Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Digital Forensic Screenshots with OCR for Mobile Devices
ADF Solutions mobile phone forensic software makes it easier to quickly collect digital evidence from smartphones and tablets with the Digital Forensic screenshot feature in Mobile Device Investigator or ADF PRO tools.

Using Regular Expressions to Speed Digital Forensic Investigations
Regular Expressions - (also known as "regex") are special strings representing a pattern to be matched in a search operation and they can be particularly useful in mobile and computer forensics investigations.
One of the ways we allow investigators to find and focus on relevant evidence is by allowing investigators to customize and bring in a unique set of keywords using a substring or with regular expressions. ADF forensic tools also implement regular expression keywords in our trace captures and keyword lists. So why are Regular Expressions different from using regular keywords?

Organizing the Records View for Faster Forensic Investigations
ADF digital forensic software is known for rapid file and artifact collection but we're also widely respected for our seamless user interface. No matter whether you are using Mobile Device Investigator, Triage-Investigator, Triage-G2, Digital Evidence Investigator or our PRO tools, ADF tools are designed to make it easy for investigators to quickly determine what to scan and how to scan it.

Mobile Preview Forensic Triage & ADF New Features
At ADF, we are mission driven. We are delighted to serve those who serve and some of our most exciting times are when we are adding new features and capabilities, when we learn how they are being used, and of course, on launch days. We hope you'll love what we've created.

Mobile Preview: Fast Mobile Phone Forensic Triage
Speeding your investigations has always been a primary focus for ADF Solutions and with the launch of ADF Mobile Preview capabilities, you can start looking at phone content immediately without waiting for a backup or imaging to finish.

Prepare Evidence Collection Keys for a Digital Forensic Investigation
Getting ready to work off site, out of the lab, out of your office, and in someone else's domain is never an easy task. Whether it's a search warrant, in a client's office, suspect's residence, or some other off-site location, being prepared is the key to your success as a digital forensic investigator.

Using Stealth Mode: Counterterrorism Operations
Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

How to Prepare Multiple Evidence Collection Keys
Are you ready for a big one? Anticipating what your evidence collection needs will be while you are on-scene includes trying to ascertain how many electronic devices you will encounter. ADF makes it easy for you to be prepared.

How to Prepare a Digital Evidence Collection Key (CKY)
Anyone who is charged with a "knock and talk" or executing a search warrant knows that the ability to overcome and adapt on-scene is vital to a successful outcome. This is what drove ADF to empower investigators to be able to create a digital evidence Collection Key (CKY).

How to Prepare a Sanitized CSAM Report
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Using Smartphone Triage to Speed Your Investigations
Two of the biggest factors law enforcement officers face today are how they handle a dangerous situation and how quickly they can that situation. When lives are on the line, one of the major obstacles in resolving that situation is a lack of information.

Quick Kik Messenger Forensics for iOS and Android
Kik, also known as Kik Messenger, runs on Android, iOs and Windows operating systems and is a free app used by more than 200 million people worldwide to send and receive messages that can include photos and videos as well as other content. Kik is popular with children as young as 13 as well as young adults. Because of its popularity with children, the Kik app has become a magnet for child exploitation.

Best Mobile Device Investigator Settings for Evidence Collection
In this short digital forensic How To video, Digital Forensic Specialist, Rich Frawley, walks you through the best settings for Mobile Device Investigator®. Learn how to choose the best Search Profile Capture selection and how to decipher which captures will get you the information you need for your investigation with our mobile phone forensic software.

Tactical Site Exploitation of iOS and Android Devices
Tactical site exploitation requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or triage) of digital data and devices, collection of data on devices to bagging and tagging of devices. Users range from non-technical operators to technically trained forensic examiners. The most common devices that operators encounter today are mobile computing devices, mainly iOS and Android phones and tablets.

Forensic Acquisition: Take Screenshots of Mobile Devices
Why take Digital Forensic Screenshots?
Taking a screenshot of a connected iOS or Android mobile device consists in making a copy of what is displayed on the device screen. This method makes it possible to collect digital evidence that would otherwise not be available in a advanced logical acquisition because the data is protected.

The 3 Levels of DOMEX in Sensitive Site Exploitation
Document and Media Exploitation (DOMEX) requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or forensic triage) of digital data and devices, collection of data on devices to bagging and tagging of devices.

Learn To Use Digital Forensic Screen Capture on iOS & Android Devices
The ADF digital forensic screenshots feature enables frontline investigators to capture screenshots from any connected iOS or Android mobile device. This feature is useful for investigators who need to capture data that may not be included in a backup or to capture how a particular mobile app or screen appears to the user.

Everything You Need to Know about ADF Search Profiles

Sensitive Site Exploitation and Triage-G2: Just like Jack Ryan
When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in.

Backing Up and Scanning iOS Devices
In this how-to video, we will cover backing up and scanning encrypted iOS devices. This skill is important to know because encrypted iOS backups return more data than unencrypted backups.

How to Scan Multiple Devices
With ADF digital forensic software tools, it's possible to scan multiple devices simultaneously and have them as part of one scan. However, there are some items we need to keep in mind when preparing to scan multiple devices.

Archiving with the Standalone Viewer
When your case is complete and it comes time to archive your case, the best method is to archive with the Stand Alone Viewer, located within reporting.

Transferring Data With the ADF Migration Tool
Software updates are something we look forward to, and when we receive that new download from our go-to tool, it makes the day even more special. When it comes time to upgrade or re-install ADF software, as a user, you do not want your data to be lost after either the software upgrade or when selecting a new Search Profile folder.
When you first start the ADF application you will notice the tool will look to see if any new data needs to be merged or migrated.

How to Use ADF Photo Probability to Speed Your Investigation
With the ever-increasing amount of digital photo evidence, it's nearly impossible for investigators to quickly review photo evidence in a timely manner. Enter ADF Photo Probability for on-scene triage and digital investigations; one of the ways that ADF helps reduce the "noise" in a case and helps you get to the evidence faster.

How to Hide Default Search Profiles in ADF Digital Forensic Software
ADF digital forensic software comes with approximately a dozen out-of-the-box default search profiles designed to make it quick and easy for non-technical field investigators to quickly search for digital evidence.

Collect and Share Digital Evidence Files with Prosecutors
In this short How To video, digital forensic specialist Rich Frawley, will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is ideal for learning how to share evidence with prosecutors for review.

Investigate: Files Referenced by Artifact Records
Fast investigations require rapid access to evidence. ADF software enables investigators to quickly view the links of artifacts captured from a target device so you can easily understand a user's activities.

Learn How To Filter Digital Forensic Scan Results in ADF Software
In this short 5 minute video, you'll learn how to filter digital forensic scan results in ADF software. Filtering is available in any table while analyzing any of your scan results. In this how-to video, we'll look at:

ADF Releases Digital Forensic Software to Power Field Investigations
Investigate on-scene with a single license for smartphones, tablets, and computers

Rosoka Add-on Powerful Text Analytics
In this short How To video we are going to explore the Text Analytics capabilities built into ADF’s digital forensic software with the integration of Rosoka. ADF is bringing the power of Rosoka for automated entity extraction and language identification with gisting, through a tightly integrated user experience in the Rosoka Add-on.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (104)
- Law Enforcement (75)
- Digital Evidence Investigator (71)
- How To Video (57)
- Mobile Device Investigator (55)
- Triage-Investigator (49)
- Triage-G2 (48)
- United States (48)
- DEI PRO (43)
- Computer Forensics (40)
- Crimes Against Children (38)
- ICAC Task Force (38)
- Digital Evidence (37)
- Triage (36)
- Forensic Triage (35)
- Triage-G2 PRO (32)
- Triage-Investigator PRO (31)
- Mobile Device Forensics (29)
- Mobile Forensics (29)
- Cyber Crime (27)
- Project Vic (27)
- Child Exploitation (26)
- Forensic Analysis (26)
- ICAC (23)
- iOS Forensics (22)
- AllinForensics (21)
- Android Forensics (19)
- Law Enforcement Conferences (19)
- CAID (18)
- DEI PRO Field Tablet (18)
- United Kingdom (18)
- CSAM (16)
- Cyber Forensics (16)
- Military (16)
- Forensic Software (15)
- High Tech Crime (14)
- Police (14)
- Field Forensics (13)
- Human Trafficking (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Military Police (12)
- Mobile Triage Kits (12)
- Sheriff (12)
- Canada (11)
- Internet Investigation (11)
- Culture Code (10)
- Early Case Assessment (10)
- Forensic Training (10)
- RAM Capture (10)
- Search Profiles (10)
- IIOC (9)
- Site Exploitation (9)
- technology (9)
- Computer Forensic Lab (8)
- Counter Terrorism (8)
- DOMEX (8)
- Hash Sets (8)
- MDI Field Tablet (8)
- forensics (8)
- Apple Mac Forensics (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Photo Forensics (7)
- Project VIC UK (7)
- Prosecutors (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- Griffeye (6)
- Identity Operations (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Artificial Intelligence (3)
- Certified Forensic Computer Examiner (3)
- Forensic Lab Solutions (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Data Analytics (2)
- Detective (2)
- Drone Forensics (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Machine Learning (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)