Wildlife trafficking involves capturing, transporting, and selling endangered or protected species and their parts, such as ivory, rhino horn, pangolins, big cats, and exotic birds. The illegal wildlife trade (IWT), valued at $7-23 billion annually, poses one of the most urgent threats to African wildlife. Wildlife trafficking has severe consequences for Africa's biodiversity and ecosystems. It can lead to species depletion, disrupt ecosystems, and contribute to biodiversity loss. Additionally, it often involves organized criminal networks, which can have broader negative impacts on security and governance in affected regions.
Reston, VA - ADF Solutions, Inc. (ADF Solutions), a global leader in digital forensic software, has announced a strategic partnership with the African Wildlife Foundation (AWF) to combat wildlife trafficking in Africa. This collaboration aims to leverage cutting-edge technology and forensic expertise to enhance efforts to combat illegal wildlife trade and protect endangered species.
U.S. Customs and Border Protection works within the Department of Homeland Security to manage, control, and protect borders at and between ports of entry. One of the many tasks of Border Patrol agents is their role in the fight against human trafficking. Victims of Trafficking and Violence Protection Act was signed into law in 2000, initiating the fight against national human trafficking .
U.S. Customs and Border Protection is charged with securing the nation’s borders and ensuring that trade and travel regulations are followed. They detect, identify, prohibit, and apprehend individuals with ties to terrorism. They also police the smuggling of humans, narcotics, weapons, bulk cash, and other prohibited or restricted merchandise . U.S. Customs and Border Protection agents’ job is imperative to the nation’s security, without their work many illegal activities would go undetected.
Grayshift has announced that ADF Solutions is a Certified member of Grayshift's Technology Alliances Program, a digital forensics ecosystem that facilitates open, multi-vendor integration and certifications to improve the effectiveness of digital investigations tools. The program ensures that partner tools:
- Fully and accurately parse GrayKey extractions
- Improve cross-product workflows
- Explore integrations aimed at accelerating investigations
The partnership between ADF Solutions and GrayShift is designed to give law enforcement agencies confidence that they can expect accuracy in ingesting and displaying data from GrayKey extractions to speed investigations.
ADF's Quick-Saved Credentials profile is a powerful profile that extracts the usernames and passwords from Web Browsers and is built so it will not trigger antivirus applications when attempting to collect web credentials. This makes the investigator's job easier on-scene, requires less interaction with the device, and allows for more records to be parsed thereby giving the computer forensic investigator the ability to quickly collect critical information for their investigation.
Learn how to use the ADF Quick Saved Credentials Profile to uncover Web credentials in this short 2-minute video tutorial. Collecting saved credentials quickly gives access to accounts that may have been previously unknown and allows investigators to do preservation orders and search warrants.
ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application.
Welcome! You have a requirement or need and decided to evaluate one of the ADF products for your computer forensic, mobile forensic, or triage workflows. You have observed the videos and have most likely been through a demonstration or two and have a better understanding of the functionality you are looking for. We here at ADF Solutions want to make sure you get the most out of your evaluation, and that starts with a smooth transition to the evaluation phase.
With any of the ADF Mobile products, if you are using the default settings, the mobile backups are being saved to the local drive. The mobile backups can be quite large and quickly fill up your drive leaving you no storage space.
Let’s take a look at how to archive your mobile backups with or without the corresponding scan results.
Within ADF software and forensic triage products, including Digital Evidence Investigator, Triage-Investigator, or Triage-G2, an investigator can quickly find Dark Web traces. This can be done in Quick Profiles but in this video, Rich Frawley shows how to use an Intermediate Profile to triage a suspect machine to identify Dark Web traces. These can be found in ADF's Anti-Forensic Traces Capture.
The Encrypt backup feature in iTunes locks and encodes your information. In this short How To video, Director of Training, Rich Frawley shows investigators how to remove the known iTunes backup password, if required.
Investigators can now scan all available Mac computers (including macs with T2 or M1 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application. Now you can perform digital forensic triage on all Macs including
- macOS T2 chip
- macOS M1 chip
- Mac Fusion Drive
Smartphone Triage is becoming more and more important with the exponential increase in the number of devices and explosion of digital data. Mobile device forensic examiners can use smartphone triage as a first step in early case assessment of incoming devices.
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.
ADF Solutions mobile phone forensic software makes it easier to quickly collect digital evidence from smartphones and tablets with the Digital Forensic screenshot feature in Mobile Device Investigator or ADF PRO tools.
As an investigator you want to be prepared to quickly collect evidence on-scene. This means, when performing smartphone forensics, you need to have the best tools to capture the evidence you encounter during your triage, including cloud storage such as Dropbox for iOS.
Regular Expressions - (also known as "regex") are special strings representing a pattern to be matched in a search operation and they can be particularly useful in mobile and computer forensics investigations.
One of the ways we allow investigators to find and focus on relevant evidence is by allowing investigators to customize and bring in a unique set of keywords using a substring or with regular expressions. ADF forensic tools also implement regular expression keywords in our trace captures and keyword lists. So why are Regular Expressions different from using regular keywords?
ADF digital forensic software is known for rapid file and artifact collection but we're also widely respected for our seamless user interface. No matter whether you are using Mobile Device Investigator, Triage-Investigator, Triage-G2, Digital Evidence Investigator or our PRO tools, ADF tools are designed to make it easy for investigators to quickly determine what to scan and how to scan it.
At ADF, we are mission driven. We are delighted to serve those who serve and some of our most exciting times are when we are adding new features and capabilities, when we learn how they are being used, and of course, on launch days. We hope you'll love what we've created.
Speeding your investigations has always been a primary focus for ADF Solutions and with the launch of ADF Mobile Preview capabilities, you can start looking at phone content immediately without waiting for a backup or imaging to finish.
Are you ready for a big one? Anticipating what your evidence collection needs will be while you are on-scene includes trying to ascertain how many electronic devices you will encounter. ADF makes it easy for you to be prepared.
Anyone who is charged with a "knock and talk" or executing a search warrant knows that the ability to overcome and adapt on-scene is vital to a successful outcome. This is what drove ADF to empower investigators to be able to create a digital evidence Collect
ion Key (CKY).
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.
Kik, also known as Kik Messenger, runs on Android, iOS, and Windows operating systems and is a free app used by more than 200 million people worldwide to send and receive messages that can include photos and videos as well as other content. Kik is popular with children as young as 13 as well as young adults. Because of its popularity with children, the Kik app has become a magnet for child exploitation.
In this short digital forensic How To video, Digital Forensic Specialist, Rich Frawley, walks you through the best settings for Mobile Device Investigator®. Learn how to choose the best Search Profile Capture selection and how to decipher which captures will get you the information you need for your investigation with our mobile phone forensic software.
Why take Digital Forensic Screenshots?
Taking a screenshot of a connected iOS or Android mobile device consists in making a copy of what is displayed on the device screen. This method makes it possible to collect digital evidence that would otherwise not be available in a advanced logical acquisition because the data is protected.
Insight, Collaboration, Agility
AFCEA of Bethesda is has moved the LEAPS 2020 conference to a virtual event. The dates will remain the same with a Wednesday evening virtual reception and panel and a Thursday conference which will feature interactive sessions led by government and industry leaders in public safety and law enforcement.
July 29, 2020 - July 30, 2020
As digital technology becomes more advanced, the potential for its criminal application is magnified. This can result in overwhelming amounts of digital data for law enforcement to inspect in a limited timeframe. Although opportunities to find digital evidence on a perpetrator's or victim's computer may be numerous, the time it takes to search through such vast quantities of data contributes to the issue of growing forensic backlogs.
The ADF digital forensic screenshots feature enables frontline investigators to capture screenshots from any connected iOS or Android mobile device. This feature is useful for investigators who need to capture data that may not be included in a backup or to capture how a particular mobile app or screen appears to the user.