Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.
Digital Forensic News & Events


What is an ICAC Task Force?
Most children in the United States now have access to internet services. The internet enables children to have access to vast amounts of valuable and educative information that facilitates their growth. However, the internet further exposes children to numerous dangers. Some of the risks children are exposed to on the internet include pornography, racist, sexist, violent, and demeaning information.
These risks prompted the formation of the Internet Crimes Against Children (ICAC) Task Force program. The organization is a national network of 61 coordinated task forces that represent over 4,500 local, state, and federal law enforcement and prosecutorial agencies. The state and regional ICAC task forces are maintained and expanded by the ICAC program to address technology-facilitated child exploitation crimes.

Collecting Files by Targeted Folders to Speed a Forensic Investigation
Digital Evidence Investigator® gives investigators the ability to customize Search Profiles and determine exactly what and where you want to look for digital evidence. This is especially convenient when looking to tailor a search for a forensic triage type scan or a targeted collection. This is accomplished by using the Targeted Folders Option when creating a custom file capture.

Digital Forensic Search Profiles
With more than a dozen out-of-the-box Search Profiles inside Digital Evidence Investigator® (DEI) and all the ADF digital forensic and triage tools, the ADF Digital Forensic team has created software that enables investigators and forensic examiners to capture files, artifacts, and the digital evidence needed in a wide variety of evidence collection situations.

A Typical Child Exploitation Case Solved by ADF DEI
The investigation began after images consistent with child pornography were uploaded to a social media platform. A search warrant was executed at the residence and an on-scene forensic exam of all electronic media was completed by members of the State Police Computer Crime Unit. Using ADF Digital Evidence Investigator®, investigators discovered images and videos of sexual abuse of an under age child and were able to identify a resident of the household as the suspect. Specifically, investigators located thumbcache images that resulted in identifying a female child that was being sexually abused and identified the suspect.

Helping Stop Crimes Against Children
ADF is helping stop crimes against children by providing law enforcement with the right tools and training to combat internet crimes against children. As part of our mission to help fight child exploitation, ADF is a returning sponsor of the Crimes Against Children Conference. If you are attending, join ADF Digital Forensic Specialists (Rich Frawley), as he leads a lecture and lab training for participating law enforcement officers:
- On-Scene Digital Investigation Best Practices: From CyberTip to Court Ready Paperwork (Lecture)
- Solving Crimes Against Children with ADF Digital Evidence Investigator® (Hands-on Labs)
Each participant will learn digital forensic best practices for child exploitation cases and receive an extended trial of our DEI software.

Forensic Focus Reviews Digital Evidence Investigator
"In summary, I would say DEI is one of the more intuitive tools I've used, because it guides you through your investigation step by step and could easily be used without much training" ...Read the full 2018 Forensic Focus Review of ADF's Digital Evidence Investigator tool.

New Release of Media Exploitation Software: Triage-G2
ADF Solutions, a leading provider of digital forensic and media exploitation software, has released Triage-G2, the latest evolution of ADF's award-winning media exploitation tool. Triage-G2 is deployed by special forces, military and intelligence agencies worldwide and has a proven track record of supporting site exploitation missions, including Tactical Media Exploitation, DOMEX, MEDEX, and biometric identity operations.
Designed for nontechnical operators, Triage-G2 employs a simple two-step process to rapidly scan, extract, and analyze critical intelligence from computers and digital devices. The tool can be deployed on existing computing devices and on a small portable USB key. The collected data can then be easily distributed via portable reports or ingested into data repositories, which include Processing, Exploitation and Dissemination Systems (PED).
Posts by Tag
- Digital Forensics (154)
- Law Enforcement (90)
- Digital Evidence Investigator (88)
- Computer Forensics (69)
- How To Video (68)
- Mobile Device Investigator (66)
- DEI PRO (61)
- Digital Evidence (59)
- Triage-Investigator (57)
- Triage-G2 (55)
- Crimes Against Children (53)
- United States (53)
- Mobile Forensics (50)
- ICAC Task Force (46)
- Forensic Triage (42)
- Mobile Device Forensics (42)
- Triage (42)
- Triage-G2 PRO (42)
- Child Exploitation (40)
- Triage-Investigator PRO (40)
- Cyber Crime (37)
- ICAC (30)
- DEI PRO Field Tablet (29)
- Forensic Analysis (29)
- Project Vic (29)
- Human Trafficking (28)
- Law Enforcement Conferences (27)
- Knowledge Base Video (26)
- CSAM (25)
- Computer Forensics Video (25)
- Cyber Forensics (25)
- iOS Forensics (25)
- Android Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Military (19)
- Forensic Training (18)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Apple Mac Forensics (16)
- Custom Search Profiles (16)
- Field Forensics (16)
- Digital Media Investigator (15)
- Financial Crime (15)
- Military Police (15)
- Canada (14)
- Search Profiles (13)
- Sheriff (13)
- Photo Forensics (12)
- Computer Forensic Lab (11)
- Computer Triage (11)
- Counter Terrorism (11)
- Digital Devices (11)
- Cryptocurrency Forensics (10)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- mobile device (9)
- Anti-Terrorism (8)
- Artificial Intelligence (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- ADF Authorized Partner (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- Cyber Security (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- iOS (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- District Attorney (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Cloud Computing Forensics (4)
- Collection Key (4)
- Dark Web (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Cloud Forensics (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Product Release (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Corporate Compliance (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)