{"id":14728,"date":"2020-11-05T00:00:00","date_gmt":"2020-11-05T00:00:00","guid":{"rendered":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/"},"modified":"2026-02-18T13:36:31","modified_gmt":"2026-02-18T13:36:31","slug":"5-icac-investigation-best-practices","status":"publish","type":"post","link":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/","title":{"rendered":"5 ICAC Investigation Best Practices (UPDATED JULY 2022)"},"content":{"rendered":"\n<p>Today&#8217;s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.&nbsp;&nbsp;<\/p>\n<!--more-->\n<p><a href=\"\/icac\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children.png\" alt=\"5 ICAC Best Practices - ADF Digital Forensics Protecting Children\" width=\"300\" style=\"width: 300px; float: right; margin: 0px 0px 10px 10px;\">Internet Crimes Against Children<\/a> investigators must work quickly with Internet Service Providers and the Cybertips they receive to locate suspect devices and then determine if they need to confiscate devices. Fast, on-scene field decisions are a key factor in the decisions to take a suspect into custody and quickly identify and protect victims.&nbsp;<\/p>\n<p>Taking information from an ISP, CyberTip, or intelligence report and then utilizing it on-scene has never been easier than it is right now using ADF computer and mobile forensic tools. Frontline field investigators can take the unique investigation data and use it on-scene to collect, analyze and make rapid defendable decisions, based on targeted \/ relevant results<\/p>\n<p>Using ADF mobile and computer forensic software, investigators can collect evidence and data to solve investigations, keep investigations going, and reduce forensic backlogs in the lab.&nbsp;<\/p>\n<p><strong>Here are 5 ICAC Investigation Best Practices:&nbsp;<img decoding=\"async\" src=\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Internet-Crimes-Against-Children.jpg\" alt=\"Internet Crimes Against Children\" width=\"252\" loading=\"lazy\" style=\"width: 252px; float: right; margin: 0px 10px;\"><\/strong><\/p>\n<ol style=\"font-size: 18px;\">\n<li style=\"line-height: 1;\"><a href=\"\/news\/adding-project-vic-hashes\" rel=\"noopener\">Leverage Project VIC hashsets<\/a><\/li>\n<li style=\"line-height: 1;\"><a href=\"\/search-profiles\" rel=\"noopener\">Use built in and custom CSAM Search Profiles<\/a>&nbsp;<\/li>\n<li style=\"line-height: 1;\"><a href=\"\/news\/add-keywords-on-scene\" rel=\"noopener\">Investigate with on-scene keyword matching<\/a><\/li>\n<li style=\"line-height: 1;\"><a href=\"\/news\/photodna-digital-forensics-investigations\" rel=\"noopener\">Automatically classify images and videos with AI\/ML and PhotoDNA<\/a><\/li>\n<li style=\"line-height: 1;\"><a href=\"\/anti-human-trafficking-intelligence-initiative\" rel=\"noopener\">Leverage Anti-Human Trafficking Search Profiles for Law Enforcement<\/a>&nbsp;<\/li>\n<\/ol>\n<p>To learn more, join ADF&#8217;s Director of Training, digital forensic and law enforcement veteran, Rich Frawley, to learn ICAC triage best practices for using our mobile and computer field forensic software in this recorded webinar. He&#8217;ll teach you how to <a href=\"https:\/\/attendee.gotowebinar.com\/register\/7291252340721471245\" rel=\"noopener\" target=\"_blank\">Get In, Get Out, and Get to Breakfast On-Time! in this recorded GoToWebinar session.<\/a><\/p>\n<p><a class=\"optech-default-btn btn-style cta_button\" href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/4330725\/7872dbbd-4d6f-4a04-aca8-915c068f317d\" target=\"_blank\" data-text=\"Watch: ICAC Triage Made Easy\"><span class=\"btn-wraper\">Watch: ICAC Triage Made Easy<\/span><\/a><\/p>\n<p>The <a href=\"\/dei-pro-field-tablet\" rel=\"noopener\">Digital Evidence Investigator<sup><small>\u00ae<\/small><\/sup><span>&nbsp;<\/span>PRO Field Tablet<\/a> combines ADF&#8217;s automated digital forensic software capabilities for iOS, Android, Mac, Linux and Windows with the power and reliability of Dell Latitude Tablets for front-line field agents investigating <a href=\"\/news\/what-is-csam\" rel=\"noopener\">CSAM<\/a>, CEM, child exploitation material and human trafficking cases.&nbsp;<\/p>\n<p>The DEI PRO Field Tablet lets front line field officers quickly collect digital evidence and analyze it in a timeline view to tie the user to files and artifacts.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.&nbsp;&nbsp;<\/p>\n","protected":false},"author":4,"featured_media":13021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[63],"tags":[128,69,78,104,79],"class_list":["post-14728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-child-exploitation","tag-csam","tag-icac","tag-icac-task-force","tag-law-enforcement","optech-blog blog-single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions\" \/>\n<meta property=\"og:description\" content=\"Today&#8217;s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.&nbsp;&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"ADF Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adfsolutions\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T13:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ADF Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:site\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADF Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\"},\"author\":{\"name\":\"ADF Solutions\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc\"},\"headline\":\"5 ICAC Investigation Best Practices (UPDATED JULY 2022)\",\"datePublished\":\"2020-11-05T00:00:00+00:00\",\"dateModified\":\"2026-02-18T13:36:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\"},\"wordCount\":377,\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png\",\"keywords\":[\"Child Exploitation\",\"CSAM\",\"ICAC\",\"ICAC Task Force\",\"Law Enforcement\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\",\"url\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\",\"name\":\"5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png\",\"datePublished\":\"2020-11-05T00:00:00+00:00\",\"dateModified\":\"2026-02-18T13:36:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/adfsolutions.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 ICAC Investigation Best Practices (UPDATED JULY 2022)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/adfsolutions.com\/#website\",\"url\":\"https:\/\/adfsolutions.com\/\",\"name\":\"ADF Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/adfsolutions.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/adfsolutions.com\/#organization\",\"name\":\"ADF Solutions\",\"url\":\"https:\/\/adfsolutions.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ADF Solutions\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adfsolutions\",\"https:\/\/x.com\/adfsolutions\",\"https:\/\/www.linkedin.com\/company\/adf-solutions\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc\",\"name\":\"ADF Solutions\",\"url\":\"https:\/\/adfsolutions.com\/author\/adfsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions","og_description":"Today&#8217;s access to technology and the Internet is unfortunately making it easier for cyber criminals to commit crimes can oftentimes go undetected. It is the job of ICAC Task Forces, high tech crime units and police leaders to find the most effective ways to fight cybercrime and protect children.&nbsp;&nbsp;","og_url":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/","og_site_name":"ADF Solutions","article_publisher":"https:\/\/www.facebook.com\/adfsolutions","article_published_time":"2020-11-05T00:00:00+00:00","article_modified_time":"2026-02-18T13:36:31+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png","type":"image\/png"}],"author":"ADF Solutions","twitter_card":"summary_large_image","twitter_creator":"@adfsolutions","twitter_site":"@adfsolutions","twitter_misc":{"Written by":"ADF Solutions","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#article","isPartOf":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/"},"author":{"name":"ADF Solutions","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc"},"headline":"5 ICAC Investigation Best Practices (UPDATED JULY 2022)","datePublished":"2020-11-05T00:00:00+00:00","dateModified":"2026-02-18T13:36:31+00:00","mainEntityOfPage":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/"},"wordCount":377,"publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"image":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png","keywords":["Child Exploitation","CSAM","ICAC","ICAC Task Force","Law Enforcement"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/","url":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/","name":"5 ICAC Investigation Best Practices (UPDATED JULY 2022) - ADF Solutions","isPartOf":{"@id":"https:\/\/adfsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png","datePublished":"2020-11-05T00:00:00+00:00","dateModified":"2026-02-18T13:36:31+00:00","breadcrumb":{"@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#primaryimage","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/5-ICAC-Best-Practices-ADF-Digital-Forensics-Protecting-Children-1.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/adfsolutions.com\/5-icac-investigation-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adfsolutions.com\/"},{"@type":"ListItem","position":2,"name":"5 ICAC Investigation Best Practices (UPDATED JULY 2022)"}]},{"@type":"WebSite","@id":"https:\/\/adfsolutions.com\/#website","url":"https:\/\/adfsolutions.com\/","name":"ADF Solutions","description":"","publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adfsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adfsolutions.com\/#organization","name":"ADF Solutions","url":"https:\/\/adfsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","width":512,"height":512,"caption":"ADF Solutions"},"image":{"@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adfsolutions","https:\/\/x.com\/adfsolutions","https:\/\/www.linkedin.com\/company\/adf-solutions\/"]},{"@type":"Person","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc","name":"ADF Solutions","url":"https:\/\/adfsolutions.com\/author\/adfsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/comments?post=14728"}],"version-history":[{"count":2,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14728\/revisions"}],"predecessor-version":[{"id":16661,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14728\/revisions\/16661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media\/13021"}],"wp:attachment":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media?parent=14728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/categories?post=14728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/tags?post=14728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}