Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Entity Extraction, Keywords and Classification of Images and Videos
ADF prioritizes digital evidence collection and provides investigators and examiners post-scan options to speed investigations. Post scan options let digital forensic investigators get fast and relevant evidence to make decisions on-scene and in the forensic lab.

How to Prepare a Sanitized CSAM Report
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Using PhotoDNA in Digital Forensics Investigations
Digital Forensic Investigators and Examiners need to be able to find evidence quickly and one of the ways that ADF provides this capability is using PhotDNA.

What is Photo Forensics?
Photo Forensics as a term will typically refer either to the profession dedicated to authenticating digital images to determine authenticity, or, it may refer to the capability of digital forensics software to find and identify photos.

Digital Forensic Search Profiles
With eleven (11) out-of-the-box Search Profiles inside Digital Evidence Investigator® (DEI), the ADF Digital Forensic team has created software that enables investigators and forensic examiners to obtain the digital evidence needed in a wide variety of evidence collection situations.

A Typical Child Exploitation Case Solved by ADF DEI
The investigation began after images consistent with child pornography were uploaded to a social media platform. A search warrant was executed at the residence and an on-scene forensic exam of all electronic media was completed by members of the State Police Computer Crime Unit. Using ADF Digital Evidence Investigator®, investigators discovered images and videos of sexual abuse of an under age child and were able to identify a resident of the household as the suspect. Specifically, investigators located thumbcache images that resulted in identifying a female child that was being sexually abused and identified the suspect.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (104)
- Law Enforcement (75)
- Digital Evidence Investigator (71)
- How To Video (57)
- Mobile Device Investigator (55)
- Triage-Investigator (49)
- Triage-G2 (48)
- United States (48)
- DEI PRO (43)
- Computer Forensics (40)
- Crimes Against Children (38)
- ICAC Task Force (38)
- Digital Evidence (37)
- Triage (36)
- Forensic Triage (35)
- Triage-G2 PRO (32)
- Triage-Investigator PRO (31)
- Mobile Device Forensics (29)
- Mobile Forensics (29)
- Cyber Crime (27)
- Project Vic (27)
- Child Exploitation (26)
- Forensic Analysis (26)
- ICAC (23)
- iOS Forensics (22)
- AllinForensics (21)
- Android Forensics (19)
- Law Enforcement Conferences (19)
- CAID (18)
- DEI PRO Field Tablet (18)
- United Kingdom (18)
- CSAM (16)
- Cyber Forensics (16)
- Military (16)
- Forensic Software (15)
- High Tech Crime (14)
- Police (14)
- Field Forensics (13)
- Human Trafficking (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Military Police (12)
- Mobile Triage Kits (12)
- Sheriff (12)
- Canada (11)
- Internet Investigation (11)
- Culture Code (10)
- Early Case Assessment (10)
- Forensic Training (10)
- RAM Capture (10)
- Search Profiles (10)
- IIOC (9)
- Site Exploitation (9)
- technology (9)
- Computer Forensic Lab (8)
- Counter Terrorism (8)
- DOMEX (8)
- Hash Sets (8)
- MDI Field Tablet (8)
- forensics (8)
- Apple Mac Forensics (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Photo Forensics (7)
- Project VIC UK (7)
- Prosecutors (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- Griffeye (6)
- Identity Operations (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Artificial Intelligence (3)
- Certified Forensic Computer Examiner (3)
- Forensic Lab Solutions (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Data Analytics (2)
- Detective (2)
- Drone Forensics (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Machine Learning (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)