Cryptocurrency has expanded in use since it was created in 2009. The idea of creating a decentralized currency to avoid the regulation of banks and governments created a new avenue not only for criminals but also for terrorist organizations. Terrorists such as jihadists around the world have been trading crypto coins to purchase weapons and drugs to continue their attacks on innocent civilians.
Digital Forensic News & Events


Forensic Computer Triage Made Easy
The number of backlogged digital evidence requests has continued to rise over the years. The total number of backlogged evidence requests was over 570,000 in 2014 and every one of those requests is associated with a case that affects real people. This is why we love forensic triage, and why you should too.

What is Forensic Triage?
During a criminal investigation, prioritizing the evidence is paramount to your success as an investigator. Filtering what is critical to the case and what isn't is the difference between the success and failure of an investigation.
Forensic triage - sometimes referred to as "digital forensic triage" - is the process by which you collect, assemble, analyze, and prioritize digital evidence from a crime or investigation.

Learn Digital Forensics Online | ADF Best Practices Webinars of 2021
There are many ways to learn digital forensics. From Certified Training to short How-To videos designed to teach you skills in just a few minutes. One of our favorite forms of learning, however, is our one-hour digital forensic best practices webinars led by our Director of Training, Richard T. Frawley. Rich spent 22 years in law enforcement. Most of that time was as a digital forensic analyst. Here are some of our favorite learning webinars from this year:

Find Anti-Forensic and Dark Web Traces with ADF Triage Software
Within ADF software and forensic triage products, including Digital Evidence Investigator, Triage-Investigator, or Triage-G2, an investigator can quickly find Dark Web traces. This can be done in Quick Profiles but in this video, Rich Frawley shows how to use an Intermediate Profile to triage a suspect machine to identify Dark Web traces. These can be found in ADF's Anti-Forensic Traces Capture.

How to Have a Digital Forensic Triage Process that Works Field to Lab
In this 3-minute "How To" video, you'll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.

macOS Forensics: Live Scan Macs with T2 or M1 chips
Investigators can now scan all available Mac computers (including macs with T2 or M1 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application. Now you can perform digital forensic triage on all Macs including
- macOS T2 chip
- macOS M1 chip
- Mac Fusion Drive

What is On-Scene Digital Forensic Triage?
Digital Forensic Triage is the process of finding digital evidence important for investigations.

The Best Smartphone Triage: Field or Lab
Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices.

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Using Regular Expressions to Speed Digital Forensic Investigations (Updated in 2022)
Regular Expressions - (also known as "regex") are special strings representing a pattern to be matched in a search operation and they can be particularly useful in mobile and computer forensics investigations.
One of the ways we allow investigators to find and focus on relevant evidence is by allowing investigators to customize and bring in a unique set of keywords using a substring or with regular expressions. ADF forensic tools also implement regular expression keywords in our trace captures and keyword lists. So why are Regular Expressions different from using regular keywords?

Mobile Preview: Fast Mobile Phone Forensic Triage (UPDATED IN 2022)
Speeding your investigations has always been a primary focus for ADF Solutions and with the launch of ADF Mobile Preview capabilities, you can start looking at phone content immediately without waiting for a backup or imaging to finish.

Using Stealth Mode: Counterterrorism Operations (UPDATED JULY 2022)
Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

Digital Forensics Africa Conference and Training: Computer & Mobile
ADF Authorized Partner, First Digital & Techno-Law Forensics and the Computer Forensics Institute of Nigeria are hosting the International Digital, Mobile and Computer Forensics Conference & Training Expo as a virtual edition.
The conference, also known as DIGIFOR2020 will be held September 23-25, 2020 and will feature sessions including:

How to Prepare Multiple Evidence Collection Keys (UPDATED August 2022)
Are you ready for a big one? Anticipating what your evidence collection needs will be while you are on-scene includes trying to ascertain how many electronic devices you will encounter. ADF makes it easy for you to be prepared.

How to Prepare a Digital Evidence Collection Key (CKY) (UPDATED August 2022)
Anyone who is charged with a "knock and talk" or executing a search warrant knows that the ability to overcome and adapt on-scene is vital to a successful outcome. This is what drove ADF to empower investigators to be able to create a digital evidence Collect
ion Key (CKY).

Tactical Site Exploitation of iOS and Android Devices (Updated in 2022)
Tactical site exploitation requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or triage) of digital data and devices, collection of data on devices to bagging and tagging of devices. Users range from non-technical operators to technically trained forensic examiners. The most common devices that operators encounter today are mobile computing devices, mainly iOS and Android phones and tablets.

The 3 Levels of DOMEX in Sensitive Site Exploitation (Updated in 2022)
Document and Media Exploitation (DOMEX) requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or forensic triage) of digital data and devices, collection of data on devices to bagging and tagging of devices.

What is Computer Triage? (Updated in 2022)
As digital technology becomes more advanced, the potential for its criminal application is magnified. This can result in overwhelming amounts of digital data for law enforcement to inspect in a limited timeframe. Although opportunities to find digital evidence on a perpetrator's or victim's computer may be numerous, the time it takes to search through such vast quantities of data contributes to the issue of growing forensic backlogs.

What is CEM? Terminology, Law, and Technology in Australia
What is CEM
In Australian states and territories, CEM refers to “Child Exploitation Material”, otherwise known as child abuse material, child sexual abuse material (CSAM), and child pornography. For digital forensic examiners, telecommunications-based child exploitation includes viewing, copying, downloading, sending, exchanging, soliciting, and making CEM.

Android & iOS Digital Forensics for the Field: MDI
One year ago today, we launched Mobile Device InvestigatorⓇ (MDI), ADF’s powerful mobile phone forensic software that allows anyone, from seasoned investigators to non-technical team members, to quickly conduct iOS and Android investigations in the field. Using MDI, investigators can acquire evidence fast and return devices to cooperating witnesses on-scene, and triage devices that need to be seized and brought back to the forensic lab.

7 Tips for Reducing Your Forensic Backlog
Today’s investigators and prosecutors are very familiar with the extreme difficulty in child exploitation cases: getting through your forensic backlog to get to the data in time. Law enforcement officers routinely report that a lack of technology which, combined with stringent time limits, can severely restrict their ability to check devices in a timely manner. ADF understands that digital forensic examinations can be both costly and time-consuming, which hampers investigations into suspects that have downloaded or participated in Child Sexual Abuse Material (CSAM).

Introducing Field Investigator for Teams
ADF Solutions Introduces Field Investigator™ for Teams
There’s a new way to give digital forensic examiners control of investigations and empower non-technical front-line investigators. Meet Field Investigator™ for Teams, the best way to deploy digital forensic triage capabilities to agents for on-scene digital evidence collection and analysis.

Fighting In-House Backlog with Triage
It's a known issue that many agencies and departments are facing worldwide; how to fight and reduce backlog to stay up to date on cases so that they don't get stale. It's a serious issue, but we at ADF can show you a few ways to fight in-house forensic backlog with digital forensic triage.

Sparking Interest in Digital Forensics Careers
ADF is delighted to announce the work we did with the 114th Partnership to create a new Spark 101 STEM Skills video titled "Computational Thinking in Forensic Software Development." The video highlights careers in the digital forensics field and is available as a free resource to teachers seeking to foster students' interest in careers in STEM:

The Power of ADF Computer Triage
ADF computer triage has long been admired for some of the best digital forensic triage capabilities on the market. Since 2006, ADF digital forensic experts have been building triage tools to empower investigators to quickly collect evidence and on-scene intelligence from computers and digital devices.

How to Create Search Profiles with Mobile Device Investigator
Mobile Device Investigator (MDI) is the leading digital forensic triage tool for iOS and Android devices. In this short "How To" video, ADF's digital forensic specialist and trainer, Rich Frawley, will show you how to create a Search Profile with MDI.

Investigate: Files Referenced by Artifact Records
Fast investigations require rapid access to evidence. ADF software enables investigators to quickly view the links of artifacts captured from a target device so you can easily understand a user's activities.

Create an iOS Forensic Backup with DEI PRO
Digital Evidence Investigator PRO enables front-line field investigators to quickly create an iOS forensic backup of an iOS mobile device on-scene or back in the lab. In this short video, ADF Digital Forensic Training Manager, Rich Frawley, will show you how to easily backup an iOS device with DEI PRO.

Learn to Create an Android Forensic Backup with DEI PRO
Digital Evidence Investigator PRO enables front line field investigators to quickly create a forensic backup of an Android device on-scene or back in the lab. In this short video, ADF Digital Forensic Specialist, Rich Frawley, will show you how to easily backup an Android device with DEI PRO.

Building Efficiency into Digital Forensic Programs
Technology has become more powerful and portable, allowing a more significant amount of information to be created, stored, and accessed. This shift in the information technology landscape (mobile, cloud, IoT, etc.) has made the collection and analysis of digital evidence a critical factor in investigating and solving virtually all types of crimes.
There are serious Internet related crimes, that need to be investigated quickly, child exploitation related offenses for instance. For example, in the United Kingdom, the National Crime Agency recently estimated that about 140,000 out of nearly 3 million registered dark web accounts registered on child abuse sites are UK-based.

The Origin of Digital Forensic Triage
In the early 18th century, triage was used to refer to the action of sorting items according to quality and was taken from the French word trier which means to sort, separate out or cull.
>> Continue reading or watch the Benefits of Triage webinar recording.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

Why We Love Forensic Triage and You Should Too!
In 2009, the number of backlogged digital evidence requests in publicly funded forensic crime labs was 1,600. By the end of 2014, that number had risen to 7,800. While that's tiny in comparison to the total number of backlogged evidence requests (over 570,000 in 2014!), every one of those requests is associated with a case that affects real people. This is why we love forensic triage, and why you should too.

ADF & National White Collar Crime Webinar
Join ADF Solutions for a webinar hosted by the National White Collar Crime Center (NW3C), a nonprofit, membership-affiliated organization comprised of state, local, federal and tribal law enforcement and prosecutorial and regulatory agencies.
NW3C provided a nationwide support system for law enforcement and regulatory agencies involved in prevention, investigation and prosecution of economic and high-tech crime. Support is delivered via training in computer forensics, cyber and financial crime investigations and intelligence analysis as well as original research on and analytical technical support for investigating and prosecuting white collar and related crimes.

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.

Using a Forensic Triage Tool for Rapid Digital Investigations
One of the reasons that investigators choose ADF software as their primary triage tool is because it can be used standalone or in conjunction with traditional forensic software. Forensic Triage is ideal for front-line investigators because it's fast, easy-to-use, and can net results in situations where time matters. Deployed in a forensic lab, triage software can reduce forensic backlogs and allow forensic examiners to prioritize deep dive forensic investigations.

3 Benefits of Digital Forensic Triage
The term triage naturally brings to mind a medical emergency where you need to get in quickly, assess the damage and deal with the most serious problems first. Digital forensic triage has the same application but it's applied to a crime scene or investigation which involves computers or other digital media. Standard forensic methods normally take place in a forensic lab where a trained forensic examiner would perform a complete examination. Digital triage is a front line step in saving time and reaching satisfactory results faster.

How fast is digital forensic triage?
ADF triage performance is fast -- built to be under two minutes for certain scans. Digital forensic triage speed and performance can vary based on a number of factors including the triage software you are using, the search criteria you choose, the suspect hardware configuration, and how much you know about what you are looking to understand in your investigation.

2018 Florida ICAC Conference to Solve Internet Crimes Against Children
The Florida Internet Crimes Against Children Task Force, along with the Florida Department of Law Enforcement, Child Abduction Response Team (CART) and Offender Registration and Enforcement once again hosted the Florida ICAC Training Symposium.

macOS Mojave Forensics
The best tools for rapid Mac forensics investigations just got better with ADF's release of new software versions to support the collection of artifacts with Mac OS Mojave Forensics and MacOS High Sierra as well as from Windows.

A Typical Child Exploitation Case Solved by ADF DEI
The investigation began when law enforcement officials received a report that images that were consistent with child pornography had been uploaded to a social media platform. The images were immediately flagged, and investigators swiftly obtained a search warrant to gain access to the suspect's residence. Once inside the residence, members of the State Police Computer Crime Unit conducted an on-scene forensic examination of all electronic media, including computers, phones, and other electronic devices. This examination was conducted with the utmost care and attention to detail to ensure that all potential evidence was discovered and preserved. The examination proved to be invaluable, as it revealed a trove of images and videos of sexual abuse of an under age child, leading investigators to identify a resident of the household as the suspect. Through their tireless efforts, these investigators were able to bring a dangerous criminal to justice and protect innocent children from further harm.
Using ADF Digital Evidence Investigator®, investigators discovered images and videos of sexual abuse of an under age child and were able to identify a resident of the household as the suspect. Specifically, investigators located thumbcache images that resulted in identifying a female child that was being sexually abused and identified the suspect.
Posts by Tag
- Digital Forensics (165)
- Digital Evidence Investigator (93)
- Law Enforcement (91)
- Mobile Device Investigator (77)
- Computer Forensics (73)
- How To Video (70)
- DEI PRO (69)
- Digital Evidence (64)
- Mobile Forensics (59)
- Crimes Against Children (57)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (52)
- Mobile Device Forensics (50)
- ICAC Task Force (48)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Child Exploitation (42)
- Triage (42)
- Triage-Investigator PRO (40)
- Cyber Crime (39)
- ICAC (33)
- Human Trafficking (31)
- DEI PRO Field Tablet (30)
- Forensic Analysis (29)
- Project Vic (29)
- iOS Forensics (29)
- CSAM (28)
- Cyber Forensics (28)
- Law Enforcement Conferences (28)
- Android Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- United Kingdom (24)
- Forensic Training (22)
- CAID (20)
- Military (20)
- Internet Investigation (19)
- Police (19)
- Apple Mac Forensics (17)
- Field Forensics (17)
- Mobile Forensics Video (17)
- Custom Search Profiles (16)
- Digital Media Investigator (16)
- Financial Crime (16)
- High Tech Crime (16)
- Military Police (16)
- Canada (14)
- Computer Forensic Lab (13)
- Search Profiles (13)
- Sheriff (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Photo Forensics (12)
- Cryptocurrency Forensics (11)
- Cybersecurity (11)
- Digital Devices (11)
- mobile device (11)
- ADF Authorized Partner (10)
- Artificial Intelligence (10)
- Culture Code (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- Cloud Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Machine Learning (4)
- Press Release (4)
- Probation (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Africa (3)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Virtual Reality (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Thailand (1)
- Vehicle Forensics (1)
- Wildlife Trafficking (1)