At one time or another, law enforcement agencies find themselves investigating child sexual abuse material. Now more than ever there are a variety of ways in which this material is distributed amongst persons and online. It has become a priority to provide investigators with the tools necessary to identify and report on these materials.
Digital Forensic News & Events

Why You Need Photo Forensics
Photo forensics plays an important role in investigations. Increased access to electronic devices and growing social media platforms mean photos can be an important factor in an investigation.
Here Are 3 Tips To Improve Your Digital Image Forensics Skills
Digital image forensics is the process of identifying and analyzing digital images for the purpose of providing legal evidence. This process can be used to investigate a wide variety of crimes, including child abuse, identity theft, and copyright infringement. Today’s digital era has caused images and videos to become a source of information and entertainment [1].

Speed Digital Investigations with Multimedia
When conducting an investigation involving multimedia, the quantities of files can be quite overwhelming especially when they include Child Exploitation Material (CEM) and Child Sexual Assault Material (CSAM). It is not just the CEM or CSAM that is included in the collection or search, typically there are tens of thousands, if not hundreds of thousands of files including images and videos, that have to be sorted through. Not only can the number of files be daunting, but the reasons for conducting the intense file filtering also have multiple purposes.

Using CAID Hashes in a Child Sexual Abuse Material Investigation
Digital Media Investigators throughout the United Kingdom rely on the Child Abuse Image Database (CAID) in their digital investigations involving Child Sexual Abuse Material (CSAM).

Digital Forensics Age Detection and Facial Analysis
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.

Entity Extraction, Keywords and Classification of Images and Videos (UPDATED JULY 2022)
ADF prioritizes digital evidence collection and provides investigators and examiners post-scan options to speed investigations. Post scan options let digital forensic investigators get fast and relevant evidence to make decisions on-scene and in the forensic lab.

How to Prepare a Sanitized CSAM Report (UPDATED August 2022)
Learn how to easily remove CSAM images and other properties from view
One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.

Using PhotoDNA in Digital Forensics Investigations (Updated in 2022)
Digital Forensic Investigators and Examiners need to be able to find evidence quickly and one of the ways that ADF provides this capability is using PhotDNA.

What is Photo Forensics?
Photo Forensics as a term will typically refer either to the profession dedicated to authenticating digital images to determine authenticity, or, it may refer to the capability of digital forensics software to find and identify photos.

Digital Forensic Search Profiles
With more than a dozen out-of-the-box Search Profiles inside Digital Evidence Investigator® (DEI) and all the ADF digital forensic and triage tools, the ADF Digital Forensic team has created software that enables investigators and forensic examiners to capture files, artifacts, and the digital evidence needed in a wide variety of evidence collection situations.

A Typical Child Exploitation Case Solved by ADF DEI
The investigation began after images consistent with child pornography were uploaded to a social media platform. A search warrant was executed at the residence and an on-scene forensic exam of all electronic media was completed by members of the State Police Computer Crime Unit. Using ADF Digital Evidence Investigator®, investigators discovered images and videos of sexual abuse of an under age child and were able to identify a resident of the household as the suspect. Specifically, investigators located thumbcache images that resulted in identifying a female child that was being sexually abused and identified the suspect.
Posts by Tag
- Digital Forensics (155)
- Law Enforcement (90)
- Digital Evidence Investigator (88)
- Computer Forensics (69)
- How To Video (68)
- Mobile Device Investigator (66)
- DEI PRO (61)
- Digital Evidence (60)
- Triage-Investigator (57)
- Triage-G2 (55)
- Crimes Against Children (53)
- United States (53)
- Mobile Forensics (50)
- ICAC Task Force (46)
- Forensic Triage (42)
- Mobile Device Forensics (42)
- Triage (42)
- Triage-G2 PRO (42)
- Child Exploitation (40)
- Triage-Investigator PRO (40)
- Cyber Crime (37)
- ICAC (30)
- DEI PRO Field Tablet (29)
- Forensic Analysis (29)
- Project Vic (29)
- Human Trafficking (28)
- Law Enforcement Conferences (27)
- Knowledge Base Video (26)
- CSAM (25)
- Computer Forensics Video (25)
- Cyber Forensics (25)
- iOS Forensics (25)
- Android Forensics (24)
- AllinForensics (23)
- United Kingdom (22)
- Forensic Software (21)
- CAID (20)
- Military (19)
- Forensic Training (18)
- Internet Investigation (18)
- Mobile Triage Kits (18)
- High Tech Crime (17)
- Mobile Forensics Video (17)
- Police (17)
- Apple Mac Forensics (16)
- Custom Search Profiles (16)
- Field Forensics (16)
- Digital Media Investigator (15)
- Financial Crime (15)
- Military Police (15)
- Canada (14)
- Search Profiles (13)
- Sheriff (13)
- Photo Forensics (12)
- Computer Forensic Lab (11)
- Computer Triage (11)
- Counter Terrorism (11)
- Digital Devices (11)
- Cryptocurrency Forensics (10)
- Culture Code (10)
- Cybersecurity (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- mobile device (9)
- Anti-Terrorism (8)
- Artificial Intelligence (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- ADF Authorized Partner (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- Cyber Security (6)
- DFIR (6)
- Featured Video (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- iOS (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Cloud Computing Forensics (5)
- District Attorney (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Cloud Forensics (4)
- Collection Key (4)
- Dark Web (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Probation (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Rosoka Add-on (3)
- Security (3)
- Africa (2)
- Constable (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Product Release (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Corporate Compliance (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- Virtual Reality (1)
- adf certified training (1)