You searched for dei-pro-field-tablet - ADF Solutions https://adfsolutions.com/ Wed, 11 Mar 2026 14:16:52 +0000 en-US hourly 1 https://adfsolutions.com/wp-content/uploads/2026/01/favicon-150x150.png You searched for dei-pro-field-tablet - ADF Solutions https://adfsolutions.com/ 32 32 Digital Forensics Age Detection and Facial Analysis https://adfsolutions.com/facial-analysis-age-detection/ Mon, 05 Aug 2024 00:00:00 +0000 https://adfsolutions.com/?p=15096 Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly.  ADF’s Digital Forensics Age Detection capabilities allow investigators to take advantage of automated facial analysis and image recognition to filter results. The system can automatically...

The post Digital Forensics Age Detection and Facial Analysis appeared first on ADF Solutions.

]]>
Crimes against children investigations can lead CSAM investigators to have to review thousands or even tens of thousands of images. Investigators need tools to help them find relevant evidence quickly. 

ADF’s Digital Forensics Age Detection capabilities allow investigators to take advantage of automated facial analysis and image recognition to filter results. The system can automatically find and detect images of:

  • Infants
  • Toddlers
  • Children
  • Adults

Combined with ADF’s built in support for Project VIC and CAID hashsets, as well as ADF’s hashing, matching and photo probability capabilities, and built in Search Profiles, investigators are empowered to start identifying victims and suspects to make intelligent, on-scene decisions. 

In this short 3-minute video, you’ll learn how Internet Crimes Against Children investigators can get the most out of ADF triage and digital forensic software. 

Investigating Child Exploitation Material 

ADF tools are designed to make it easy for field investigators to triage mobile phones, tablets, computers and digital devices and include capabilities built specifically for ICAC Task Forces and law enforcement agents dedicated to investigating cybercrimes against children. 

  • Project Vic and CAID – Classifying and auto tagging gives investigators and forensic examiners the ability to remove these images from the gallery and analysis.
  • Hashing – Provides investigators the ability to auto tag and remove from view.
  • Matching – Automatically indicates and moves images to the top for easy tagging images that match a keyword or hash value.

Photo Probability

  • Age Detection – Is set in the Search Profile and when customized can be enabled or disabled – it can also be prioritized before picture and video classification.
  • Default Search Profiles – Are configured to run age detection and can be paused if not required for an investigation.
  • Classification Button – To display post-scan processing tasks progress. These tasks include the visual classification of pictures, videos, age group detection, and entity extraction which is included with the Rosoka Add-On. This functionality also enables examiners to pause and resume post-scan tasks.

Investigators can also access Pictures or Video views filtered by a visual class once the classification is finished or paused.

How to Use Age Group Detection

Forensic examiners and digital media investigators can use the Age Group property filter to quickly eliminate pictures of adults to focus on different age groups – or select all – if the goal is to have all children as you may not be looking for a specific age group in an investigation. Once tagged items can be filtered out thereby reducing the gallery of items to be analyzed.

 

You might also like:

The post Digital Forensics Age Detection and Facial Analysis appeared first on ADF Solutions.

]]>
How ADF Supports Wildlife Trafficking Investigations in Africa https://adfsolutions.com/how-adf-supports-wildlife-trafficking-investigations-in-africa/ Wed, 15 Nov 2023 00:00:00 +0000 https://adfsolutions.com/how-adf-supports-wildlife-trafficking-investigations-in-africa/ Wildlife trafficking involves capturing, transporting, and selling endangered or protected species and their parts, such as ivory, rhino horn, pangolins, big cats, and exotic birds. The illegal wildlife trade (IWT), valued at $7-23 billion annually, poses one of the most urgent threats to African wildlife[1]. Wildlife trafficking has severe consequences for Africa’s biodiversity and ecosystems....

The post How ADF Supports Wildlife Trafficking Investigations in Africa appeared first on ADF Solutions.

]]>
Wildlife trafficking involves capturing, transporting, and selling endangered or protected species and their parts, such as ivory, rhino horn, pangolins, big cats, and exotic birds. The illegal wildlife trade (IWT), valued at $7-23 billion annually, poses one of the most urgent threats to African wildlife[1]. Wildlife trafficking has severe consequences for Africa’s biodiversity and ecosystems. It can lead to species depletion, disrupt ecosystems, and contribute to biodiversity loss. Additionally, it often involves organized criminal networks, which can have broader negative impacts on security and governance in affected regions. How ADF Supports Wildlife Trafficking Investigations in Africa

The African Wildlife Foundation (AWF) is a leading international conservation organization that has worked to protect Africa’s iconic wildlife and their habitats for over 60 years. AWF was founded in 1961 with a mission to focus on Africa’s conservation needs. They articulate a uniquely African vision, bridge science, and public policy, and demonstrate the benefits of conservation to ensure the survival of the continent’s wildlife and their habitats.

Digital Forensic Tools Supporting AWF’s Wildlife Trafficking Investigations

ADF Solutions has established a partnership with The African Wildlife Foundation. Their support provides AWF with the necessary digital forensic tools needed to combat wildlife trafficking efficiently. ADF Software’s innovative features give the AWF the power they need to accomplish their mission. 

  • Out-of-the-box and Custom Search Profiles: Out-of-the-box Search Profiles ship with ADF digital forensic software. With these ready-to-use profiles, investigators can perform rapid searches for files, artifacts, and relevant digital evidence. These pre-configured profiles are meticulously designed to streamline the investigative process by providing investigators with a head start. Instead, these profiles come readily equipped with predefined settings, search criteria, and filters that align with their mission objectives. Investigators also have the power to create custom search profiles to tailor their results further. 
  • Digital Forensic Image Recognition and Classification: ADF’s image classification uses artificial intelligence and is trained to recognize a variety of visual classes relevant to its users. These classes included but are not limited to currency, people, portraits, scanned documents, vehicles, and weapons. The AI-driven software rapidly scans through the visual data, instantly recognizing patterns and classifying them into relevant categories. Investigators quickly recognize and categorize images, reduce the “noise,” and focus their investigation. Image classification gives investigators the ability to find exactly what they need, whether it be photos of weapons used for hunting wildlife or a photo of endangered species.  
  • Screenshot and Screen Recording Capabilities: Screen recordings and screenshots are great for mobile triage and act as visual evidence that can clearly represent the activities and content on an iOS or Android device. Screenshots capture text messages, social media posts, contacts, installed apps, and other digital content that may be important in a case. Screenshots and screen recordings are especially useful when investigators have to collect data from a suspect or victim’s phone rapidly. Investigators can obtain messages of a sale or photos of wildlife without having to conduct a full acquisition, saving time and resources.
     

ADF’s Digital Evidence Investigator PRO Field Tablet is the perfect tool for all-in-one digital forensic triage solution for collecting digital evidence in cybercrime. It is built on a built on rugged and reliable Dell Latitude, making it perfect for use in the field by AWF investigators. 

In a scenario where AWF investigators are in the field with potential wildlife trafficking suspects, they can rely on the DEI PRO Field Tablet to obtain the evidence they need. Live Preview Mode allows them to access content immediately without waiting for a backup or imaging to finish. The DEI PRO Field Tablet can scan iOS, Android, Mac, Linux, and Windows devices, quickly collect digital evidence, and analyze it in a timeline view to tie the user to files and artifacts.

In this partnership between ADF Solutions and the African Wildlife Foundation, technology meets conservation in a game-changing alliance. Together, they strive to protect Africa’s magnificent wildlife from the devastating grip of wildlife trafficking, ensuring that future generations can witness the beauty and wonder of Africa’s natural heritage. Through their collaboration, they work tirelessly to conserve not only Africa’s biodiversity but also the security and prosperity of this remarkable continent.

Learn More About the DEI PRO Field Tablet

 

The post How ADF Supports Wildlife Trafficking Investigations in Africa appeared first on ADF Solutions.

]]>
5 Tips For Collecting Digital Evidence Properly https://adfsolutions.com/5-tips-for-collecting-digital-evidence-properly/ Wed, 01 Feb 2023 00:00:00 +0000 https://adfsolutions.com/5-tips-for-collecting-digital-evidence-properly/ In order for your digital evidence to be used in a court of law you should take care in your evidence collection procedures from digital devices. Best practices for collection are designed to help you maintain the integrity of evidence. Individual agencies may have their own policies and procedures in place but overall general practices...

The post 5 Tips For Collecting Digital Evidence Properly appeared first on ADF Solutions.

]]>
In order for your digital evidence to be used in a court of law you should take care in your evidence collection procedures from digital devices. Best practices for collection are designed to help you maintain the integrity of evidence. Individual agencies may have their own policies and procedures in place but overall general practices may be similar.

The crime scene is your first stop in evidence collection, arriving prepared can save you time. The proper forensic techniques not only speed up your investigations but also ensure you get the most out of digital forensic software. Of course, also being familiar with Federal Laws helps you understand what you can collect and how. The five tips below will give you the knowledge you need to collect digital evidence properly. 5 Tips For Collecting Digital Evidence Properly

1. Maintain a well-documented chain of custody. The smallest errors in your chain of custody can invalidate the evidence. If there is a chance there could have been mishandling of evidence seen in your documentation of the chain of custody you may not be allowed to use it in court. This can cause major damage to a case. Chain of custody verifies that evidence is authentic and was seized at the crime scene [1]. 

Every point of movement and location of the evidence must be recorded, from the moment of discovery, and recovery, to analysis. Each investigator or the person responsible for collecting evidence must complete the labels of the sample container/bags and the chain of custody forms to enable tracking of the sample [1]. 

2. Understand how to preserve evidence from different devices. Procedures for evidence collection from digital devices may vary. The steps you take to preserve data on a mobile device will be different from those on a computer or other data storage devices. It’s important to be aware of these differences to avoid losing any data. Some measures to take include turning off Mobile or placing them in airplane mode or Wi-Fi mode if unable to turn them off [2]. You should not turn on any devices that you find off. 

You may document activity on a computer by taking screenshots or recordings of the screen. These are just a few examples of steps you can take to preserve evidence, remember to also familiarize yourself with your agency’s standard operating procedures.

3. Do not alter the original data collected. Obtaining copies of the original data ensures that you are preserving any valuable metadata. Metadata includes information such as author, file size, the date data was created, and keywords. Other valuable metadata may include how files were accessed, shutdowns or commands, and if copies were created. Installing a block on the working copy allows you to view the data but nothing can be altered or added. 

4. Select an extraction method. Your choice of extraction method may vary on the amount of time that you have to retrieve the data or what data you are trying to retrieve. Mobile devices have two extraction methods.

Logical extraction involves the communication between the extraction tool with the device using its own program. Live data can be acquired such as messages, call logs, contacts, passwords to social media, photos and videos, and data from apps. Although, logical extraction is the quickest way to collect data you cannot recover deleted files or use this method on locked or password-protected devices. 

Physical extraction involves making a bit-by-bit copy of the data contained on a device including any files that were hidden or deleted. This method may take longer but will yield the live data and deleted data.

5. Be equipped with the right digital forensic software tools. Time is of the essence for many cases especially those involving victims of human trafficking, or CSAM. Having software that helps to speed data collection and minimize the time spent sifting through massive amounts of data makes all the difference in an active case. The choice of your software can help you reduce the amount of time and resources needed. 

Abilities such as previewing and screenshotting will give you a better idea of which devices to focus on or possibly submit to a lab for further analysis. Know the strengths and limitations of your software to get the most out of it when you arrive on the scene. 

ADF’s suite of digital forensics software tools helps you properly collect and analyze digital forensic evidence by logical extraction. With the need for speedy investigations in mind, ADF provides evidence-collection tools that you can customize or use out-of-the-box search profiles. A Search Profile is a combination of Selected Artifact Captures and File Capture appropriate for the Search Profiles objective. 

ADF makes collecting mobile and computer evidence easy with all-in-one forensic software tools. Our PRO Series allows frontline field investigators to quickly preview, capture, and collect evidence from iOS, Android, Mac, Linux, and Windows using your forensic machine or an ADF rugged field forensic tablet.

Learn more about ADF’s suite of digital forensic tools.

Talk to an ADF Expert

The post 5 Tips For Collecting Digital Evidence Properly appeared first on ADF Solutions.

]]>
How AI Is Helping Law Enforcement Combat Human Trafficking https://adfsolutions.com/how-ai-is-helping-law-enforcement-combat-human-trafficking/ Wed, 25 Jan 2023 00:00:00 +0000 https://adfsolutions.com/how-ai-is-helping-law-enforcement-combat-human-trafficking/ Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns [1]. Once the AI system analyzes these patterns it can make predictions about future states. Machine learning computer algorithms aid AI in learning to work with...

The post How AI Is Helping Law Enforcement Combat Human Trafficking appeared first on ADF Solutions.

]]>
Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns [1]. Once the AI system analyzes these patterns it can make predictions about future states. Machine learning computer algorithms aid AI in learning to work with a large amount of data. Machine learning data and algorithms will continue to gradually improve their accuracy over time. AI systems that use machine learning take data quickly to produce actionable information. It can trace relationships between data points that may be too complex for the human mind to identify. 

Artificial intelligence machine learning has opened many doors for law enforcement involved in human trafficking investigations. The University of Nottingham conducted a study to show the potential use of machine learning. They effectively mapped labor abuses in the Brick Belt, an area of land extending across Pakistan, northern India, Nepal, and Bangladesh [2]. The Brick Belt is known to be a location of extreme labor exploitation. With artificial intelligence researchers were able to train the program to recognize sizes, shapes, and shadows normally associated with brick kilns.

This is just one example of artificial intelligence and its use for human trafficking. Human trafficking is a $150 billion-per-year criminal industry [3]. Often law enforcement agencies attempt to follow the money as a lead to human trafficking suspects. In 2016 a national non-profit had researchers launch an app that was named Hotels-50k. This app was designed to use AI to match up a data set of 50,000 pictures with online advertisements placed by sex traffickers and their victims [4]. How AI Is Helping Law Enforcement Combat Human Trafficking (1)

Additional researchers developed an artificial intelligence engine that could help reveal the location of sex trafficking victims. The AI system identifies hotels based on a database containing approximately one million images of thousands of hotels from around the world. Images of victims are compared to those contained in the database to pick out the location of the hotel room shown in the image. This AI system uses furniture, color schemes, wall art, and bedding to help identify the hotel [4]. 

The AI engine Traffic Jam uses facial recognition and geospatial software to identify runaways and missing people advertised online [4]. The apps mentioned and the development of many others are major tools in helping law enforcement officers find and save human trafficking victims. Civilians with these apps on their smartphones help to collect more and more data to be fed into this machine learning. Investigators can then use AI to filter through the data collected by civilians.  

The use of AI in digital forensics gives law enforcement officers the power to filter through images and videos found on mobiles or computer devices at a faster rate. AI in digital forensics can be tailored to identify images containing people, drugs, weapons, and more. With this powerful addition to their digital forensics toolbox, they have a better chance of helping their victims. Artificial intelligence and machine learning help take the fight against human trafficking to a global level where agencies around the world can work together.

Suspect Technologies facial analytic capabilities coupled with ADF’s automated investigation tools enable investigators to quickly review images

Suspect Technologies age detection and grouping capabilities are now standard in the Digital Evidence Investigator PRO Field Tablet, the Mobile Device Investigator Field Tablet, and across the ADF Solutions platform of triage and digital forensics software tools.

ADF’s suite of tools provides law enforcement officers with the features they need to speed up their digital investigations with Mobile Device Forensics, Computer Forensics, or All in One Forensics (mobile and computer forensics combined). ADF’s suite of triage and digital forensic software support face recognition for age detection. Field investigators and lab examiners can use this to help speed the identification of individuals by grouping faces into categories such as infants, toddlers, children, and adults. 

Learn more about ADF’s Suite of tools and how they can assist law enforcement with human trafficking investigations.  

Talk to an ADF Expert

The post How AI Is Helping Law Enforcement Combat Human Trafficking appeared first on ADF Solutions.

]]>
Border Security Solutions: Keeping America Safe https://adfsolutions.com/border-security-how-adf-helps-solve-border-investigations/ Wed, 09 Nov 2022 00:00:00 +0000 https://adfsolutions.com/border-security-how-adf-helps-solve-border-investigations/ U.S. Customs and Border Protection is charged with securing the nation’s borders and ensuring that trade and travel regulations are followed. They detect, identify, prohibit, and apprehend individuals with ties to terrorism. They also police the smuggling of humans, narcotics, weapons, bulk cash, and other prohibited or restricted merchandise [1]. U.S. Customs and Border Protection...

The post Border Security Solutions: Keeping America Safe appeared first on ADF Solutions.

]]>
U.S. Customs and Border Protection is charged with securing the nation’s borders and ensuring that trade and travel regulations are followed. They detect, identify, prohibit, and apprehend individuals with ties to terrorism. They also police the smuggling of humans, narcotics, weapons, bulk cash, and other prohibited or restricted merchandise [1]. U.S. Customs and Border Protection agents’ job is imperative to the nation’s security, without their work many illegal activities would go undetected. 

CBP policies allow agents to conduct searches on individuals entering and exiting U.S. borders and ports of entry. CBP searches are essential to help detect evidence of terrorism and other national security matters and crimes. These searches not only allow for evidence to be detected but also allows border patrol agents at the southern border to determine a person’s intentions upon entry. Information contained in computers, tablets, removable media, disks, drives, tapes, mobile phones, cameras, music, and other media players, and any other communication, electronic, or digital devices are subject to inbound and outbound border searches [2].

Why is Border Security Important?

CBP agents secure the nation’s borders at more than 300 ports of entry. As of September 30, 2022, CBP enforcement statistics show a record number of 2.4 million encounters along the United States’ southern border. These growing numbers can make it increasingly hard for agents to conduct searches of seized devices promptly. 

Since the COVID-19 pandemic in 2020 CBP agents faced surges in fentanyl seizures as well as the number of individuals attempting entry at the borders. During the years 2020 and 2021, travel restrictions were implemented at the southern border leading people to transport drugs that could go undetected.border patrol - water The drug of choice for transport became fentanyl. The smuggling of these drugs was more common at ports of entry because individuals were less likely to be stopped. Often these drugs are transported by U.S. citizens as opposed to illegal individuals entering or exiting the border through uncommon routes [3]. 

Human trafficking is another common issue border patrol agents face when securing U.S. borders. People may be manipulated by fraud, force, or coercion to work under the control of another person, pay off a loan with work without a clear time period or official agreement, or perform a sex act for money or anything of value [4]. Human trafficking can be in the form of domestic servitude, labor in prison-like factories, and migrant agricultural work. According to a report conducted by the International Organization for Migration, almost all migrants attempting to gain entry into the U.S. employ the assistance of smugglers or traffickers [5]. 

Traffickers can work alone or work as part of an organized group and engage in other illegal activitiesborder patrol - land such as fraud, extortion, racketeering, money laundering, bribery of public officials, drug use, document forgery, and gambling. These dangerous crimes are what drive homeland security and border patrol agents to continue the education and group effort to combat issues such as drug smuggling and human trafficking.

What ADF Does to Support Border Patrol Agents

ADF supports national security with DEI PRO which can be downloaded onto a tablet to assist with on-scene border investigations. The Digital Evidence Investigator® PRO Field Tablet combines ADF’s automated digital forensic software capabilities for iOS, Android, Mac, Linux, and Windows with the power and reliability of Dell Latitude Tablets for front-line field agents.

The DEI PRO Field Tablet puts the power of a forensic lab in the hands of digital-first responders so they can quickly collect digital evidence and analyze it in a timeline view to tie the user to files and artifacts. With DEI PRO, border patrol agents can rapidly scan, extract and analyze critical intelligence and perform forensic triage on mobile devices. 

CBP agents can have the proper tools to detect evidence on mobile devices that may further help the apprehension of individuals smuggling drugs such as fentanyl. DEI PRO allows agents to conduct their investigations at the border and ports of entry without submitting devices to CBP laboratories when individuals trained in digital forensics are not available. 

Learn more about the DEI PRO Field Tablet or request a free trial of DEI PRO.

Talk to an ADF Expert

The post Border Security Solutions: Keeping America Safe appeared first on ADF Solutions.

]]>
7 ICAC Investigation Best Practices https://adfsolutions.com/7-icac-investigation-best-practices/ Wed, 11 May 2022 00:00:00 +0000 https://adfsolutions.com/7-icac-investigation-best-practices/ Today’s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.   Internet Crimes Against Children investigators must...

The post 7 ICAC Investigation Best Practices appeared first on ADF Solutions.

]]>
Today’s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.  

ICAC BEST PRACTICESInternet Crimes Against Children investigators must work quickly with Internet Service Providers and the Cybertips they receive to locate suspect devices and then determine if they need to confiscate devices. Fast, on-scene field decisions are a key factor in the decisions to take a suspect into custody and quickly identify and protect victims. 

Taking information from an ISP, CyberTip, or intelligence report and then utilizing it on-scene has never been easier than it is right now using ADF computer and mobile forensic tools. Frontline field investigators can take the unique investigation data and use it on-scene to collect, analyze and make rapid defendable decisions, based on targeted / relevant results

Using ADF mobile and computer forensic software, investigators can collect evidence and data to solve investigations, keep investigations going, and reduce forensic backlogs in the lab. 

Here are 7 ICAC Investigation Best Practices: 

  1. Leverage Project VIC and CAID hashsets
  2. Preview mobile evidence instantly 
  3. Take screenshots of evidence “as the user sees it”
  4. Use built-in and custom CSAM Search Profiles 
  5. Investigate with on-scene keyword matching
  6. Automatically classify images and videos with AI/ML and PhotoDNA
  7. Leverage Anti-Human Trafficking Search Profiles for Law Enforcement 

To learn more, join ADF’s Director of Training, digital forensic and law enforcement veteran, Rich Frawley, to learn ICAC triage best practices for using our mobile and computer field forensic software in this recorded webinar. He’ll teach you how to Get In, Get Out, and Get to Breakfast On-Time! in this recorded GoToWebinar session.

Watch: ICAC Triage Made Easy

The Digital Evidence Investigator® PRO Field Tablet combines ADF’s automated digital forensic software capabilities for iOS, Android, Mac, Linux and Windows with the power and reliability of Dell Latitude Tablets for front-line field agents investigating CSAM, CEM, child exploitation material, and human trafficking cases. 

The DEI PRO Field Tablet lets front-line field officers quickly collect digital evidence and analyze it in a timeline view to tie the user to files and artifacts. 

The post 7 ICAC Investigation Best Practices appeared first on ADF Solutions.

]]>
The Ultimate Checklist for Buying a Digital Forensics Tool https://adfsolutions.com/the-ultimate-checklist-for-buying-a-digital-forensics-tool/ Wed, 03 Nov 2021 00:00:00 +0000 https://adfsolutions.com/the-ultimate-checklist-for-buying-a-digital-forensics-tool/ In today’s digital age, virtually every crime brings with it the potential for an abundance of digital evidence. Do you have the tools necessary to successfully complete your digital forensics investigations? Below is the checklist for what to have in a digital forensics tool: Screenshot Mobile Devices Speed is critical in many investigations which is...

The post The Ultimate Checklist for Buying a Digital Forensics Tool appeared first on ADF Solutions.

]]>
In today’s digital age, virtually every crime brings with it the potential for an abundance of digital evidence.

Do you have the tools necessary to successfully complete your digital forensics investigations?

Below is the checklist for what to have in a digital forensics tool:

  • Checklist Day 10.30 (Twitter Post) (1)Screenshot Mobile Devices
    • Speed is critical in many investigations which is why ADF Screenshot capabilities are available from the Home Screen to enable investigators to quickly capture screenshots from a connected mobile device. This feature lets investigators easily capture: 
      • How a particular app or screen appears to the user
      • Data that may not be included in a backup
      • Textual content of any screenshots which is automatically extracted with Optical Character Recognition (OCR) for text search during an investigation
  • Facial Analytics & Age Group Recognition
    • ADF’s Digital Forensics Age Detection capabilities allow investigators to take advantage of automated facial analysis and image recognition to filter results. The system can automatically find and detect images of:
      • Infants
      • Toddlers
      • Children
      • Adults
  • Built In & Custom Search Profiles
    • Search profiles allow you to hone in on the exact evidence you are looking to collect which makes your scans targeted, easy, and fast. Search Profiles can be utilized with our default base profiles, or edited, customized, or created to suit your operational needs. No matter the type of cases you are working or the operating systems you are encountering, ADF tools can assist and enhance you with your digital forensics and triage capabilities.
  • Report Customizations to Sanitize for Court 
    • One of the most important factors in a child exploitation investigation, is having the ability to show a report to a colleague, co-worker, prosecutor, or present to present your findings in court without re-victimizing the subject of the photo, or shocking the sense of the viewer of the report. Having a professional report that still reflects the properties that need to be presented is essential to your case.
ADF tools are easy-to-use, learn and deploy across large teams which means your agents can make field decisions to identify suspects and protect victims. In addition, you’ll reduce your forensic backlog. Your field agents will know just what devices to seize to bring back the lab and your examiners will know right where to start their investigation. 

Talk to an ADF Expert

The post The Ultimate Checklist for Buying a Digital Forensics Tool appeared first on ADF Solutions.

]]>
How to Have a Digital Forensic Triage Process that Works Field to Lab https://adfsolutions.com/how-to-build-a-digital-forensic-triage-process-that-works/ Tue, 10 Aug 2021 00:00:00 +0000 https://adfsolutions.com/how-to-build-a-digital-forensic-triage-process-that-works/ In this 3-minute “How To” video, you’ll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene.      Triage Digital Devices: From...

The post How to Have a Digital Forensic Triage Process that Works Field to Lab appeared first on ADF Solutions.

]]>
In this 3-minute “How To” video, you’ll learn the benefits of having a digital forensic triage process that works from field to lab. Using ADF digital forensic tools, examiners can prepare field investigators to find digital evidence and intelligence on mobile phones, tablets, computers, and storage devices starting on-scene. 

 

 

Triage Digital Devices: From Key Preparation to On-Scene Collection & Analysis

Getting the most out of ADF Digital Forensic tools, law enforcement, and tactical groups have their high-skilled examiners prepare the collection keys to acquire the specific evidence needed for their case.

Begin in the Digital Forensic Lab

A forensic examiner’s experience is perfect for easily determining the most appropriate Search Profiles to choose based on the cases they’re facing or the time investigators will have on-scene. With the specific Search Profiles selected, both examiners and investigators can be confident that they have what they need to get the evidence they want to collect and analyze.  

Investigating On-Scene and in the Field

In the field with ADF digital forensic tools, investigators are ready for any computer, cell phone, tablet, hard drive, storage device, or memory card they locate. 

With ADF triage tools, the investigator is able to launch multiple scans simultaneously. Search profiles are customized for each type of digital device. 

  • Powered-off Computers: the investigator can scan a Mac, Windows, or Linux computer by powering it up with the collection key attached. He selects the appropriate Search Profile for the task at hand.
  • Powered-on Computers: the investigator can scan simply by attaching the collection key and conducting a live scan of a Mac, Windows or Linux computer. Again, the investigator selects the appropriate search profile.
  • Mobile Phones and Tablets: for Apple or Android cell phones or tablets, the investigator can scan simply by attaching the appropriate cable to his DEI Pro Field Tablet. Search Profile for Mobile Devices is selected.
  • External Storage Devices / Memory Cards: the investigator can use his card reader and attach via USB to his DEI PRO Field Tablet. And yes, there’s a profile for storage device scans. 


Once the digital device is connected, the investigator simply selects her or his targets and names the scan so the and then scanning can begin. The first thing the investigator sees is the progress bar as the scan quickly locates the evidence on each digital device.

Back in the Digital Forensic Lab

With the scan complete, the investigator views the summary page where he can easily determine which devices should be collected for the lab. Back at the lab, the investigator has collected only the devices with relevant data, this helps the examiner reliably schedule when the report will be ready. 

Picking up on the Investigator’s work in the field, the examiner can easily produce reports that are courtroom ready.  The examiner has all that she or he needs to output the reports that tie the suspect to the incident or crime. 

With ADF digital forensic tools, your team goes from preparation to solving cases using an easy, reliable, and repeatable process that is easy to learn, deploy and manage.

Meet the DEI PRO Field Tablet

 

The post How to Have a Digital Forensic Triage Process that Works Field to Lab appeared first on ADF Solutions.

]]>
Crimes Against Children Conference 2021 https://adfsolutions.com/crimes-against-children-conference-2021/ Fri, 16 Jul 2021 00:00:00 +0000 https://adfsolutions.com/crimes-against-children-conference-2021/ The 2021 Crimes Against Children Conference will be the 33rd annual conference organized by the Dallas Children’s Advocacy Center (DCAC) and the Dallas Police Department. More than just another law enforcement conference, the event brings together child advocacy, child protective services, and law enforcement investigators.    Dates: August 9 -13, 2021 Register for the CACC...

The post Crimes Against Children Conference 2021 appeared first on ADF Solutions.

]]>
Crimes Against Children Conference 2021 Virtual Training EventThe 2021 Crimes Against Children Conference will be the 33rd annual conference organized by the Dallas Children’s Advocacy Center (DCAC) and the Dallas Police Department. More than just another law enforcement conference, the event brings together child advocacy, child protective services, and law enforcement investigators.   

Dates: August 9 -13, 2021

Register for the CACC conference

Live sessions will be held from the 9th to the 13th of August, 2021 with content available to registrants through December 17, 2021. 

This annual event is internationally recognized as the premier learning and networking event for those fighting crimes against children and helping children heal. The conference provides education to government and nonprofit employees from law enforcement, probation, child protective services, social work, children’s advocacy, and those that work with young people who have been child victims of crime. 

CACC Opening Plenary

Dutch filmmaker, Gwen van de Pas, who is a survivor of child sexual abuse, will speak at the opening session and will discuss her documentary, GROOMED, an in-depth perspective of the grooming process from the perspective of survivors and an offender. She will be joined by Bill Guttentag, a two-time Oscar winner who produced the film with van de Pas. 

Workshops and Sessions

This year’s CACC event will feature more than 120 sessions on a wide variety of topics of interest to children’s advocacy and law enforcement alike. Law enforcement related topics include: 

  • Advertising ID: A Primer for Your Investigation and Prosecution
  • The Brain Behind the Badge
  • Computer Forensics: Advanced Analysis for the Basic Examiner
  • Computer Triage 101: Five-Minute Forensics in the Field
  • Digital Media for Law Enforcement and Victim Identification
  • Identifying Human Trafficking Trends in the Technology Era
  • Improving Forensic Techniques for SSD Acquisition
  • Saving Data from Social Media Sites
  • Social Media and Open-Source Intelligence (OSINT)
  • Using Google Earth to Enhance Investigations
  • Windows Wi-Fi Profile Data
  • Wrangling Routers and Corralling Devices

Who’s Speaking at Crimes Against Children 2021?

Speakers from previous years have included representatives from organizations including:

  • Adobe
  • ADF Solutions
  • Bain & Company
  • Banner Healthcare
  • Cook Children’s Medical Center
  • Department of Defense
  • Facebook
  • FBI
  • Garland Police Department
  • Holman Police Department 
  • Illinois Public Schools
  • Jenna’s Law
  • LinkedIn
  • Microsoft
  • Missouri State Highway Patrol
  • Montgomery County DA’s Office
  • National Center for Missing & Exploited Children
  • NCJTC
  • NW3C
  • Pennsylvania State University
  • U.S. Department of Justice Human Rights and Special Prosecutions Section
  • U.S. Marshals Service
  • San Diego County District Attorney
  • Snap, Inc
  • Texas Advocacy Project 
  • Thorn
  • Verizon Media
  • Zero Abuse Project

ADF Solutions will be a virtual exhibitor at the Crimes Against Children Conference event to provide law enforcement and ICAC task force investigators with information on the DEI PRO Field Tablet – the best triage and field forensic tool for mobile and computer investigations. 

Federal, state, local, and tribal law enforcement agencies rely on ADF’s automated digital forensic software to help them rapidly investigate child exploitation cases beginning on-scene and in a forensic lab.  ADF software Mobile Device Investigator®, Digital Evidence Investigator® and Triage-Investigator® leverage the Child Abuse Image Database (CAID) and Project Vic hashsets to speed image identification and classification thereby making it easier for ICAC Task Force investigators to quickly identify and safeguard victims. 

Watch: Investigating Child Exploitation Cases

The post Crimes Against Children Conference 2021 appeared first on ADF Solutions.

]]>
Meet the Best Field Forensic Tool: DEI PRO Field Tablet https://adfsolutions.com/best-field-forensic-tablet-dfir-smartphone-triage/ Fri, 30 Apr 2021 00:00:00 +0000 https://adfsolutions.com/best-field-forensic-tablet-dfir-smartphone-triage/ The DEI PRO Field Tablet is the ultimate field forensic field tool for mobile and computer investigations. Watch this 8-minute overview to see the many features available to frontline investigators on this rugged Dell Latitude tablet.  DEI PRO Field Tablet Specifications  ADF offers the DEI PRO Field Tablet built on the Dell Lattitude 7220 Rugged...

The post Meet the Best Field Forensic Tool: DEI PRO Field Tablet appeared first on ADF Solutions.

]]>
The DEI PRO Field Tablet is the ultimate field forensic field tool for mobile and computer investigations. Watch this 8-minute overview to see the many features available to frontline investigators on this rugged Dell Latitude tablet. 

DEI PRO Field Tablet Specifications 

ADF offers the DEI PRO Field Tablet built on the Dell Lattitude 7220 Rugged Extreme Tablet – with a 12” screen and front-facing camera.

REAR

On the backside of the tablet is a rear-mounted camera and flash, attached stylus with storage slot. The tablet shows is appropriately bright so no one can lose it, and ships with a 2 Cell, ExpressCharge™, Lithium Ion Battery.

FRONT

On the front of the DEI PRO Field Tablet is a backlit screen rotation button as well as buttons to control brightness, volume as well as three additional programmable buttons for keystrokes or macros – such as Open DEI / or turning writeblocking on or off.

SIDE PANEL

On the hidden side panel is the audio jack, USB3, USBC Micro HDMI, and power input

SETTINGS / BLOCKER

Along with all this it comes bitlocker protected (again whos going to lose it with the bright color) Pause – If we go to our easy to access display settings we can see how easy it is to scale giving you better viewing capabilities, here we scaled to 175% and look how nice that is to view, back to 100% then up to 125% and still nice viewing area.  And the tablet is not locked to DEI all access is yours, think of the boot information, hot keys, and computer specs you can find now.right at the tip of your fingers. The keyboard is easy to access from the task bar and  also has auto open if in a text area.

TAKING SCREENSHOTS 

Let’s Open DEI on the Dell tablet, again touch capable, and  plenty of screen real estate for you. We have already gone ahead and added an iPhone, with an encrypted backup setting, an iOS with encrypted backups to get more data – and let’s see how easy it is to use the screenshot capability.

With an optional kickstand or hand strap you can easily create a few screenshots, no dropping the tablet and working in an often limited space. If you have not seen this feature, you can screenshot with DEI PRO and process with OCR.

First we create a few screenshots and can create separate categories, such as home screens, Evernote, specific apps, Kik messenger, whatever you are screenshotting. You can see here you only need to manipulate the screen to the location you want to screenshot, no triggers on the phone itself. We then process with Optical Character Recognition and everything is processed and available in your scan results. You’ll have nice screen previews and searchable textual content from the screenshots.

TEXT CONTENT / OCR / PREVIEW

Now if we navigate to the Evernote category we can see the Evernote textual content and will focus in on the text “ a lot of security doors” and search for the word security. Again easy to use keyboard and the search found 3 hits on security for Security cameras, security guards, and security doors.

SCAN RESULTS / MESSAGING

As we look into the messaging capture results we can see just how responsive DEI PRO is with the touch screen and using all the typical buttons, boxes, and selection points, filtering, sorting, removing filters, scrolling. All with ease, and you can see as we navigate around that there are no miss-hits or what I like to refer to – for myself –  as fat fingering. All selections have been accurate with the Dell Latitude Tablet and the touch screen feature. 

THE POWER OF A FORENSIC LAB IN YOUR HANDSNON-OS USB

So I mentioned earlier about having the Forensic Lab in your hand, and as we show a USB device that needs to be scanned, if you are on-scene you could attach it through a write blocker or like I mentioned earlier turn on/off write blocking with the program keys.

Once it’s write blocked and attached use the normal Digital Evidence Investigator function to select the drive, select a profile for non OS scanning and you are scanning your target device on-scene while others are using Collection Keys for the computers on scene. While we are demonstrating use with the tablet keyboard, an external keyboard could be connected and used in these situations as well.

You can monitor the scan as it continues and when  the scan has finished the results can be immediately reviewed and/or the USB device imaged if necessary. also this is the time you can review, tag, sort, filter, and use your results for interview purposes and making decisions on scene. You always have enough screen real estate and the ability to zoom built into the DEI PRO Field Tablet. 

CLASSIFIER / PREVIEW – UNDOCK

One of the nice things about having the forensic lab in your hands is also having the ability to do just a little more examination of the results on scene. As we cant preview video on a suspect computer, having the tablet allows you to preview with the proper codecs installed, you still get the 50 frames, but now if the actual content and audio are important, the lab is with you and you can preview the entire video in full. As you are scrolling through videos, if your classifier has finished running post-scan, you can choose to use the features there as well, all on scene. Of course, start, stop, scrub and pause are all available. 

 

The benefits of bringing the DEI PRO Field Tablet On-Scene combines the benefits of the best mobile phone forensic software with ADF’s powerful computer forensic software

  • Portable, Lightweight and Easy-to-Use
  • Built for DEI PRO (mobile & computer forensics)
  • Push button functionality
  • Built for the extreme conditions of law enforcement
  • Bright and Bitlockered
  • Full functionality on-scene, no waiting to go back to the lab
  • If the situation changes, you are ready

Learn More About the DEI PRO Field Tablet

Related Content: 

The post Meet the Best Field Forensic Tool: DEI PRO Field Tablet appeared first on ADF Solutions.

]]>