Professor Patrick Brady, a criminal justice and criminology professor at the University of Colorado Colorado Springs, joins the Forensic Focus Podcast to share his research on the mental health challenges faced by digital forensic investigators, particularly those handling child sexual
Dr. Rebecca Portnoff, Head of Data Science at Thorn, shares how her team uses AI to combat child exploitation online and the critical role of Safety by Design principles in preventing technology from being misused.
Si: Welcome friends and enemies to the Forensic Focus Podcast. Heather Barnhart is joining us from Cellebrite and we’re very grateful for having her join us today. I’ve heard you talk on geolocation, actually. You gave a talk at a
As a seasoned Internet Crimes Against Children (ICAC) investigator with years of experience in conducting investigations and training law enforcement teams, I have witnessed firsthand the challenges that come with combating the exploitation of our most vulnerable population – our
Fake images have been in the news recently due to the Taylor Swift case, in which tools such as Microsoft’s text-to-image generator Designer were hacked by a Telegram group known for posting abusive images of women online. Fake images of
My time as a senior detective in charge of a specialist unit has taught me that successful investigations often require swift and precise action. When it comes to investigating Internet Crimes Against Children (ICAC), Indecent Images of Children (IIOC) and
CSAM or child sexual abuse material refers to any visual media depicting children engaged in sexual activity, which is produced, distributed, or accessed for sexual gratification or profit. Human trafficking is the illegal trade of humans for various forms of exploitation, including
Technology has fast become a double-edged sword: the same advancements that allow for a more connected and more enjoyable life also put child safety at terrible risk. Child sexual abuse materials (CSAM) can nowadays be found in virtually any online
Si: Good morning, ladies and gentlemen, boys and girls, friends and enemies. This is the Forensic Focus Podcast. Desi and I are here at opposite ends of the time zones. It’s not really early morning for me, it’s 8:30, and
As digital forensics moves toward a more established presence within the forensic sciences, 2022 starts off on an existential note thanks to a set of papers exploring digital forensic expertise and process, and the language used to describe both.
Technical
Hey everyone, Trey Amick from Magnet Forensics, and today I want to highlight Magnet OUTRIDER version 3.0. If you may have noticed I’m not triaging a Windows box today, that’s right, version 3.0 of OUTRIDER is a purpose-built triage tool
The Griffeye Brain in Analyze DI Pro version 19.2 brings the power of machine learning and artificial intelligence to help you quickly locate and identify child sex abuse material within your investigations.
In addition, the Griffeye Brain now has improved
by Christa Miller, Forensic Focus
The need for image recognition and categorization has never been more in demand thanks to the spread of extremist propaganda, child sexual abuse material (CSAM), and other illicit activity across the internet.
Because of the
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.