An Interview with Jim Emerson, VP of NW3C

Jim, we want to thank you for the time you’ve taken to chat with us about your work and about your expertise in the areas of white collar and cyber crime. It’s an area ADF is proud to support..

Go to News article
Sensitive Site Exploitation: Speed and Targeting

Empowering front-line military operators and intelligence agents. 

Go to News article
OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces

As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope. 

The program which provides financial..

Go to News article
ADF Adds New Digital Forensic Analysis Capabilities with Rosoka

ADF & Rosoka Bring the Power of Entity Extraction and Multi-Lingual Translation to the Front-Line in Triage-G2

Bethesda, Maryland: ADF Solutions, the leading provider of automated forensic software..

Go to News article
Meet Brett Shavers, DFIR Training Manager

ADF Bret: Hi Brett, thanks for taking time to talk! My first question is, what’s with the extra “t”? I’m just kidding of course. Growing up, one of my best friends spelled his name with two “t”s so..

Go to News article
What is Sensitive Site Exploitation?

Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world...

Go to News article

Posts by Tag

See all

Recent Posts