Digital Forensic News & Events

Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics

Digital Forensics: The Military's Secret to Combating Cyber Threats

July 5, 2023

Digital forensics has become an increasingly important tool for the military in combating cyber threats.

Read More

How ADF Supports Counterterrorism Investigations

July 20, 2022

While the internet has provided many ways for people to form connections and share information it has also become a mode through which terrorism is facilitated. Organized groups can coordinate and conduct crimes easily and with anonymity. Their audience and reach are limitless, allowing terrorists to communicate globally with very few barriers. Military forces and government agencies must engage in counterterrorism and employ tactics to prevent these terrorist attacks from occurring. Computer forensic software is a major tool in a military force’s arsenal. With the proper software, they can collect and analyze actionable intelligence while also detecting and disrupting threats. This post will provide information on how the internet is used for terrorism and how ADF’s computer forensic software tools support counterterrorism. 

Read More

ADF Solutions Joins the Grayshift Technology Alliances Program

June 7, 2022

Grayshift has announced that ADF Solutions is a Certified member of Grayshift's Technology Alliances Program, a digital forensics ecosystem that facilitates open, multi-vendor integration and certifications to improve the effectiveness of digital investigations tools. The program ensures that partner tools: 

  • Fully and accurately parse GrayKey extractions
  • Improve cross-product workflows
  • Explore integrations aimed at accelerating investigations

The partnership between ADF Solutions and GrayShift is designed to give law enforcement agencies confidence that they can expect accuracy in ingesting and displaying data from GrayKey extractions to speed investigations. 

Read More

Cryptocurrency and Terrorism

February 16, 2022

Cryptocurrency has expanded in use since it was created in 2009. The idea of creating a decentralized currency to avoid the regulation of banks and governments created a new avenue not only for criminals but also for terrorist organizations. Terrorists such as jihadists around the world have been trading crypto coins to purchase weapons and drugs to continue their attacks on innocent civilians.

Read More

Learn Computer Forensics: Collect Saved Web Credentials in the Field

January 27, 2022

ADF's Quick-Saved Credentials profile is a powerful profile that extracts the usernames and passwords from Web Browsers and is built so it will not trigger antivirus applications when attempting to collect web credentials. This makes the investigator's job easier on-scene, requires less interaction with the device, and allows for more records to be parsed thereby giving the computer forensic investigator the ability to quickly collect critical information for their investigation.

Learn how to use the ADF Quick Saved Credentials Profile to uncover Web credentials in this short 2-minute video tutorial. Collecting saved credentials quickly gives access to accounts that may have been previously unknown and allows investigators to do preservation orders and search warrants. 

Read More

Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers

December 30, 2021

ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application. 

Read More

Obtaining Your ADF Evaluation License

December 28, 2021

Welcome! You have a requirement or need and decided to evaluate one of the ADF products for your computer forensic, mobile forensic, or triage workflows. You have observed the videos and have most likely been through a demonstration or two and have a better understanding of the functionality you are looking for. We here at ADF Solutions want to make sure you get the most out of your evaluation, and that starts with a smooth transition to the evaluation phase.

Read More

Archiving Phone Backups

December 27, 2021

With any of the ADF Mobile products, if you are using the default settings, the mobile backups are being saved to the local drive. The mobile backups can be quite large and quickly fill up your drive leaving you no storage space.

Let’s take a look at how to archive your mobile backups with or without the corresponding scan results.

Read More

Find Anti-Forensic and Dark Web Traces with ADF Triage Software

September 17, 2021

Within ADF software and forensic triage products, including Digital Evidence Investigator, Triage-Investigator, or Triage-G2, an investigator can quickly find Dark Web traces. This can be done in Quick Profiles but in this video, Rich Frawley shows how to use an Intermediate Profile to triage a suspect machine to identify Dark Web traces. These can be found in ADF's Anti-Forensic Traces Capture. 

Read More

Remove an iTunes Password set in ADF Digital Forensics Tools

June 22, 2021

The Encrypt backup feature in iTunes locks and encodes your information. In this short How To video, Director of Training, Rich Frawley shows investigators how to remove the known iTunes backup password, if required.

Read More

macOS Forensics: Live Scan Macs with T2 or M1 chips

May 18, 2021

Investigators can now scan all available Mac computers (including macs with T2 or M1 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application. Now you can perform digital forensic triage on all Macs including

  • macOS T2 chip
  • macOS M1 chip
  • Mac Fusion Drive
Read More

The Best Smartphone Triage: Field or Lab

March 4, 2021

Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices. 

Read More

Digital Forensics Age Detection and Facial Analysis

February 12, 2021

Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly. 

Read More

Digital Forensic Screenshots with OCR for Mobile Devices

January 15, 2021

ADF Solutions mobile phone forensic software makes it easier to quickly collect digital evidence from smartphones and tablets with the Digital Forensic screenshot feature in Mobile Device Investigator or ADF PRO tools. 

Read More

Regular Expressions that Speed Digital Investigations (Updated 2022)

December 18, 2020

Regular Expressions - (also known as "regex") are special strings representing a pattern to be matched in a search operation and they can be particularly useful in mobile and computer forensics investigations. 

One of the ways we allow investigators to find and focus on relevant evidence is by allowing investigators to customize and bring in a unique set of keywords using a substring or with regular expressions. ADF forensic tools also implement regular expression keywords in our trace captures and keyword lists. So why are Regular Expressions different from using regular keywords?

Read More

Organizing the Records View for Faster Forensic Investigations (UPDATED IN 2022)

December 9, 2020

ADF digital forensic software is known for rapid file and artifact collection but we're also widely respected for our seamless user interface. No matter whether you are using Mobile Device Investigator, Triage-Investigator, Triage-G2, Digital Evidence Investigator or our PRO tools, ADF tools are designed to make it easy for investigators to quickly determine what to scan and how to scan it. 

Read More

Mobile Preview Forensic Triage & ADF New Features (UPDATED IN 2022)

November 20, 2020

At ADF, we are mission driven. We are delighted to serve those who serve and some of our most exciting times are when we are adding new features and capabilities, when we learn how they are being used, and of course, on launch days. We hope you'll love what we've created.

Read More

Mobile Preview: Fast Mobile Phone Forensic Triage (UPDATED IN 2022)

November 19, 2020

Speeding your investigations has always been a primary focus for ADF Solutions and with the launch of ADF Mobile Preview capabilities, you can start looking at phone content immediately without waiting for a backup or imaging to finish. 

Read More

Prepare Evidence Collection Keys for a Digital Forensic Investigation (Updated in 2022)

October 6, 2020

Getting ready to work off site, out of the lab, out of your office, and in someone else's domain is never an easy task. Whether it's a search warrant, in a client's office, suspect's residence, or some other off-site location, being prepared is the key to your success as a digital forensic investigator.

Read More

Using Stealth Mode: Counterterrorism Operations (UPDATED JULY 2022)

September 23, 2020

Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

Read More

How to Prepare Multiple Evidence Collection Keys (UPDATED August 2022)

September 3, 2020

Are you ready for a big one? Anticipating what your evidence collection needs will be while you are on-scene includes trying to ascertain how many electronic devices you will encounter. ADF makes it easy for you to be prepared. 

Read More

How to Prepare a Digital Evidence Collection Key (CKY) (UPDATED August 2022)

August 31, 2020

Anyone who is charged with a "knock and talk" or executing a search warrant knows that the ability to overcome and adapt on-scene is vital to a successful outcome. This is what drove ADF to empower investigators to be able to create a digital evidence Collect

ion Key (CKY). 

Read More

How to Prepare a Sanitized CSAM Report (UPDATED August 2022)

August 20, 2020

Learn how to easily remove CSAM images and other properties from view

One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Read More

Using Smartphone Triage to Speed Your Investigations (Updated in 2022)

July 29, 2020

Two of the biggest factors law enforcement officers face today are how they handle a dangerous situation and how quickly they can that situation. When lives are on the line, one of the major obstacles in resolving that situation is a lack of information.

Read More

Quick Kik Messenger Forensics for iOS and Android (UPDATED September 2022)

July 28, 2020

Kik, also known as Kik Messenger, runs on Android, iOS, and Windows operating systems and is a free app used by more than 200 million people worldwide to send and receive messages that can include photos and videos as well as other content. Kik is popular with children as young as 13 as well as young adults. Because of its popularity with children, the Kik app has become a magnet for child exploitation

Read More

Best Mobile Device Investigator Settings for Evidence Collection (UPDATED September 2022)

July 20, 2020

In this short digital forensic How To video, Digital Forensic Specialist, Rich Frawley, walks you through the best settings for Mobile Device Investigator®.  Learn how to choose the best Search Profile Capture selection and how to decipher which captures will get you the information you need for your investigation with our mobile phone forensic software

Read More

Tactical Site Exploitation of iOS and Android Devices (Updated in 2022)

July 14, 2020

Tactical site exploitation requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or triage) of digital data and devices, collection of data on devices to bagging and tagging of devices. Users range from non-technical operators to technically trained forensic examiners. The most common devices that operators encounter today are mobile computing devices, mainly iOS and Android phones and tablets. 

Read More

Forensic Acquisition: Take Screenshots of Mobile Devices (Updated in 2022)

July 13, 2020

Why take Digital Forensic Screenshots?

Taking a screenshot of a connected iOS or Android mobile device consists in making a copy of what is displayed on the device screen. This method makes it possible to collect digital evidence that would otherwise not be available in a advanced logical acquisition because the data is protected.

Read More

The 3 Levels of DOMEX in Sensitive Site Exploitation (Updated in 2022)

July 8, 2020

Document and Media Exploitation (DOMEX) requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or forensic triage) of digital data and devices, collection of data on devices to bagging and tagging of devices.  

Read More

Learn To Use Digital Forensic Screen Capture on iOS & Android Devices (Updated in 2022)

May 21, 2020

The ADF digital forensic screenshots feature enables frontline investigators to capture screenshots from any connected iOS or Android mobile device. This feature is useful for investigators who need to capture data that may not be included in a backup or to capture how a particular mobile app or screen appears to the user.

Read More

Everything You Need to Know about ADF Search Profiles

May 7, 2020
Speeding digital forensic investigations has been ADF's focus since 2005 when we filed our first patent application which focused on the creation of Search Packs that could be edited for rapid data identification, data sharing and management. 
Read More

Sensitive Site Exploitation and Triage-G2: Just like Jack Ryan

February 20, 2020

When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in. 

Read More

Backing Up and Scanning iOS Devices

February 18, 2020

In this how-to video, we will cover backing up and scanning encrypted iOS devices. This skill is important to know because encrypted iOS backups return more data than unencrypted backups.

Read More

How to Scan Multiple Devices

December 19, 2019

With ADF digital forensic software tools, it's possible to scan multiple devices simultaneously and have them as part of one scan. However, there are some items we need to keep in mind when preparing to scan multiple devices.

Read More

Archiving with the Standalone Viewer

December 11, 2019

Once you have completed your investigation and need to archive your case, the most efficient method is to use the Stand Alone Viewer, which can be found within the reporting module. This viewer provides an all-in-one solution that includes a self-contained folder with a standalone application that gives you the ability to view the results. It is independent of the ADF suite of tools and does not require a license to use. By using the Stand Alone Viewer, you can be sure that all tags, comments, filters, and sorting will be included in the output. Please note that it is not possible to run the Stand Alone Viewer from read-only storage devices such as CDs or DVDs.

Read More

Transferring Data With the ADF Migration Tool

December 2, 2019

Software updates are something we look forward to, and when we receive that new download from our go-to tool, it makes the day even more special.  When it comes time to upgrade or re-install ADF software, as a user, you do not want your data to be lost after either the software upgrade or when selecting a new Search Profile folder.

When you first start the ADF application you will notice the tool will look to see if any new data needs to be merged or migrated.

Read More

How to Use ADF Photo Probability to Speed Your Investigation

November 25, 2019

In today's digital age, the sheer volume of photo evidence available can be staggering.

Read More

How to Hide Default Search Profiles in ADF Digital Forensic Software

October 23, 2019

ADF digital forensic software comes with approximately a dozen out-of-the-box default search profiles designed to make it quick and easy for non-technical field investigators to quickly search for digital evidence. 

Read More

Collect and Share Digital Evidence Files with Prosecutors

October 7, 2019

In this short How To video, digital forensic specialist Rich Frawley, will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is ideal for learning how to share evidence with prosecutors for review. 

Read More

Investigate: Files Referenced by Artifact Records

September 4, 2019

Fast investigations require rapid access to evidence. ADF software enables investigators to quickly view the links of artifacts captured from a target device so you can easily understand a user's activities. 

Read More

Learn How To Filter Digital Forensic Scan Results in ADF Software

August 26, 2019

In this short 5 minute video, you'll learn how to filter digital forensic scan results in ADF software. Filtering is available in any table while analyzing any of your scan results. In this how-to video, we'll look at:

Read More

ADF Releases Digital Forensic Software to Power Field Investigations

August 21, 2019

Investigate on-scene with a single license for smartphones, tablets, and computers 

Read More

Rosoka Add-on Powerful Text Analytics

August 20, 2019

In this short How To video we are going to explore the Text Analytics capabilities built into ADF’s digital forensic software with the integration of Rosoka. ADF is bringing the power of Rosoka for automated entity extraction and language identification with gisting, through a tightly integrated user experience in the Rosoka Add-on. 

Read More

Posts by Tag

See all

Recent Posts

New ADF Free Trial Website Ad
  • READY TO ACCELERATE YOUR DIGITAL INVESTIGATIONS?