Intelligence gathering is a discipline that's on a different playing field than your typical law enforcement search warrant or forensic triage examination. ADF's Triage-G2 and Triage-G2 PRO enable military field operatives to rapidly collect and exploit captured equipment, media and documents in theaters of operation around the world and reduce time on target for:
Digital Forensic News & Events


Tactical Site Exploitation of iOS and Android Devices (Updated in 2022)
Tactical site exploitation requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or triage) of digital data and devices, collection of data on devices to bagging and tagging of devices. Users range from non-technical operators to technically trained forensic examiners. The most common devices that operators encounter today are mobile computing devices, mainly iOS and Android phones and tablets.

The 3 Levels of DOMEX in Sensitive Site Exploitation (Updated in 2022)
Document and Media Exploitation (DOMEX) requirements cover a wide range of objectives, goals, and users. This includes digital forensics, rapid assessment (or forensic triage) of digital data and devices, collection of data on devices to bagging and tagging of devices.

Using Text Analysis in Sensitive Site Exploitation
Military forward operators can benefit from text analysis and translation
ADF Solutions, the leading provider of sensitive site exploitation software, now includes the ability for military forward operators to leverage the power of text analysis to speed their investigations of structured and unstructured data in over 200 languages.

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Posts by Tag
- Digital Forensics (165)
- Digital Evidence Investigator (93)
- Law Enforcement (91)
- Mobile Device Investigator (77)
- Computer Forensics (73)
- How To Video (70)
- DEI PRO (69)
- Digital Evidence (64)
- Mobile Forensics (59)
- Crimes Against Children (57)
- Triage-Investigator (57)
- Triage-G2 (55)
- United States (52)
- Mobile Device Forensics (50)
- ICAC Task Force (48)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Child Exploitation (42)
- Triage (42)
- Triage-Investigator PRO (40)
- Cyber Crime (39)
- ICAC (33)
- Human Trafficking (31)
- DEI PRO Field Tablet (30)
- Forensic Analysis (29)
- Project Vic (29)
- iOS Forensics (29)
- CSAM (28)
- Cyber Forensics (28)
- Law Enforcement Conferences (28)
- Android Forensics (26)
- Knowledge Base Video (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- United Kingdom (24)
- Forensic Training (22)
- CAID (20)
- Military (20)
- Internet Investigation (19)
- Police (19)
- Apple Mac Forensics (17)
- Field Forensics (17)
- Mobile Forensics Video (17)
- Custom Search Profiles (16)
- Digital Media Investigator (16)
- Financial Crime (16)
- High Tech Crime (16)
- Military Police (16)
- Canada (14)
- Computer Forensic Lab (13)
- Search Profiles (13)
- Sheriff (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Photo Forensics (12)
- Cryptocurrency Forensics (11)
- Cybersecurity (11)
- Digital Devices (11)
- mobile device (11)
- ADF Authorized Partner (10)
- Artificial Intelligence (10)
- Culture Code (10)
- Early Case Assessment (10)
- Prosecutors (10)
- RAM Capture (10)
- technology (10)
- DOMEX (9)
- IIOC (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- iOS (8)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- Cloud Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Griffeye (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Machine Learning (4)
- Press Release (4)
- Probation (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Africa (3)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Product Release (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Sex Offender Management (2)
- Technology Partner (2)
- Virtual Reality (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Facial Analytics (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Screen Recording (1)
- Thailand (1)
- Vehicle Forensics (1)
- Wildlife Trafficking (1)