When conducting digital forensic investigations that involve live (up and running) computers, it is imperative to collect volatile memory so that all your bases covered and so that no vital evidence is lost. A live analysis conducted in the correct manner will yield the results you are looking for in your investigation. It has become commonplace and an accepted practice to collect data from a live computer, especially in cases of child exploitation. ADF software makes it easy for detectives and investigators to perform a RAM capture in the proper manner with as little intrusion as possible.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Fighting In-House Backlog with Triage
It's a known issue that many agencies and departments are facing worldwide; how to fight and reduce backlog to stay up to date on cases so that they don't get stale. It's a serious issue, but we at ADF can show you a few ways to fight in-house forensic backlog with digital forensic triage.

What is RAM Capture and Why does it Matter?
RAM, short for Random Access Memory, is physical hardware that temporarily stores data for quick read and write access. Think of RAM as a scratch pad you use while working; although all the information you need and may refer to is stored in a binder (in this analogy, your hard drive), the information on the scratch pad is what you are using and need right in the moment. With RAM, it is right there for you to access. While RAM helps with the speed and efficiency of the computer, it can all be lost in an instant as it is volatile.

The Power of ADF Computer Triage
ADF computer triage has long been admired for some of the best digital forensic triage capabilities on the market. Since 2006, ADF digital forensic experts have been building triage tools to empower investigators to quickly collect evidence and on-scene intelligence from computers and digital devices.

2019 NCCC Highlights - National Cyber Crime Conference
With a record number of attendees, speakers and exhibitors, the 2019 National Cyber Crime Conference organized by Massachusetts Attorney General Maura Healey's office this past week was a huge success with law enforcement professionals from 38 states, Canada, the UK and Africa.
The NCCC event was especially important to ADF since it's our first major conference of the year and it's where we officially launched our new Mobile Device Investigator™ for iOS and Android investigations. Our launch featured a demo by our digital forensic specialist, Rich Frawley who joined ADF after 22 years in law enforcement.

How to Conduct a Live Forensic Scan of a Windows Computer
Learn how to conduct a Windows live scan with ADF Solutions Digital Evidence Investigator. Two USB ports are required to complete a scan, one for the Collection Key and one for the Authentication Key, once the scan has started the Authentication Key can be removed. A USB hub may be used in cases where the target computer only has one USB port.
When running a live scan from a Collection Key it is possible to create a RAM dump of the computer. RAM dumps can then be analyzed with appropriate software (e.g. Volatility).

Using a Forensic Triage Tool for Rapid Digital Investigations
One of the reasons that investigators choose ADF software as their primary triage tool is because it can be used standalone or in conjunction with traditional forensic software. Forensic Triage is ideal for front-line investigators because it's fast, easy-to-use, and can net results in situations where time matters. Deployed in a forensic lab, triage software can reduce forensic backlogs and allow forensic examiners to prioritize deep dive forensic investigations.

RAM Dump Forensics
What's the fastest, easiest way to perform RAM Dump? While there are many tools and techniques available to examiners for recovering data from volatile memory, ADF Digital Evidence Investigator®, Triage-Investigator®, and Triage-G2® are fast and easy.
A simple 2-step process lets even the most non-technical field investigators or highly trained digital forensic examiners quickly perform a RAM capture when running a live scan on the computer from a collection key:
- Click "Create RAM Dump" from the main menu
- The RAM Dump will be saved to the collection key as a .bin file and then zipped

National Cyber Crime Conference Highlights
Here are a few of the highlights of the best parts of the 2018 National Cyber Crime Conference hosted by the Massachusetts Attorney General's Office (AGO) this past week.
More Than 100 Digital Forensic Training Sessions for Police and Investigators
Local, state and federal agency attendees with varied experience and diverse backgrounds were able to attend a plethora of the best in-person digital and computer forensics education available. With labs and lectures delivered by educators, trainers and fellow forensic specialists, attendees were able to choose from a wide range of topics including:

Don't Forget RAM Capture: A Key to Digital Forensics
Digital forensic experts understand the importance of remembering to perform a RAM Capture on-scene so as to not leave valuable evidence behind. Capturing volatile data in a computer's memory dump enables investigators and examiners to do a full memory analysis and access data including:
Get Your News (once a month)
Posts by Tag
- Digital Forensics (132)
- Law Enforcement (89)
- Digital Evidence Investigator (85)
- How To Video (68)
- Mobile Device Investigator (63)
- Computer Forensics (58)
- Triage-Investigator (56)
- Triage-G2 (55)
- DEI PRO (53)
- United States (53)
- Crimes Against Children (49)
- Digital Evidence (49)
- ICAC Task Force (45)
- Forensic Triage (42)
- Triage (42)
- Mobile Forensics (41)
- Triage-G2 PRO (41)
- Triage-Investigator PRO (40)
- Mobile Device Forensics (37)
- Child Exploitation (36)
- Cyber Crime (36)
- Forensic Analysis (29)
- ICAC (29)
- Project Vic (29)
- DEI PRO Field Tablet (26)
- Law Enforcement Conferences (26)
- Cyber Forensics (24)
- AllinForensics (23)
- CSAM (23)
- iOS Forensics (23)
- Human Trafficking (22)
- Android Forensics (21)
- United Kingdom (21)
- CAID (20)
- Forensic Software (19)
- Forensic Training (18)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Military (17)
- Custom Search Profiles (16)
- Field Forensics (16)
- Police (16)
- Apple Mac Forensics (15)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Computer Forensic Lab (11)
- Counter Terrorism (10)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- RAM Capture (10)
- technology (10)
- Computer Triage (9)
- Cryptocurrency Forensics (9)
- DOMEX (9)
- Digital Devices (9)
- IIOC (9)
- Photo Forensics (9)
- Prosecutors (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- mobile device (7)
- ADF Authorized Partner (6)
- Artificial Intelligence (6)
- Classifier (6)
- DFIR (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cyber Security (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- iOS (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- District Attorney (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Dark Web (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- PhotoDNA (2)
- Technology Partner (2)
- Video Forensics (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)