Rapid Evidence Collection, Analysis and Reporting

 

Triage-Investigator® is ADF's award-winning intelligent forensic triage tool designed for field deployment with Digital Evidence Investigator®. The software has a proven track record of providing easy and quick access to court defendable evidence to process cases and leveraging investigators to assist forensic labs with rapid collection, analysis, reporting, and managing digital backlogs.

Triage-Investigator® is easy-to-use, easily configurable, supports a wide array of computer hardware, has powerful boot capabilities, is forensically sound, and comes with technical support and regular upgrades.  

  • Automated / easy-to-learn and deploy  with rapid artifact & file collection using out-of-the-box forensic scans
  • Deploy with Digital Evidence Investigator to import custom Search Profiles
  • Standalone Report Viewer (share with prosecutors!)
  • ADD-ON: Rosoka Entity Extraction and Language Translation Gisting (230 languages) available

    TRIAGE INVESTIGATOR KEY FEATURES

    Triage-Investigator is the #1 digital triage tool for rapid digital investigations. Triage-Investigator can also be licensed to a computer instead of a physical Authentication Key (dongle) as an option. 

    COLLECT

    Empower front-line field investigators with pre-set scans for automated on-scene collection and analysis and maintain control with the combined power of Digital Evidence Investigator and Triage-Investigator.

    • Easy-to-use and deploy with minimal training
    • Highly configurable artifact and file collection including web browser cached files, social media, P2P, Cryptocurrency, cloud storage, user login events, anti-forensic traces, saved credentials, files shared via Skype, USB history, user connection log, etc.
    • Recover deleted records from apps using the SQLite database
    • Supports collection of forensic artifacts from Windows and macOS (including T2 and M1 chips)
    • Search and collect emails including MS Outlook, Windows Mail, Windows Live Mail 10, Apple Mail
    • Investigate attached devices, live powered on computers, boot scans from powered off computers, forensic images, the contents of folders and network shares (including shares made available by NAS devices)
    • Enter keywords just before a live/boot scan
    • Rapidly search suspect media using large hash sets (>100 million), including Project VIC (VICS 2.0) and CAID
    • Find relevant files and artifacts with powerful keyword and regular expression search capability
    • Image drives Out-of-the-box with image verification and imaging log file
    • Use password and recovery key to decrypt and scan or image BitLocker volumes including those using the AES-XTS encryption algorithm introduced in Windows 10
    • Process APFS partitions, NTFS, FAT, HFS+, EXT, ExFAT, and YAFFS2 file systems, compute MD5 and SHA1 on collected files for integrity validation
    • Capture RAM / acquire volatile memory
    • Collect password protected and corrupted files for later review
    • Collect iOS backups on target computers
    • Detect and warn of BitLocker and FileVault2 protected drives
    • Leverage powerful boot capability (including UEFI secure boot and Macs) to access internal storage that cannot easily be removed from computers 
    ANALYZE

    Use the single timeline view that combines files and artifact records with a user’s actions.

    • View results while a scan is running
    • View chat conversations with bubbles to easily identify the senders and receivers with “Message Thread” hyperlink to select individual conversations
    • Filter search results with sorting and search capabilities (dates, hash values, tags, text filters, more)
    • View pictures and videos organized by visual classes such as people, faces, currency, weapons, vehicles, indecent pictures of children
    • View links between files of interest and user’s activities such as recently access files, downloaded files, attachments, and more
    • Inspect video using DEI’s comprehensive video preview and frame extraction
    • Automatically tag hash and keyword matches
    • Leverage Suspect Technologies facial analysis age detection to quickly identify infants, toddlers, children, adults
    • Define new file types and select individual ones to be processed
    • Display provenance, including comprehensive metadata, of all relevant files and artifacts
    • Reorder or disable post-scan tasks (classification of pictures, videos, or entity extraction) to run in the Viewer
    • ADD-ON: Rosoka Entity Extraction and Language Translation Gisting (230 languages) available
    REPORT

    Triage-InvestigatorⓇ lets investigators create a standalone portable viewer for further analysis and reporting for prosecutors and other investigators.

    • Powerful reporting capabilities (HTML, PDF, CSV)
    • Export in VICS format (to Grifffeye Analyze Platform and other JSON compatible tools)