Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Using Text Analysis in Sensitive Site Exploitation
Military forward operators can benefit from text analysis and translation
ADF Solutions, the leading provider of sensitive site exploitation software, now includes the ability for military forward operators to leverage the power of text analysis to speed their investigations of structured and unstructured data in over 200 languages.

Sensitive Site Exploitation: Speed and Targeting
Empowering front-line military operators and intelligence agents.

ADF Adds New Digital Forensic Analysis Capabilities with Rosoka
ADF & Rosoka Bring the Power of Entity Extraction and Multi-Lingual Translation to the Front-Line in Triage-G2Ⓡ
Bethesda, Maryland: ADF Solutions, the leading provider of automated forensic software for investigators and lab examiners, today announced the ability for on-scene and lab investigators to leverage the power of Rosoka to speed their investigations of structured and unstructured data in over 200 languages.
Rosoka text analytics brings the power of automated multilingual entity extraction directly into ADF digital forensics software through a tightly integrated user experience. Rosoka text analytics runs locally on the investigator’s computer, processing documents in over 200 languages to identify entities, and locations in unstructured documents. Learn more about the partnership at www.adfsolutions.com/partner/rosoka

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.

SOFIC 2018 Highlights
Last week, leaders from the military, special operations and industry gathered together in Tampa, Florida for the 2018 Special Operations Forces Industry Conference (SOFIC) and Exhibition. The event, sponsored by the National Defense Industrial Association (NDIA) emphasized the USSOCOM Commander's vision to "Win - Transform - People" and was joined by international military members from US partner nations.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (102)
- Law Enforcement (73)
- Digital Evidence Investigator (71)
- How To Video (56)
- Mobile Device Investigator (52)
- Triage-Investigator (48)
- United States (48)
- Triage-G2 (47)
- DEI PRO (40)
- Computer Forensics (38)
- Crimes Against Children (36)
- Digital Evidence (36)
- ICAC Task Force (36)
- Triage (33)
- Forensic Triage (32)
- Triage-G2 PRO (30)
- Triage-Investigator PRO (29)
- Mobile Forensics (27)
- Project Vic (27)
- Cyber Crime (26)
- Mobile Device Forensics (26)
- Forensic Analysis (25)
- Child Exploitation (23)
- ICAC (22)
- AllinForensics (21)
- iOS Forensics (20)
- Law Enforcement Conferences (19)
- CAID (18)
- United Kingdom (18)
- Android Forensics (17)
- Cyber Forensics (16)
- DEI PRO Field Tablet (15)
- Forensic Software (15)
- Military (15)
- CSAM (14)
- Police (14)
- High Tech Crime (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Field Forensics (12)
- Sheriff (12)
- Canada (11)
- Human Trafficking (11)
- Internet Investigation (11)
- Military Police (11)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- Search Profiles (10)
- Forensic Training (9)
- IIOC (9)
- Mobile Triage Kits (9)
- Site Exploitation (9)
- technology (9)
- Counter Terrorism (8)
- DOMEX (8)
- Apple Mac Forensics (7)
- Computer Forensic Lab (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Hash Sets (7)
- Project VIC UK (7)
- Prosecutors (7)
- forensics (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- MDI Field Tablet (6)
- Photo Forensics (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- Griffeye (5)
- IPOC (5)
- Identity Operations (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Certified Forensic Computer Examiner (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Artificial Intelligence (2)
- Basic Computer Forensic Examiner (2)
- Certified Forensic Examiner (2)
- Detective (2)
- Drone Forensics (2)
- Forensic Lab Solutions (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Analytics (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Machine Learning (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)