As you may know, the dark web is one of the most complex and secretive networks out there that many criminal and intelligence networks use to attack civilians and federal systems. In addition, much of the online child exploitive material and stolen identities are committed using the dark web. As tools are being developed to explore these criminals' hidden servers and chatrooms, law enforcement professionals and investigators still need a process to investigate these types of crimes quickly but with absolute thoroughness.
Digital Forensic News & Events

The Hidden Web
You may have heard a bit about the dark web and how it is used for illicit activities such as buying and selling drugs, firearms, or other illegal items. But this is only part of the problem. The dark web has much more to offer a malicious user than criminals looking to sell stolen items. The dark web provides anonymous users the ability to stalk children, steal identities, and do many more criminal activities.

ATII Announces Winners of Global Dark Web Hackathon
ADF Solutions’ partner recently held a global Dark Web Hackathon in advance of Human Trafficking Awareness Month. The Anti-Human Trafficking Intelligence Initiative (ATII) the organization that combats human trafficking through increasing awareness, facilitating intelligence integration & technology advancement, and encouraging strategic data collaboration, today announced the winners of the inaugural annual Darkwebathon. The five-day virtual event attracted more than 330 registrants and generated thousands of reports sharing the ultimate goal of creating actionable intelligence so that law enforcement agencies can be equipped with real data to make arrests.

Find Anti-Forensic and Dark Web Traces with ADF Triage Software
Within ADF software and forensic triage products, including Digital Evidence Investigator, Triage-Investigator, or Triage-G2, an investigator can quickly find Dark Web traces. This can be done in Quick Profiles but in this video, Rich Frawley shows how to use an Intermediate Profile to triage a suspect machine to identify Dark Web traces. These can be found in ADF's Anti-Forensic Traces Capture.
Posts by Tag
- Digital Forensics (154)
- Law Enforcement (90)
- Digital Evidence Investigator (87)
- Computer Forensics (69)
- How To Video (68)
- Mobile Device Investigator (66)
- DEI PRO (60)
- Digital Evidence (59)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (53)
- Crimes Against Children (52)
- Mobile Forensics (49)
- ICAC Task Force (46)
- Forensic Triage (42)
- Triage (42)
- Triage-G2 PRO (42)
- Mobile Device Forensics (41)
- Triage-Investigator PRO (40)
- Child Exploitation (39)
- Cyber Crime (36)
- ICAC (30)
- Forensic Analysis (29)
- Project Vic (29)
- DEI PRO Field Tablet (28)
- Human Trafficking (27)
- Law Enforcement Conferences (27)
- Knowledge Base Video (26)
- CSAM (25)
- Computer Forensics Video (25)
- Android Forensics (24)
- Cyber Forensics (24)
- iOS Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Forensic Training (18)
- Internet Investigation (18)
- Military (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Apple Mac Forensics (16)
- Custom Search Profiles (16)
- Field Forensics (16)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Photo Forensics (12)
- Computer Forensic Lab (11)
- Computer Triage (11)
- Counter Terrorism (11)
- Digital Devices (11)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- Cryptocurrency Forensics (9)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- mobile device (9)
- Anti-Terrorism (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- ADF Authorized Partner (7)
- Artificial Intelligence (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cyber Security (5)
- District Attorney (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- iOS (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Dark Web (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Cloud Computing Forensics (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Cloud Forensics (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Corporate Compliance (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- Product Release (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)