Today's access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


2022 ICAC Task Force Training Conferences in the U.S.
The U.S. Department of Justice launched the ICAC Task Force program in 1998 to help law enforcement learn how to prevent, combat and investigate Internet Crimes Against Children. ICAC Task Force training is scheduled regionally across the United States each year.
The ICAC conferences are announced each year and include training and events held in:

Eric Lunser: Digital Forensic Intern Spotlight
ADF Solutions has long been the standard in on-scene forensic examination of digital devices for all types of investigations. Our law enforcement customers are routinely called on to handle all types of investigations, including many that are disturbing in nature, such as child exploitation cases. Along with the stressful workload, law enforcement professionals are often portrayed in a negative light. Members of the Law Enforcement community are selflessly helping every day both in and out of the work environment. We would like to showcase the good work being done by the law enforcement community, beginning with ADF's current Digital Forensic Intern and member of the New York State Police (NYSP), Eric Lunser.

ICAC Investigations with ADF Tools
Investigating crimes against children has been at the forefront of law enforcement’s initiatives to dedicate the specialized manpower and equipment in order to battle this issue. It is not an easy issue to tackle as it manifests in many different ways and sometimes requires three or more specialized units working together to bring the offenders to justice and then another specialized unit to manage the offenders after release. On top of all the investigation time, we add digital devices to the mix, used to commit and perpetrate these crimes. When it comes time to conduct a search warrant, knock and talk, interview, or victim/witness statement, investigators need a solution to find the relevant data, minimize the number of devices brought back to the lab, minimize the impact to victims, witnesses, and innocent family members.

Top 5 Law Enforcement Webinars
Check out our law top law enforcement webinars.

How to Have a Digital Forensic Triage Process that Works Field to Lab
In this 3-minute "How To" video, you'll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.

Virtual National Law Enforcement Training on Child Exploitation NLETC
The 2021 National Law Enforcement Training on Child Exploitation training conference will be held online this year. This annual training event is designed to train and educate prosecutors, digital forensic examiners, investigators, and law enforcement professionals on specialized training in the subject of investigating and prosecuting technology facilitated Crimes Against Children.

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

5 ICAC Investigation Best Practices
Today's access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.

Using PhotoDNA in Digital Forensics Investigations
Digital Forensic Investigators and Examiners need to be able to find evidence quickly and one of the ways that ADF provides this capability is using PhotDNA.

Cyber Response for Missing Child Investigations: NCPTF Conference
This week kicks off the 2020 National Child Protection Task Force Conference. In response to the COVID-19 pandemic, NCPTF has moved the conference and training online as a virtual event with the focus on cyber response for missing child investigations. The topic is of vital importance since so many children around the world are online and at increased risk during the pandemic.

An Interview with Jim Emerson, VP of NW3C
Jim, we want to thank you for the time you’ve taken to chat with us about your work and about your expertise in the areas of white collar and cyber crime. It’s an area ADF is proud to support investigators in. Your work with NW3C covers areas of white collar cyber crime such as fraud, bribery, money laundering, and more. We’ve been proud to partner with NW3C before in our joint webinar and most recently in your Capture the Flag competition!
Gina: How did your background, and 25 years of service in the United States Marine Corps Military police, prepare you for what you’re doing now?

Meet Rich Brown from Project VIC International
Putting Victims First. That’s the message that Richard W. Brown, the CEO of Project VIC International impressed upon me when I had the opportunity to speak to him about how and why he helped found the non-profit organization which helps law enforcement agencies around the world fight child exploitation.

What is CSAM? Key Terminology in the Fight Against Child Exploitation
Child pornography- more properly identified as Child Sexual Abuse Material (CSAM). It’s appalling that there is a need for a definition for this kind of material. U.S. Federal Law defines child pornography as any visual depiction of sexually explicit conduct involving a minor- meaning any person less than 18 years old.

The END Network Abuse Act and the Fight Against Child Exploitation
The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it’s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and videos, and identified over 15,800 victims of online child exploitation and abuse.

OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

2020 ICAC Task Force Training Conferences in the U.S.
The U.S. Department of Justice launched the ICAC Task Force program in 1998 to help law enforcement learn how to prevent, combat and investigate Internet Crimes Against Children. ICAC Task Force training is often held annually within regions across the United States.
COVID-19 Announcement: Due to the global pandemic, many conferences are being rescheduled. Please check the event websites before making any travel plans and stay safe.
The 2020 ICAC conferences are announced each year and include training and events held in:

ADF and Project VIC Help Investigators Stop Child Exploitation
Investigators can leverage ADF digital forensic software on the front-line to investigate and prosecute child exploitation cases

Adding Project Vic Hashes to a Search Profile
When investigating crimes against children cases, Project Vic data sets and Digital Evidence Investigator® (DEI) go hand in hand.
DEI and ADF's other forensic triage and investigation tools give investigators and examiners the ability to categorize image and video media fast -- which is paramount in the fight against child exploitation.
Whether you are an ICAC, CAC, or affiliate task force, DEI is the best tool to help you investigate CSAM / CEM and solve internet crimes against children. In the short 6-minute video below, ADF's digital forensic trainer is going to show you how easy it is to add Project Vic datasets or hashes to a Search Profile.

Industry Solutions for Child Exploitation Investigations
Of all the investigations that a law enforcement agency may undertake, there may be none as difficult to deal with as crimes perpetrated against minors. The proliferation of online child exploitation material continues to be an issue worldwide, from child pornography to the facilitation of human trafficking. Luckily, investigators are not having to combat this problem alone thanks to industry solutions like those provided by ADF Solutions and the organizations below.

2019 NLETC ICAC Training in Georgia
Following the recent ICAC Task Force Commanders Meeting, the Internet Crimes Against Children Task Force Program announced the date and location of the 2019 National Law Enforcement Training on Child Exploitation.

Top 5 ICAC Task Force Conferences in the United States
The U.S. Department of Justice launched the Internet Crimes Against Children Task Force Program (ICAC Program) in 1998 as part of a national strategy to combat and prevent child exploitation. ICAC Task Force training is often held annually within regions across the United States. The exact dates and locations of these law enforcement conferences vary from year to year but below is a short list of the typical conference names and locations:

2018 Florida ICAC Conference to Solve Internet Crimes Against Children
The Florida Internet Crimes Against Children Task Force, along with the Florida Department of Law Enforcement, Child Abduction Response Team (CART) and Offender Registration and Enforcement once again hosted the Florida ICAC Training Symposium.

Digital Forensic Search Profiles
With more than a dozen out-of-the-box Search Profiles inside Digital Evidence Investigator® (DEI) and all the ADF digital forensic and triage tools, the ADF Digital Forensic team has created software that enables investigators and forensic examiners to capture files, artifacts, and the digital evidence needed in a wide variety of evidence collection situations.

Helping Stop Crimes Against Children
ADF is helping stop crimes against children by providing law enforcement with the right tools and training to combat internet crimes against children. As part of our mission to help fight child exploitation, ADF is a returning sponsor of the Crimes Against Children Conference. If you are attending, join ADF Digital Forensic Specialists (Rich Frawley), as he leads a lecture and lab training for participating law enforcement officers:
- On-Scene Digital Investigation Best Practices: From CyberTip to Court Ready Paperwork (Lecture)
- Solving Crimes Against Children with ADF Digital Evidence Investigator® (Hands-on Labs)
Each participant will learn digital forensic best practices for child exploitation cases and receive an extended trial of our DEI software.

ADF Training at NLETC Conference
ADF Solutions, provided hands-on lab training for digital forensic investigators and examiners from throughout the United States at the National Law Enforcement Training on Child Exploitation (NLETC) Conference held in in Atlanta, Georgia this week. The conference seeks to grow and expand the education of law enforcement officers, police investigators and prosecutors in an effort to promote best practices for investigating Internet Crimes Against Children.

Visit ADF at the 2017 Florida ICAC Task Force Conference
ADF sponsored the 2017 Florida ICAC Training Symposium which was sponsored by the FL ICAC Task Force, along with the Florida Department of Law Enforcement, Child Abduction Response Team (CART) and Offender Registration and Enforcement.
The three day event, held in Tampa, Florida is an annual event designed to expand the efforts and knowledge base of law enforcement investigators and prosecutors by providing highly specialized training focused on investigating and prosecuting technology-facilitated crimes against children.

Northwest Regional ICAC Conference for Law Enforcement
ADF will sponsor the Northwest Regional Internet Crimes Against Children Conference. Microsoft has partnered with ICAC to host the event which is designed to expand the efforts and knowledge base of law enforcement investigators, digital forensic examiners, and prosecutors. The event will provide highly specialized lab and lecture based training focused on investigating and prosecuting technology-facilitated crimes against children. Anticipated curriculum will include both child sexual exploitation as well as human trafficking topics and will consist of lectures, case studies, computer labs and exhibitor workshops.

ADF Sponsors Crimes Against Children Conference in Dallas
ADF will sponsor the Crimes Against Children Conference which provides practical and interactive instruction to those fighting crimes against children and helping children heal. Attendees include government and nonprofit agencies in law enforcement, child protective services, and victims of crime.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (131)
- Law Enforcement (89)
- Digital Evidence Investigator (85)
- How To Video (68)
- Mobile Device Investigator (61)
- Computer Forensics (57)
- Triage-Investigator (56)
- Triage-G2 (55)
- United States (53)
- DEI PRO (52)
- Crimes Against Children (49)
- Digital Evidence (49)
- ICAC Task Force (45)
- Forensic Triage (42)
- Triage (42)
- Triage-G2 PRO (40)
- Mobile Forensics (39)
- Triage-Investigator PRO (39)
- Child Exploitation (36)
- Mobile Device Forensics (34)
- Cyber Crime (32)
- Forensic Analysis (29)
- ICAC (29)
- Project Vic (29)
- Law Enforcement Conferences (26)
- DEI PRO Field Tablet (25)
- AllinForensics (23)
- CSAM (23)
- Human Trafficking (22)
- iOS Forensics (22)
- United Kingdom (21)
- Android Forensics (20)
- CAID (20)
- Cyber Forensics (20)
- Forensic Software (18)
- Forensic Training (18)
- High Tech Crime (17)
- Internet Investigation (17)
- Military (17)
- Mobile Triage Kits (17)
- Custom Search Profiles (16)
- Field Forensics (16)
- Police (16)
- Apple Mac Forensics (15)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Computer Forensic Lab (11)
- Counter Terrorism (10)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- technology (10)
- Computer Triage (9)
- DOMEX (9)
- Digital Devices (9)
- IIOC (9)
- Prosecutors (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cryptocurrency Forensics (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Photo Forensics (8)
- Cybersecurity (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- DFIR (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- mobile device (6)
- ADF Authorized Partner (5)
- APFS (5)
- Anti-Forensic Traces (5)
- Artificial Intelligence (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- District Attorney (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- iOS (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Africa (2)
- Constable (2)
- Dark Web (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Saved Credentials (1)
- Technology Partner (1)
- Vehicle Forensics (1)
- Video Forensics (1)
- Virtual Reality (1)
- adf certified training (1)