As cyber threats and online criminal activities continue to become more sophisticated, it is essential to understand the complexities of the digital world and how the latest advancements in crypto forensics can help combat cyberterrorism.
Digital Forensic News & Events


What Are Cryptocurrency Traces?
This post will serve as a brief overview for forensic investigators on the importance of cryptocurrency traces and investigating cryptocurrency traces found on suspect devices. Cryptocurrency has grown tremendously over the last decade and has served as a new avenue for criminals to conduct transactions that are not regulated.

Next-Generation Digital Forensics Software: 5 Areas That You Want Your Department To Be Ahead In
Even though Digital Forensics has expanded its capabilities and use-cases since its inception, it is constantly evolving and you need to be prepared for the changes coming. New features on computers and smartphones are causing existing digital forensics features to be outdated and unreliable when investigating. New crimes are being committed and the tools in existence are not capable of collecting and processing that sort of evidence yet. But not to worry, there are many companies out there researching tools to handle investigations in critical areas of development. Here are 5 key areas you want to make sure your team has the most up-to-date technology and the most experienced training.

5 Reasons Why You Need to Invest in Computer Forensics Software
Many are not aware of the common threats/investigations that officers, analysts, and investigators face on-scene or in the lab and how computer forensics software can help solve these investigations.

The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking
The Global Forensic and Justice Center hosted a panel on The Value of Digital Evidence in Combatting Child Exploitation and Human Trafficking. The panelists included:
- Alexandria Wong, Digital Media (DOMEX) Trainer with the Global Forensic and Justice Center and FIU
- Sondra Skelaney, Gender Violence Prevention Program Coordinator with CASE and FIU
- Ailsa Slack, Director of Customer Success of ADF Solutions.
The panel focused on the role of technology, forensics, and digital evidence and revolved around four central questions which are highlighted below along with the key points discussed by the panel of subject matter experts.

Cryptocurrency and Terrorism
Cryptocurrency has expanded in use since it was created in 2009. The idea of creating a decentralized currency to avoid the regulation of banks and governments created a new avenue not only for criminals but also for terrorist organizations. Terrorists such as jihadists around the world have been trading crypto coins to purchase weapons and drugs to continue their attacks on innocent civilians.

Solving Financial Crimes: Preparing for a Financial Crime Investigation
When starting an investigation we start thinking about what we need or who we need to contact when it comes to specific crime types. As investigators we do this second nature, it is a process that just happens, and if we have never investigated a certain crime it can be overwhelming at times. Specific crimes often need specialized training and have agencies that may need to be contacted for assistance. When it comes to the digital evidence we also start thinking of the steps that need to be taken and how we are going to put things together. Let’s not let this be overwhelming as well.

Meet Aaron Kahler: Following Money to Fight Human Trafficking
Meet Aaron Kahler, Founder and Chief Executive at Anti-Human Trafficking Intelligence Initiative (ATII).

The Need for Digital Forensics Tools for Financial Crimes
As the world’s financial systems advance in digital technology and cryptocurrency, the need for digital forensics grows greater. The use of blockchain technology has allowed crimes to go undetected through the eyes of a regular investigator. These crimes no longer take months of in-depth planning and deception before executing but can now be committed within minutes because of the processing power of computers and the speed of the internet. Crimes such as:

An Interview with Jim Emerson, VP of NW3C
Jim, we want to thank you for the time you’ve taken to chat with us about your work and about your expertise in the areas of white collar and cyber crime. It’s an area ADF is proud to support investigators in. Your work with NW3C covers areas of white collar cyber crime such as fraud, bribery, money laundering, and more. We’ve been proud to partner with NW3C before in our joint webinar and most recently in your Capture the Flag competition!
Gina: How did your background, and 25 years of service in the United States Marine Corps Military police, prepare you for what you’re doing now?
Posts by Tag
- Digital Forensics (154)
- Law Enforcement (90)
- Digital Evidence Investigator (88)
- Computer Forensics (69)
- How To Video (68)
- Mobile Device Investigator (66)
- DEI PRO (61)
- Digital Evidence (59)
- Triage-Investigator (57)
- Triage-G2 (55)
- Crimes Against Children (53)
- United States (53)
- Mobile Forensics (50)
- ICAC Task Force (46)
- Forensic Triage (42)
- Mobile Device Forensics (42)
- Triage (42)
- Triage-G2 PRO (42)
- Child Exploitation (40)
- Triage-Investigator PRO (40)
- Cyber Crime (37)
- ICAC (30)
- DEI PRO Field Tablet (29)
- Forensic Analysis (29)
- Project Vic (29)
- Human Trafficking (28)
- Law Enforcement Conferences (27)
- Knowledge Base Video (26)
- CSAM (25)
- Computer Forensics Video (25)
- Cyber Forensics (25)
- iOS Forensics (25)
- Android Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Military (19)
- Forensic Training (18)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Apple Mac Forensics (16)
- Custom Search Profiles (16)
- Field Forensics (16)
- Digital Media Investigator (15)
- Financial Crime (15)
- Military Police (15)
- Canada (14)
- Search Profiles (13)
- Sheriff (13)
- Photo Forensics (12)
- Computer Forensic Lab (11)
- Computer Triage (11)
- Counter Terrorism (11)
- Digital Devices (11)
- Cryptocurrency Forensics (10)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- mobile device (9)
- Anti-Terrorism (8)
- Artificial Intelligence (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- ADF Authorized Partner (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- Cyber Security (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- iOS (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- District Attorney (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Cloud Computing Forensics (4)
- Collection Key (4)
- Dark Web (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Cloud Forensics (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Product Release (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Corporate Compliance (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)