The use of Artificial Intelligence (AI) to speed up corporate forensics investigations is becoming a popular way for businesses to quickly and accurately gather evidence.
Digital Forensic News & Events


The Power of AI in Military Intelligence: How Machines are Changing the Game
In today's rapidly evolving global landscape, military intelligence is more critical than ever.

How AI Is Helping Law Enforcement Combat Human Trafficking
Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns [1]. Once the AI system analyzes these patterns it can make predictions about future states. Machine learning computer algorithms aid AI in learning to work with a large amount of data. Machine learning data and algorithms will continue to gradually improve their accuracy over time. AI systems that use machine learning take data quickly to produce actionable information. It can trace relationships between data points that may be too complex for the human mind to identify.

Meet Jacob Sniff, CEO of Suspect Technologies
Suspect Technologies provides an AI platform to help law enforcement agencies accelerate and enhance their ability to protect, investigate, alert and report.
As an ADF Partner, Suspect Technologies brings an additional power of analysis to ADF's suite of triage and digital forensic software to support face recognition for age detection which is used to help speed child exploitation investigations.

Next-Generation Digital Forensics Software: 5 Areas That You Want Your Department To Be Ahead In
Even though Digital Forensics has expanded its capabilities and use-cases since its inception, it is constantly evolving and you need to be prepared for the changes coming. New features on computers and smartphones are causing existing digital forensics features to be outdated and unreliable when investigating. New crimes are being committed and the tools in existence are not capable of collecting and processing that sort of evidence yet. But not to worry, there are many companies out there researching tools to handle investigations in critical areas of development. Here are 5 key areas you want to make sure your team has the most up-to-date technology and the most experienced training.

The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking
The Global Forensic and Justice Center hosted a panel on The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking. The panelists included:
- Alexandria Wong, Digital Media (DOMEX) Trainer with the Global Forensic and Justice Center and FIU
- Sondra Skelaney, Gender Violence Prevention Program Coordinator with CASE and FIU
- Ailsa Slack, Director of Customer Success of ADF Solutions.
The panel focused on the role of technology, forensics, and digital evidence and revolved around four central questions which are highlighted below along with the key points discussed by the panel of subject matter experts.

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Using Stealth Mode: Counterterrorism Operations (UPDATED JULY 2022)
Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:

Using PhotoDNA in Digital Forensics Investigations (Updated in 2022)
Digital Forensic Investigators and Examiners need to be able to find evidence quickly and one of the ways that ADF provides this capability is using PhotDNA.
Posts by Tag
- Digital Forensics (158)
- Law Enforcement (91)
- Digital Evidence Investigator (90)
- Computer Forensics (70)
- How To Video (70)
- Mobile Device Investigator (67)
- DEI PRO (64)
- Digital Evidence (63)
- Triage-Investigator (57)
- Crimes Against Children (56)
- Triage-G2 (55)
- United States (53)
- Mobile Forensics (51)
- ICAC Task Force (46)
- Mobile Device Forensics (43)
- Forensic Triage (42)
- Triage (42)
- Triage-G2 PRO (42)
- Child Exploitation (41)
- Triage-Investigator PRO (40)
- Cyber Crime (38)
- ICAC (30)
- DEI PRO Field Tablet (29)
- Forensic Analysis (29)
- Human Trafficking (29)
- Project Vic (29)
- Law Enforcement Conferences (27)
- iOS Forensics (27)
- CSAM (26)
- Cyber Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Android Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Forensic Training (20)
- Military (19)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- Apple Mac Forensics (17)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Custom Search Profiles (16)
- Field Forensics (16)
- Financial Crime (16)
- Digital Media Investigator (15)
- Military Police (15)
- Canada (14)
- Search Profiles (13)
- Sheriff (13)
- Computer Forensic Lab (12)
- Computer Triage (12)
- Photo Forensics (12)
- Counter Terrorism (11)
- Cryptocurrency Forensics (11)
- Digital Devices (11)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- mobile device (10)
- technology (10)
- Artificial Intelligence (9)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- ADF Authorized Partner (7)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- Cyber Security (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Forensic Lab Solutions (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cloud Computing Forensics (5)
- Dark Web (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Cloud Forensics (4)
- Collection Key (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Corporate Compliance (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- adf certified training (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Vehicle Forensics (1)
- Virtual Reality (1)