Digital forensic software plays a crucial role in the education industry when it comes to investigating incidents of cyberbullying and online harassment.
Digital Forensic News & Events
Recent Posts


The Use of Digital Forensic Software in Investigating Crimes Against Children
Digital forensic software is a powerful investigative tool that law enforcement and investigators have turned to for solving crimes against children. Perpetrators have found new avenues to exploit and harm vulnerable children by obtaining sexually explicit content.

Combating CSAM and Human Trafficking: Digital Forensic Tools for Protecting Vulnerable Individuals
CSAM or child sexual abuse material refers to any visual media depicting children engaged in sexual activity, which is produced, distributed, or accessed for sexual gratification or profit.

5 Things Every ICAC Commander Needs to Know
Child sexual abuse materials are defined as images or videos which show a child engaged or depicted as being engaged in explicitly sexual material [1].

2023 ICAC Task Force Training Conferences in the U.S.
The U.S. Department of Justice launched the ICAC Task Force program in 1998 to help law enforcement learn how to prevent, combat and investigate Internet Crimes Against Children. ICAC Task Force training is scheduled regionally across the United States each year.
The ICAC conferences are announced each year and include training and events held in:

ICAC Task Force Investigations: How Digital Forensics Can Help Uncover Human Trafficking
The ICAC Task Force program was started in 1998 by the U.S. Department of Justice to help law enforcement agencies learn how to investigate, prevent, and combat Internet Crimes Against Children or ICAC.

What is OSEC? (Online Sexual Exploitation of Children)
Online sexual exploitation of children or OSEC is the sexual abuse of children that may be streamed over the internet and the abuser receives payment for the content.

Best Digital Forensics Conferences for 2023
Industry Events: Network, Learn, Grow
Here's a list of the best 2023 digital forensics conferences around the world designed to help promote training and skills needed to collect and analyze digital evidence from computers and mobile devices.

How ADF Can Assist With Prosecutors’ CSAM Cases
Child sexual abuse material or CSAM has become the more common term for child pornography. The term accurately captures the reality of these images and videos. CSAM is distributed heavily through online channels. It has become easier for individuals to perpetuate these videos and images through multiple platforms. These platforms can include social media, online gaming, and email [1].

Border Security Solutions: Keeping America Safe
U.S. Customs and Border Protection is charged with securing the nation’s borders and ensuring that trade and travel regulations are followed. They detect, identify, prohibit, and apprehend individuals with ties to terrorism. They also police the smuggling of humans, narcotics, weapons, bulk cash, and other prohibited or restricted merchandise [1]. U.S. Customs and Border Protection agents’ job is imperative to the nation’s security, without their work many illegal activities would go undetected.
Why You Need Photo Forensics
Photo forensics plays an important role in investigations. Increased access to electronic devices and growing social media platforms mean photos can be an important factor in an investigation.

What is Forensic Triage for Smartphones?
When it comes to accessing digital data across devices, mobile phones are easily the most common devices that law enforcement, businesses, and military personnel will deal with. In the past, accessing critical files (e.g., law enforcement cases, business intelligence, etc.) involved physically unlocking and searching through devices. The problem, of course, is that accessing smartphones by physically entering the device can lead to data loss, file access issues, and an incomplete view of the device's digital archive.
Posts by Tag
- Digital Forensics (165)
- Digital Evidence Investigator (93)
- Law Enforcement (91)
- Mobile Device Investigator (77)
- Computer Forensics (73)
- How To Video (70)
- DEI PRO (69)
- Digital Evidence (64)
- Mobile Forensics (59)
- Crimes Against Children (57)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (52)
- Mobile Device Forensics (50)
- ICAC Task Force (48)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Child Exploitation (42)
- Triage (42)
- Triage-Investigator PRO (40)
- Cyber Crime (39)
- ICAC (33)
- Human Trafficking (31)
- DEI PRO Field Tablet (30)
- Forensic Analysis (29)
- Project Vic (29)
- iOS Forensics (29)
- CSAM (28)
- Cyber Forensics (28)
- Law Enforcement Conferences (28)
- Android Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- United Kingdom (24)
- Forensic Training (22)
- CAID (20)
- Military (20)
- Internet Investigation (19)
- Police (19)
- Apple Mac Forensics (17)
- Field Forensics (17)
- Mobile Forensics Video (17)
- Custom Search Profiles (16)
- Digital Media Investigator (16)
- Financial Crime (16)
- High Tech Crime (16)
- Military Police (16)
- Canada (14)
- Computer Forensic Lab (13)
- Search Profiles (13)
- Sheriff (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Photo Forensics (12)
- Cryptocurrency Forensics (11)
- Cybersecurity (11)
- Digital Devices (11)
- mobile device (11)
- ADF Authorized Partner (10)
- Artificial Intelligence (10)
- Culture Code (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- Cloud Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Machine Learning (4)
- Press Release (4)
- Probation (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Africa (3)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Virtual Reality (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Thailand (1)
- Vehicle Forensics (1)
- Wildlife Trafficking (1)