Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Facial Analytics Capabilities Speed Child Exploitation Investigations
ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the ability for on-scene and lab investigators to leverage the facial analytics and age detection capabilities of Suspect Technologies to speed child exploitation and human trafficking investigations.

Using Philanthropy to Protect Children and Help Stop Human Trafficking
The worldwide COVID-19 pandemic has changed all of our lives in many ways, including our ability to give back. In the midst of the holiday season, this is a time where people often reflect on the year and contemplate giving. So often, many of us volunteer at food pantries, organize toy drives, participate in charity fun runs, or find ways to participate in community service with others.

5 ICAC Investigation Best Practices
Today's access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.

ADF and ATII Join Forces to Combat Human Trafficking
ADF launches New Law Enforcement Capabilities to Speed Modern Slavery Investigations
Bethesda, Maryland: ADF Solutions’ new Anti-Human Trafficking Search Profiles were built in conjunction with the Anti-Human Trafficking Intelligence Initiative (ATII) to help law enforcement quickly identify and investigate human trafficking at the scene of the crime.

How to Prepare a Sanitized CSAM Report
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Cyber Response for Missing Child Investigations: NCPTF Conference
This week kicks off the 2020 National Child Protection Task Force Conference. In response to the COVID-19 pandemic, NCPTF has moved the conference and training online as a virtual event with the focus on cyber response for missing child investigations. The topic is of vital importance since so many children around the world are online and at increased risk during the pandemic.

Child Sexual Exploitation, Modern Slavery and Human Trafficking
Child sexual exploitation and modern slavery are related aspects of human trafficking which result in the commercial exploitation of children and often being victims of Child Sexual Abuse Material creation as well.

ADF Solutions Releases Screen Capture for Field Investigators
ADF’s newest software versions include new field tablet capabilities and smartphone collection features

What is CEM? Terminology, Law, and Technology in Australia
What is CEM
In Australian states and territories, CEM refers to “Child Exploitation Material”, otherwise known as child abuse material, child sexual abuse material (CSAM), and child pornography. For digital forensic examiners, telecommunications-based child exploitation includes viewing, copying, downloading, sending, exchanging, soliciting, and making CEM.

Meet Rich Brown from Project VIC International
Putting Victims First. That’s the message that Richard W. Brown, the CEO of Project VIC International impressed upon me when I had the opportunity to speak to him about how and why he helped found the non-profit organization which helps law enforcement agencies around the world fight child exploitation.

What is CAID: The Child Abuse Image Database in the UK
The Child Abuse Image Database (CAID) is the United Kingdom’s national system used by law enforcement to help fight the growing problem of Child Sexual Abuse Material (CSAM). The system helps police detect, flag and analyse illegal digital media images.

What is CSAM? Key Terminology in the Fight Against Child Exploitation
Child pornography- more properly identified as Child Sexual Abuse Material (CSAM). It’s appalling that there is a need for a definition for this kind of material. U.S. Federal Law defines child pornography as any visual depiction of sexually explicit conduct involving a minor- meaning any person less than 18 years old.

The END Network Abuse Act and the Fight Against Child Exploitation
The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it’s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and videos, and identified over 15,800 victims of online child exploitation and abuse.

OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

2020 National Cyber Crime Conference
The Massachusetts Attorney General's Office (AGO) has announced the dates for the NCCC 2020 National Cyber Crime Conference (MASS.gov).

2019 Northwest ICAC Conference at Microsoft
October 2019 kicks off with the 5th Annual Northwest Regional ICAC Conference, a multi-state, multi-disciplinary event designed to provide lecture and lab training to prosecutors, digital forensic lab examiners, and law enforcement investigators focused on the investigation and prosecution of technology and Internet facilitated crimes against children.

Learn How To Filter Digital Forensic Scan Results in ADF Software
In this short 5 minute video, you'll learn how to filter digital forensic scan results in ADF software. Filtering is available in any table while analyzing any of your scan results. In this how-to video, we'll look at:

ADF and Project VIC Help Investigators Stop Child Exploitation
Investigators can leverage ADF digital forensic software on the front-line to investigate and prosecute child exploitation cases

Digital Forensic Image Recognition and Classification
Front line investigators and digital forensic examiners are encountering an ever increasing number of images in almost every investigation they perform. This exponential growth in the volume of images can challenge investigators searching for illicit online activity, Child Sexual Abuse Material (CSAM), extremist propaganda, or other types of image content.
In this short video, ADF digital forensic specialist, Rich Frawley, demonstrates ADF's digital forensic image recognition and classification capabilities.

Building Efficiency into Digital Forensic Programs
Technology has become more powerful and portable, allowing a more significant amount of information to be created, stored, and accessed. This shift in the information technology landscape (mobile, cloud, IoT, etc.) has made the collection and analysis of digital evidence a critical factor in investigating and solving virtually all types of crimes.
There are serious Internet related crimes, that need to be investigated quickly, child exploitation related offenses for instance. For example, in the United Kingdom, the National Crime Agency recently estimated that about 140,000 out of nearly 3 million registered dark web accounts registered on child abuse sites are UK-based.

Scan iOS Devices with Mobile Device Investigator
Learn how to quickly scan iOS devices, smartphones or tablets, in this 2 minute short "How To" video created by Rich Frawley, our Director of Digital Forensic Training. Rich will walk you through how to attach and scan an iOS device with Mobile Device Investigator® (MDI) using an iPhone.

What is an ICAC Task Force?
Most children in the United States now have access to internet services. The internet enables children to have access to vast amounts of valuable and educative information that facilitates their growth. However, the internet further exposes children to numerous dangers. Some of the risks children are exposed to on the internet include pornography, racist, sexist, violent, and demeaning information.
These risks prompted the formation of the Internet Crimes Against Children (ICAC) Task Force program. The organization is a national network of 61 coordinated task forces that represent over 4,500 local, state, and federal law enforcement and prosecutorial agencies. The state and regional ICAC task forces are maintained and expanded by the ICAC program to address technology-facilitated child exploitation crimes.

Heading to the 2019 National Cyber Crime Conference (NCCC)
If you're headed to the 2019 National Cyber Crime Conference in Noorwood, MA next week please make time to stop by the ADF Solutions booth to say hello and to enter our drawing for a US combat veteran, handmade keepsake from a Flag of Valor for your home or forensic lab.
Rich Frawley, our Digital Forensic Specialist, who spent 22 years in law enforcement will be leading 3 digital forensic training sessions:
- Solving Crimes Against Children with Digital Evidence Investigator (In the NW3C Lab)
- Introducing ADF Mobile Device Investigator (iOS & Android)
- On-Scene Digital Investigation Best Practices: from CyberTip to Court-Ready Paperwork

Adding Project Vic Hashes to a Search Profile
When investigating crimes against children cases, Project Vic data sets and Digital Evidence Investigator® (DEI) go hand in hand.
DEI and ADF's other forensic triage and investigation tools give investigators and examiners the ability to categorize image and video media fast -- which is paramount in the fight against child exploitation.
Whether you are an ICAC, CAC, or affiliate task force, DEI is the best tool to help you investigate CSAM / CEM and solve internet crimes against children. In the short 6-minute video below, ADF's digital forensic trainer is going to show you how easy it is to add Project Vic datasets or hashes to a Search Profile.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (104)
- Law Enforcement (75)
- Digital Evidence Investigator (71)
- How To Video (57)
- Mobile Device Investigator (55)
- Triage-Investigator (49)
- Triage-G2 (48)
- United States (48)
- DEI PRO (43)
- Computer Forensics (40)
- Crimes Against Children (38)
- ICAC Task Force (38)
- Digital Evidence (37)
- Triage (36)
- Forensic Triage (35)
- Triage-G2 PRO (32)
- Triage-Investigator PRO (31)
- Mobile Device Forensics (29)
- Mobile Forensics (29)
- Cyber Crime (27)
- Project Vic (27)
- Child Exploitation (26)
- Forensic Analysis (26)
- ICAC (23)
- iOS Forensics (22)
- AllinForensics (21)
- Android Forensics (19)
- Law Enforcement Conferences (19)
- CAID (18)
- DEI PRO Field Tablet (18)
- United Kingdom (18)
- CSAM (16)
- Cyber Forensics (16)
- Military (16)
- Forensic Software (15)
- High Tech Crime (14)
- Police (14)
- Field Forensics (13)
- Human Trafficking (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Military Police (12)
- Mobile Triage Kits (12)
- Sheriff (12)
- Canada (11)
- Internet Investigation (11)
- Culture Code (10)
- Early Case Assessment (10)
- Forensic Training (10)
- RAM Capture (10)
- Search Profiles (10)
- IIOC (9)
- Site Exploitation (9)
- technology (9)
- Computer Forensic Lab (8)
- Counter Terrorism (8)
- DOMEX (8)
- Hash Sets (8)
- MDI Field Tablet (8)
- forensics (8)
- Apple Mac Forensics (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Photo Forensics (7)
- Project VIC UK (7)
- Prosecutors (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- Griffeye (6)
- Identity Operations (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Artificial Intelligence (3)
- Certified Forensic Computer Examiner (3)
- Forensic Lab Solutions (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Data Analytics (2)
- Detective (2)
- Drone Forensics (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Machine Learning (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)