As an investigator you want to be prepared to quickly collect evidence on-scene. This means, when performing smartphone forensics, you need to have the best tools to capture the evidence you encounter during your triage, including cloud storage such as Dropbox for iOS.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Mobile Preview Forensic Triage & ADF New Features
At ADF, we are mission driven. We are delighted to serve those who serve and some of our most exciting times are when we are adding new features and capabilities, when we learn how they are being used, and of course, on launch days. We hope you'll love what we've created.

Quick Kik Messenger Forensics for iOS and Android
Kik, also known as Kik Messenger, runs on Android, iOs and Windows operating systems and is a free app used by more than 200 million people worldwide to send and receive messages that can include photos and videos as well as other content. Kik is popular with children as young as 13 as well as young adults. Because of its popularity with children, the Kik app has become a magnet for child exploitation.

Best Mobile Device Investigator Settings for Evidence Collection
In this short digital forensic How To video, Digital Forensic Specialist, Rich Frawley, walks you through the best settings for Mobile Device Investigator®. Learn how to choose the best Search Profile Capture selection and how to decipher which captures will get you the information you need for your investigation with our mobile phone forensic software.

How to Create Search Profiles with Mobile Device Investigator
Mobile Device Investigator (MDI) is the leading digital forensic triage tool for iOS and Android devices. In this short "How To" video, ADF's digital forensic specialist and trainer, Rich Frawley, will show you how to create a Search Profile with MDI.

How to Create a Forensic Backup of an Android Device with MDI
Learn how to create a forensic backup of an Android smartphone or tablet with Mobile Device Investigator™ in this short How To video from ADF's Digital Forensic Specialist, Rich Frawley.

How to Create a Forensic Backup of an iOS Device with MDI
Learn how to create a forensic backup of an iOS smartphone or tablet with Mobile Device Investigator™ in this short How To video from ADF's Digital Forensic Specialist, Rich Frawley.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (102)
- Law Enforcement (73)
- Digital Evidence Investigator (71)
- How To Video (56)
- Mobile Device Investigator (52)
- Triage-Investigator (48)
- United States (48)
- Triage-G2 (47)
- DEI PRO (40)
- Computer Forensics (38)
- Crimes Against Children (36)
- Digital Evidence (36)
- ICAC Task Force (36)
- Triage (33)
- Forensic Triage (32)
- Triage-G2 PRO (30)
- Triage-Investigator PRO (29)
- Mobile Forensics (27)
- Project Vic (27)
- Cyber Crime (26)
- Mobile Device Forensics (26)
- Forensic Analysis (25)
- Child Exploitation (23)
- ICAC (22)
- AllinForensics (21)
- iOS Forensics (20)
- Law Enforcement Conferences (19)
- CAID (18)
- United Kingdom (18)
- Android Forensics (17)
- Cyber Forensics (16)
- DEI PRO Field Tablet (15)
- Forensic Software (15)
- Military (15)
- CSAM (14)
- Police (14)
- High Tech Crime (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Field Forensics (12)
- Sheriff (12)
- Canada (11)
- Human Trafficking (11)
- Internet Investigation (11)
- Military Police (11)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- Search Profiles (10)
- Forensic Training (9)
- IIOC (9)
- Mobile Triage Kits (9)
- Site Exploitation (9)
- technology (9)
- Counter Terrorism (8)
- DOMEX (8)
- Apple Mac Forensics (7)
- Computer Forensic Lab (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Hash Sets (7)
- Project VIC UK (7)
- Prosecutors (7)
- forensics (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- MDI Field Tablet (6)
- Photo Forensics (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- Griffeye (5)
- IPOC (5)
- Identity Operations (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Certified Forensic Computer Examiner (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Artificial Intelligence (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Detective (2)
- Drone Forensics (2)
- Forensic Lab Solutions (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Analytics (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Machine Learning (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)