The National Law Enforcement Training on Child Exploitation (NLETC) is a comprehensive training program that provides U.S. law enforcement officers with the knowledge and skills they need to investigate and prosecute child exploitation cases effectively. Child exploitation is a serious crime that can have a devastating impact on victims. So, law enforcement officers need to have the training and resources they need to investigate and prosecute cases that involve Child Sexual Abuse Material (CSAM).
Digital Forensic News & Events

Emerging Trends: Escalating Child Sexual Abuse Content and Growing Online Risks to Children
A recent report from Thorn, a technology nonprofit dedicated to defending children from sexual abuse, highlights the troubling emergence of certain online threats to children on the rise.

Lantern: Protecting Children from Online Sexual Exploitation and Abuse
Online child sexual exploitation and abuse (CSEA) is a global epidemic, and technology companies have a responsibility to do everything they can to combat it. That's why the Tech Coalition, a group of leading technology companies, has launched Lantern, a new initiative to help technology companies share signals about CSEA activity and accounts across platforms.

The Use of Digital Forensic Software in Investigating Crimes Against Children
Digital forensic software is a powerful investigative tool that law enforcement and investigators have turned to for solving crimes against children. Perpetrators have found new avenues to exploit and harm vulnerable children by obtaining sexually explicit content.

3 Ways School Resource Officers Stop CSAM with Mobile Forensics
Child Sexual Abuse Material (CSAM) is a growing problem in schools.

Combating CSAM and Human Trafficking: Digital Forensic Tools for Protecting Vulnerable Individuals
CSAM or child sexual abuse material refers to any visual media depicting children engaged in sexual activity, which is produced, distributed, or accessed for sexual gratification or profit.

5 Things Every ICAC Commander Needs to Know
Child sexual abuse materials are defined as images or videos which show a child engaged or depicted as being engaged in explicitly sexual material [1].

Tackling Human Trafficking in the Digital Age
In recent years, law enforcement and investigators have had to significantly adjust their approach to tackling human trafficking in the face of rapid digitalization.

What is OSEC? (Online Sexual Exploitation of Children)
Online sexual exploitation of children or OSEC is the sexual abuse of children that may be streamed over the internet and the abuser receives payment for the content.

How ADF Can Assist With Prosecutors’ CSAM Cases
Child sexual abuse material or CSAM has become the more common term for child pornography. The term accurately captures the reality of these images and videos. CSAM is distributed heavily through online channels. It has become easier for individuals to perpetuate these videos and images through multiple platforms. These platforms can include social media, online gaming, and email [1].

Meet Larry Cameron, CISO at Anti-Human Trafficking Intelligence Initiative
The Anti-Human Trafficking Intelligence Initiative (ATII) is at the forefront of combating global human trafficking. ATII harnesses the power of corporate social responsibility by working with organizations to raise awareness, build intelligence, and foster technology advancements and strategic data collaboration to help stop human trafficking.

Meet NCPTF's Teresa Jauregui: Bringing Awareness to Human Trafficking
Meet Teresa Jauregui, Legal Director, for the National Child Protection Task Force, NCPTF.

Meet Aaron Kahler: Following Money to Fight Human Trafficking
Meet Aaron Kahler, Founder and Chief Executive at Anti-Human Trafficking Intelligence Initiative (ATII).

How to Stop Human Trafficking: Anti-Human Trafficking Investigations
Stopping human trafficking and modern slavery is a priority for many law enforcement agencies around the world, with specialized investigators leading the fight. The Department of Homeland Security Blue Campaign defines human trafficking as involving the "use of force, fraud, or coercion to obtain some type of labor or commercial sex act. Every year, millions of men, women, and children are trafficked worldwide – including right here in the United States. It can happen in any community and victims can be of any age, race, gender, or nationality. Traffickers might use violence, manipulation, or false promises of well-paying jobs or romantic relationships to lure victims into trafficking situations."

ATII Announces Winners of Global Dark Web Hackathon
ADF Solutions’ partner recently held a global Dark Web Hackathon in advance of Human Trafficking Awareness Month. The Anti-Human Trafficking Intelligence Initiative (ATII) the organization that combats human trafficking through increasing awareness, facilitating intelligence integration & technology advancement, and encouraging strategic data collaboration, today announced the winners of the inaugural annual Darkwebathon. The five-day virtual event attracted more than 330 registrants and generated thousands of reports sharing the ultimate goal of creating actionable intelligence so that law enforcement agencies can be equipped with real data to make arrests.

ICAC Investigations with ADF Tools
Investigating crimes against children has been at the forefront of law enforcement’s initiatives to dedicate the specialized manpower and equipment in order to battle this issue. It is not an easy issue to tackle as it manifests in many different ways and sometimes requires three or more specialized units working together to bring the offenders to justice and then another specialized unit to manage the offenders after release. On top of all the investigation time, we add digital devices to the mix, used to commit and perpetrate these crimes. When it comes time to conduct a search warrant, knock and talk, interview, or victim/witness statement, investigators need a solution to find the relevant data, minimize the number of devices brought back to the lab, minimize the impact to victims, witnesses, and innocent family members.

Learn Digital Forensics Online | ADF Best Practices Webinars of 2021
There are many ways to learn digital forensics. From Certified Training to short How-To videos designed to teach you skills in just a few minutes. One of our favorite forms of learning, however, is our one-hour digital forensic best practices webinars led by our Director of Training, Richard T. Frawley. Rich spent 22 years in law enforcement. Most of that time was as a digital forensic analyst. Here are some of our favorite learning webinars from this year:

How to Have a Digital Forensic Triage Process that Works Field to Lab
In this 3-minute "How To" video, you'll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.

Crimes Against Children Conference 2021
The 2021 Crimes Against Children Conference will be the 33rd annual conference organized by the Dallas Children's Advocacy Center (DCAC) and the Dallas Police Department. More than just another law enforcement conference, the event brings together child advocacy, child protective services, and law enforcement investigators.
Dates: August 9 -13, 2021
Register for the CACC conference.
Live sessions will be held from the 9th to the 13th of August, 2021 with content available to registrants through December 17, 2021.

Virtual National Law Enforcement Training on Child Exploitation NLETC
The 2021 National Law Enforcement Training on Child Exploitation training conference will be held online this year. This annual training event is designed to train and educate prosecutors, digital forensic examiners, investigators, and law enforcement professionals on specialized training in the subject of investigating and prosecuting technology facilitated Crimes Against Children.

Using CAID Hashes in a Child Sexual Abuse Material Investigation
Digital Media Investigators throughout the United Kingdom rely on the Child Abuse Image Database (CAID) in their digital investigations involving Child Sexual Abuse Material (CSAM).

2021 National Cyber Crime Conference
The Massachusetts Attorney General's Office (AGO) has announced the dates for the NCCC 2021 National Cyber Crime Conference (MASS.gov).

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Facial Analytics Capabilities Speed Child Exploitation Investigations
ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the ability for on-scene and lab investigators to leverage the facial analytics and age detection capabilities of Suspect Technologies to speed child exploitation and human trafficking investigations.

Using Philanthropy to Protect Children and Help Stop Human Trafficking
The worldwide COVID-19 pandemic has changed all of our lives in many ways, including our ability to give back. In the midst of the holiday season, this is a time where people often reflect on the year and contemplate giving. So often, many of us volunteer at food pantries, organize toy drives, participate in charity fun runs, or find ways to participate in community service with others.

Entity Extraction, Keywords and Classification of Images and Videos (UPDATED JULY 2022)
ADF prioritizes digital evidence collection and provides investigators and examiners post-scan options to speed investigations. Post scan options let digital forensic investigators get fast and relevant evidence to make decisions on-scene and in the forensic lab.

How to Prepare a Sanitized CSAM Report (UPDATED August 2022)
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Cyber Response for Missing Child Investigations: NCPTF Conference
This week kicks off the 2020 National Child Protection Task Force Conference. In response to the COVID-19 pandemic, NCPTF has moved the conference and training online as a virtual event with the focus on cyber response for missing child investigations. The topic is of vital importance since so many children around the world are online and at increased risk during the pandemic.

Child Sexual Exploitation, Modern Slavery and Human Trafficking
Child sexual exploitation and modern slavery are related aspects of human trafficking which result in the commercial exploitation of children and often being victims of Child Sexual Abuse Material creation as well.

An Interview with Jim Emerson, VP of NW3C
Jim, we want to thank you for the time you’ve taken to chat with us about your work and about your expertise in the areas of white collar and cyber crime. It’s an area ADF is proud to support investigators in. Your work with NW3C covers areas of white collar cyber crime such as fraud, bribery, money laundering, and more. We’ve been proud to partner with NW3C before in our joint webinar and most recently in your Capture the Flag competition!
Gina: How did your background, and 25 years of service in the United States Marine Corps Military police, prepare you for what you’re doing now?

What is CEM? Terminology, Law, and Technology in Australia
What is CEM
In Australian states and territories, CEM refers to “Child Exploitation Material”, otherwise known as child abuse material, child sexual abuse material (CSAM), and child pornography. For digital forensic examiners, telecommunications-based child exploitation includes viewing, copying, downloading, sending, exchanging, soliciting, and making CEM.

7 Tips for Reducing Your Forensic Backlog
Today’s investigators and prosecutors are very familiar with the extreme difficulty in child exploitation cases: getting through your forensic backlog to get to the data in time. Law enforcement officers routinely report that a lack of technology which, combined with stringent time limits, can severely restrict their ability to check devices in a timely manner. ADF understands that digital forensic examinations can be both costly and time-consuming, which hampers investigations into suspects that have downloaded or participated in Child Sexual Abuse Material (CSAM).

Meet Rich Brown from Project VIC International
Putting Victims First. That’s the message that Richard W. Brown, the CEO of Project VIC International impressed upon me when I had the opportunity to speak to him about how and why he helped found the non-profit organization which helps law enforcement agencies around the world fight child exploitation.

Meet LEO: ADF Digital Forensic Mascot
You first met LEO in September 2018 when ADF shared an announcement about the upcoming Crimes Against Children Conference in Dallas, Texas. We came up with the idea of LEO one day when our team was sharing stories about the many successes our Law Enforcement customers were having using our digital forensic software to quickly solve crimes.

What is CAID: The Child Abuse Image Database in the UK
The Child Abuse Image Database (CAID) is the United Kingdom’s national system used by law enforcement to help fight the growing problem of Child Sexual Abuse Material (CSAM). The system helps police detect, flag and analyse illegal digital media images.

What is CSAM? Key Terminology in the Fight Against Child Exploitation
Child pornography- more properly identified as Child Sexual Abuse Material (CSAM). It’s appalling that there is a need for a definition for this kind of material. U.S. Federal Law defines child pornography as any visual depiction of sexually explicit conduct involving a minor- meaning any person less than 18 years old.

The END Network Abuse Act and the Fight Against Child Exploitation
The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it’s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and videos, and identified over 15,800 victims of online child exploitation and abuse.

OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

2020 National Cyber Crime Conference
The Massachusetts Attorney General's Office (AGO) has announced the dates for the NCCC 2020 National Cyber Crime Conference (MASS.gov).

2020 Northwest ICAC Conference
The 2020 Northwest Regional ICAC Conference, has been announced for October 5-9, 2020. The conference is a multi-state, multi-disciplinary Internet Crimes Against Children event which provides training to prosecutors, digital forensic examiners, sheriffs, police investigators and ICAC Task Force members.

2020 Crimes Against Children Conference: Dallas Texas
The 2020 Crimes Against Children Conference in Dallas, Texas, will be the 32nd annual conference organized by the Dallas Children's Advocacy Center and the Dallas Police Department. More than just a law enforcement conference, the event brings together child protection, advocacy and investigators. The event will be held online this year instead of at the usual Sheraton Dallas Hotel location.
Dates: August 10-13, 2020
Register for the Dallas CACC conference.
COVID-19 UPDATE: This year's event will be held virtually.

2019 Northwest ICAC Conference at Microsoft
October 2019 kicks off with the 5th Annual Northwest Regional ICAC Conference, a multi-state, multi-disciplinary event designed to provide lecture and lab training to prosecutors, digital forensic lab examiners, and law enforcement investigators focused on the investigation and prosecution of technology and Internet facilitated crimes against children.

Learn How To Filter Digital Forensic Scan Results in ADF Software
In this short 5 minute video, you'll learn how to filter digital forensic scan results in ADF software. Filtering is available in any table while analyzing any of your scan results. In this how-to video, we'll look at:

ADF and Project VIC Help Investigators Stop Child Exploitation
Investigators can leverage ADF digital forensic software on the front-line to investigate and prosecute child exploitation cases

What is an ICAC Task Force?
Most children in the United States now have access to internet services. The internet enables children to have access to vast amounts of valuable and educative information that facilitates their growth. However, the internet further exposes children to numerous dangers. Some of the risks children are exposed to on the internet include pornography, racist, sexist, violent, and demeaning information.
These risks prompted the formation of the Internet Crimes Against Children (ICAC) Task Force program. The organization is a national network of 61 coordinated task forces that represent over 4,500 local, state, and federal law enforcement and prosecutorial agencies. The state and regional ICAC task forces are maintained and expanded by the ICAC program to address technology-facilitated child exploitation crimes.

Adding Project Vic Hashes to a Search Profile
When investigating crimes against children cases, Project Vic data sets and Digital Evidence Investigator® (DEI) go hand in hand.
DEI and ADF's other forensic triage and investigation tools give investigators and examiners the ability to categorize image and video media fast -- which is paramount in the fight against child exploitation.
Whether you are an ICAC, CAC, or affiliate task force, DEI is the best tool to help you investigate CSAM / CEM and solve internet crimes against children. In the short 6-minute video below, ADF's digital forensic trainer is going to show you how easy it is to add Project Vic datasets or hashes to a Search Profile.

What is the Role of a Digital Media Investigator?
Due to an increase in crimes involving the use of computers and cell phones, there is a growing need for Digital Media Investigators, sometimes referred to as DMIs. They have an important role to play in police investigations and that role is becoming more critical with the proliferation of digital data.
Digital media investigators do more than just sit in a lab looking at hard drives. They are often digital first responders and go out into the field with other law enforcement agents to investigate crimes first hand and offer advice on how to gather digital evidence at a crime scene. Collecting, analyzing and reporting on digital evidence to be used to prosecute and convict criminals is a vital role for DMIs in the United Kingdom and elsewhere.

Industry Solutions for Child Exploitation Investigations
Of all the investigations that a law enforcement agency may undertake, there may be none as difficult to deal with as crimes perpetrated against minors. The proliferation of online child exploitation material continues to be an issue worldwide, from child pornography to the facilitation of human trafficking. Luckily, investigators are not having to combat this problem alone thanks to industry solutions like those provided by ADF Solutions and the organizations below.

What is a Search Profile?
ADF digital forensic software including Digital Evidence Investigator® (DEI) and Triage-Investigator® come with out-of-the-box default Search Profiles. In this short video tutorial, we use Digital Evidence Investigator to demonstrate "What is a Search Profile?".
In DEI the Search Profiles are maintained in the Setup Scans Menu option. The Search Profile, when run, will collect the information selected within the Search Profile. Search Profiles will run from the desktop application or from the collection key on a Live or Boot scan.

2019 NLETC ICAC Training in Georgia
Following the recent ICAC Task Force Commanders Meeting, the Internet Crimes Against Children Task Force Program announced the date and location of the 2019 National Law Enforcement Training on Child Exploitation.

National Slavery and Human Trafficking Prevention Month
January 2019 is National Slavery and Human Trafficking Prevention Month
Human trafficking has been a federal crime in the United States since The Trafficking Victims Protection Act of 2000 was passed into law as a federal statute. Each year since 2010 has been designated National Slavery and Human Trafficking Prevention Month with January 11th each year being observed as National Human Trafficking Awareness Day.

What is Project VIC?
Project VIC is a nonprofit organization founded by Rich Brown and former U.S. law enforcement officials who saw the need to normalize data between digital forensic tools, software vendors, and service providers in order to focus the community on building enhanced workflows to more rapidly identify victims of child exploitation (CSAM, CEM) and human trafficking.

Solving Internet Crimes Against Children in the Pacific Northwest
This October kicks off with the fourth annual Northwest Regional ICAC Conference, a multi-state, multi-disciplinary event designed to provide lecture and lab training to prosecutors, digital forensic examiners, and law enforcement investigators focused on the investigation and prosecution of technology-facilitated crimes against children.

Targeted Forensic Examinations Save Time in Child Exploitation Cases
A criminal forensic lab located in one of the largest U.S. Federal agencies was working on an extensive child exploitation case and had seized 37 total hard drives that contained over 38 terabytes of data. The case was high profile and the forensic team had a short window of time to examine the contents of the confiscated drives. Technical resources were limited and imaging drives and conducting traditional forensic examinations would be very time consuming. With the amount of data that needed to be searched, the investigators realized that it could potentially be weeks before the examinations were complete and the case could move forward. In addition the case would require significant disk storage space to hold all of the images.

Celebrate the 5th Annual National Forensic Service Week
During the week of September 16 - 22, 2018, we invite you to join us in recognizing the critical role that forensic science plays in criminal investigations and we give thanks for the dedication of the thousands of forensic professionals who serve our communities nationwide.

Crimes Against Children 2019 Conference Announced
Coming off the 30th annual Crimes Against Children Conference in Dallas, Texas, conference organizers announced that the 31st annual conference is scheduled for August 12-15, 2019 at the Sheraton Dallas Hotel.

A Typical Child Exploitation Case Solved by ADF DEI
The investigation began when law enforcement officials received a report that images that were consistent with child pornography had been uploaded to a social media platform. The images were immediately flagged, and investigators swiftly obtained a search warrant to gain access to the suspect's residence. Once inside the residence, members of the State Police Computer Crime Unit conducted an on-scene forensic examination of all electronic media, including computers, phones, and other electronic devices. This examination was conducted with the utmost care and attention to detail to ensure that all potential evidence was discovered and preserved. The examination proved to be invaluable, as it revealed a trove of images and videos of sexual abuse of an under age child, leading investigators to identify a resident of the household as the suspect. Through their tireless efforts, these investigators were able to bring a dangerous criminal to justice and protect innocent children from further harm.
Using ADF Digital Evidence Investigator®, investigators discovered images and videos of sexual abuse of an under age child and were able to identify a resident of the household as the suspect. Specifically, investigators located thumbcache images that resulted in identifying a female child that was being sexually abused and identified the suspect.

Helping Stop Crimes Against Children
ADF is helping stop crimes against children by providing law enforcement with the right tools and training to combat internet crimes against children. As part of our mission to help fight child exploitation, ADF is a returning sponsor of the Crimes Against Children Conference. If you are attending, join ADF Digital Forensic Specialists (Rich Frawley), as he leads a lecture and lab training for participating law enforcement officers:
- On-Scene Digital Investigation Best Practices: From CyberTip to Court Ready Paperwork (Lecture)
- Solving Crimes Against Children with ADF Digital Evidence Investigator® (Hands-on Labs)
Each participant will learn digital forensic best practices for child exploitation cases and receive an extended trial of our DEI software.

ADF Training at NLETC Conference
ADF Solutions, provided hands-on lab training for digital forensic investigators and examiners from throughout the United States at the National Law Enforcement Training on Child Exploitation (NLETC) Conference held in in Atlanta, Georgia this week. The conference seeks to grow and expand the education of law enforcement officers, police investigators and prosecutors in an effort to promote best practices for investigating Internet Crimes Against Children.

ADF Sponsors Crimes Against Children Conference in Dallas
ADF will sponsor the Crimes Against Children Conference which provides practical and interactive instruction to those fighting crimes against children and helping children heal. Attendees include government and nonprofit agencies in law enforcement, child protective services, and victims of crime.
Posts by Tag
- Digital Forensics (167)
- Digital Evidence Investigator (95)
- Law Enforcement (94)
- Mobile Device Investigator (79)
- Computer Forensics (75)
- DEI PRO (72)
- How To Video (70)
- Digital Evidence (66)
- Mobile Forensics (63)
- Crimes Against Children (60)
- Triage-Investigator (57)
- Triage-G2 (56)
- Mobile Device Forensics (55)
- United States (54)
- ICAC Task Force (49)
- Child Exploitation (45)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Triage (42)
- Cyber Crime (41)
- Triage-Investigator PRO (40)
- ICAC (34)
- CSAM (33)
- Human Trafficking (32)
- DEI PRO Field Tablet (31)
- iOS Forensics (31)
- Law Enforcement Conferences (30)
- Project Vic (30)
- Cyber Forensics (29)
- Forensic Analysis (29)
- Android Forensics (28)
- Knowledge Base Video (26)
- United Kingdom (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- Forensic Training (22)
- CAID (21)
- Military (21)
- Police (20)
- Internet Investigation (19)
- Apple Mac Forensics (17)
- Custom Search Profiles (17)
- Field Forensics (17)
- High Tech Crime (17)
- Military Police (17)
- Mobile Forensics Video (17)
- Digital Media Investigator (16)
- Financial Crime (16)
- Canada (15)
- ADF Authorized Partner (14)
- Sheriff (14)
- Artificial Intelligence (13)
- Computer Forensic Lab (13)
- Prosecutors (13)
- Search Profiles (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Cybersecurity (12)
- Digital Devices (12)
- Photo Forensics (12)
- mobile device (12)
- Cryptocurrency Forensics (11)
- technology (11)
- Culture Code (10)
- Early Case Assessment (10)
- IIOC (10)
- RAM Capture (10)
- iOS (10)
- DOMEX (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Cloud Forensics (7)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Griffeye (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Machine Learning (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- Africa (4)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Press Release (4)
- Probation (4)
- Product Release (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Facial Analytics (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Screen Recording (2)
- Screen Shots (2)
- Sex Offender Management (2)
- Social Media Discovery (2)
- Technology Partner (2)
- Thailand (2)
- Virtual Reality (2)
- Wildlife Trafficking (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- eDiscovery (1)