Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


Tactical Site Exploitation of iOS and Android Devices
Tactical site exploitation requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or triage) of digital data and devices, collection of data on devices to bagging and tagging of devices. Users range from non-technical operators to technically trained forensic examiners. The most common devices that operators encounter today are mobile computing devices, mainly iOS and Android phones and tablets.

The 3 Levels of DOMEX in Sensitive Site Exploitation
Document and Media Exploitation (DOMEX) requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or forensic triage) of digital data and devices, collection of data on devices to bagging and tagging of devices.

Using Text Analysis in Sensitive Site Exploitation
Military forward operators can benefit from text analysis and translation
ADF Solutions, the leading provider of sensitive site exploitation software, now includes the ability for military forward operators to leverage the power of text analysis to speed their investigations of structured and unstructured data in over 200 languages.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (131)
- Law Enforcement (89)
- Digital Evidence Investigator (85)
- How To Video (68)
- Mobile Device Investigator (61)
- Computer Forensics (57)
- Triage-Investigator (56)
- Triage-G2 (55)
- United States (53)
- DEI PRO (52)
- Crimes Against Children (49)
- Digital Evidence (49)
- ICAC Task Force (45)
- Forensic Triage (42)
- Triage (42)
- Triage-G2 PRO (40)
- Mobile Forensics (39)
- Triage-Investigator PRO (39)
- Child Exploitation (36)
- Mobile Device Forensics (34)
- Cyber Crime (32)
- Forensic Analysis (29)
- ICAC (29)
- Project Vic (29)
- Law Enforcement Conferences (26)
- DEI PRO Field Tablet (25)
- AllinForensics (23)
- CSAM (23)
- Human Trafficking (22)
- iOS Forensics (22)
- United Kingdom (21)
- Android Forensics (20)
- CAID (20)
- Cyber Forensics (20)
- Forensic Software (18)
- Forensic Training (18)
- High Tech Crime (17)
- Internet Investigation (17)
- Military (17)
- Mobile Triage Kits (17)
- Custom Search Profiles (16)
- Field Forensics (16)
- Police (16)
- Apple Mac Forensics (15)
- Digital Media Investigator (15)
- Financial Crime (15)
- Canada (14)
- Military Police (14)
- Search Profiles (13)
- Sheriff (13)
- Computer Forensic Lab (11)
- Counter Terrorism (10)
- Culture Code (10)
- Early Case Assessment (10)
- RAM Capture (10)
- technology (10)
- Computer Triage (9)
- DOMEX (9)
- Digital Devices (9)
- IIOC (9)
- Prosecutors (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cryptocurrency Forensics (8)
- Economic Crime (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Photo Forensics (8)
- Cybersecurity (7)
- Digital First Responder (7)
- Entity Extraction (7)
- Europe (7)
- Force Protection (7)
- Project VIC UK (7)
- Classifier (6)
- DFIR (6)
- Forensic Artifacts (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- mobile device (6)
- ADF Authorized Partner (5)
- APFS (5)
- Anti-Forensic Traces (5)
- Artificial Intelligence (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Forensic Lab Solutions (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- District Attorney (4)
- Fraud Forensics (4)
- Incident Response (4)
- Interpol (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- iOS (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Machine Learning (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Africa (2)
- Constable (2)
- Dark Web (2)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Saved Credentials (1)
- Technology Partner (1)
- Vehicle Forensics (1)
- Video Forensics (1)
- Virtual Reality (1)
- adf certified training (1)