is a free app used by more than 200 million people worldwide to send and receive messages that can include photos and videos as well as other content. Kik is popular with children as young as 13 as well as young adults. Because of its popularity with children, the Kik app has become a magnet for child exploitation.

Best Mobile Device Investigator Settings for Evidence Collection (UPDATED September 2022)
In this short digital forensic How To video, Digital Forensic Specialist, Rich Frawley, walks you through the best settings for Mobile Device Investigator®. Learn how to choose the best Search Profile Capture selection and how to decipher which captures will get you the information you need for your investigation with our mobile phone forensic software.

How to Create Search Profiles with Mobile Device Investigator
Mobile Device Investigator (MDI) is the leading digital forensic triage tool for iOS and Android devices. In this short "How To" video, ADF's digital forensic specialist and trainer, Rich Frawley, will show you how to create a Search Profile with MDI.

How to Create a Forensic Backup of an Android Device with MDI
Learn how to create a forensic backup of an Android smartphone or tablet with Mobile Device Investigator™ in this short How To video from ADF's Digital Forensic Specialist, Rich Frawley.

How to Create a Forensic Backup of an iOS Device with MDI
Learn how to create a forensic backup of an iOS smartphone or tablet with Mobile Device Investigator™ in this short How To video from ADF's Digital Forensic Specialist, Rich Frawley.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Posts by Tag
- Digital Forensics (165)
- Digital Evidence Investigator (93)
- Law Enforcement (91)
- Mobile Device Investigator (77)
- Computer Forensics (73)
- How To Video (70)
- DEI PRO (69)
- Digital Evidence (64)
- Mobile Forensics (59)
- Crimes Against Children (57)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (52)
- Mobile Device Forensics (50)
- ICAC Task Force (48)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Child Exploitation (42)
- Triage (42)
- Triage-Investigator PRO (40)
- Cyber Crime (39)
- ICAC (33)
- Human Trafficking (31)
- DEI PRO Field Tablet (30)
- Forensic Analysis (29)
- Project Vic (29)
- iOS Forensics (29)
- CSAM (28)
- Cyber Forensics (28)
- Law Enforcement Conferences (28)
- Android Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- United Kingdom (24)
- Forensic Training (22)
- CAID (20)
- Military (20)
- Internet Investigation (19)
- Police (19)
- Apple Mac Forensics (17)
- Field Forensics (17)
- Mobile Forensics Video (17)
- Custom Search Profiles (16)
- Digital Media Investigator (16)
- Financial Crime (16)
- High Tech Crime (16)
- Military Police (16)
- Canada (14)
- Computer Forensic Lab (13)
- Search Profiles (13)
- Sheriff (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Photo Forensics (12)
- Cryptocurrency Forensics (11)
- Cybersecurity (11)
- Digital Devices (11)
- mobile device (11)
- ADF Authorized Partner (10)
- Artificial Intelligence (10)
- Culture Code (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- Cloud Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Machine Learning (4)
- Press Release (4)
- Probation (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Africa (3)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Virtual Reality (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Thailand (1)
- Vehicle Forensics (1)
- Wildlife Trafficking (1)