Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns [1]. Once the AI system analyzes these patterns it can make predictions about future states. Machine learning computer algorithms aid AI in learning to work with a large amount of data. Machine learning data and algorithms will continue to gradually improve their accuracy over time. AI systems that use machine learning take data quickly to produce actionable information. It can trace relationships between data points that may be too complex for the human mind to identify.
Digital Forensic News & Events


Meet Jacob Sniff, CEO of Suspect Technologies
Suspect Technologies provides an AI platform to help law enforcement agencies accelerate and enhance their ability to protect, investigate, alert and report.
As an ADF Partner, Suspect Technologies brings an additional power of analysis to ADF's suite of triage and digital forensic software to support face recognition for age detection which is used to help speed child exploitation investigations.

Next-Generation Digital Forensics Software: 5 Areas That You Want Your Department To Be Ahead In
Even though Digital Forensics has expanded its capabilities and use-cases since its inception, it is constantly evolving and you need to be prepared for the changes coming. New features on computers and smartphones are causing existing digital forensics features to be outdated and unreliable when investigating. New crimes are being committed and the tools in existence are not capable of collecting and processing that sort of evidence yet. But not to worry, there are many companies out there researching tools to handle investigations in critical areas of development. Here are 5 key areas you want to make sure your team has the most up-to-date technology and the most experienced training.

The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking
The Global Forensic and Justice Center hosted a panel on The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking. The panelists included:
- Alexandria Wong, Digital Media (DOMEX) Trainer with the Global Forensic and Justice Center and FIU
- Sondra Skelaney, Gender Violence Prevention Program Coordinator with CASE and FIU
- Ailsa Slack, Director of Customer Success of ADF Solutions.
The panel focused on the role of technology, forensics, and digital evidence and revolved around four central questions which are highlighted below along with the key points discussed by the panel of subject matter experts.

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Using Stealth Mode: Counterterrorism Operations (UPDATED JULY 2022)
Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

Using PhotoDNA in Digital Forensics Investigations (Updated in 2022)
Digital Forensic Investigators and Examiners need to be able to find evidence quickly and one of the ways that ADF provides this capability is using PhotDNA.
Posts by Tag
- Digital Forensics (154)
- Law Enforcement (90)
- Digital Evidence Investigator (87)
- Computer Forensics (69)
- How To Video (68)
- Mobile Device Investigator (66)
- DEI PRO (60)
- Digital Evidence (59)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (53)
- Crimes Against Children (52)
- Mobile Forensics (49)
- ICAC Task Force (46)
- Forensic Triage (42)
- Triage (42)
- Triage-G2 PRO (42)
- Mobile Device Forensics (41)
- Triage-Investigator PRO (40)
- Child Exploitation (39)
- Cyber Crime (36)
- ICAC (30)
- Forensic Analysis (29)
- Project Vic (29)
- DEI PRO Field Tablet (28)
- Human Trafficking (27)
- Law Enforcement Conferences (27)
- Knowledge Base Video (26)
- CSAM (25)
- Computer Forensics Video (25)
- Android Forensics (24)
- Cyber Forensics (24)
- iOS Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Forensic Training (18)
- Internet Investigation (18)
- Military (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Apple Mac Forensics (16)
- Custom Search Profiles (16)
- Field Forensics (16)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Photo Forensics (12)
- Computer Forensic Lab (11)
- Computer Triage (11)
- Counter Terrorism (11)
- Digital Devices (11)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- Cryptocurrency Forensics (9)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- mobile device (9)
- Anti-Terrorism (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- ADF Authorized Partner (7)
- Artificial Intelligence (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cyber Security (5)
- District Attorney (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- iOS (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Dark Web (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Cloud Computing Forensics (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Cloud Forensics (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Corporate Compliance (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- Product Release (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)