When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in.
Digital Forensic News & Events


OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Posts by Tag
- Digital Forensics (167)
- Digital Evidence Investigator (95)
- Law Enforcement (94)
- Mobile Device Investigator (79)
- Computer Forensics (75)
- DEI PRO (72)
- How To Video (70)
- Digital Evidence (66)
- Mobile Forensics (63)
- Crimes Against Children (60)
- Triage-Investigator (57)
- Triage-G2 (56)
- Mobile Device Forensics (55)
- United States (54)
- ICAC Task Force (49)
- Child Exploitation (45)
- Forensic Triage (43)
- Triage-G2 PRO (43)
- Triage (42)
- Cyber Crime (41)
- Triage-Investigator PRO (40)
- ICAC (34)
- CSAM (33)
- Human Trafficking (32)
- DEI PRO Field Tablet (31)
- iOS Forensics (31)
- Law Enforcement Conferences (30)
- Project Vic (30)
- Cyber Forensics (29)
- Forensic Analysis (29)
- Android Forensics (28)
- Knowledge Base Video (26)
- United Kingdom (26)
- Computer Forensics Video (25)
- Mobile Triage Kits (25)
- AllinForensics (24)
- Forensic Software (24)
- Forensic Training (22)
- CAID (21)
- Military (21)
- Police (20)
- Internet Investigation (19)
- Apple Mac Forensics (17)
- Custom Search Profiles (17)
- Field Forensics (17)
- High Tech Crime (17)
- Military Police (17)
- Mobile Forensics Video (17)
- Digital Media Investigator (16)
- Financial Crime (16)
- Canada (15)
- ADF Authorized Partner (14)
- Sheriff (14)
- Artificial Intelligence (13)
- Computer Forensic Lab (13)
- Prosecutors (13)
- Search Profiles (13)
- Computer Triage (12)
- Counter Terrorism (12)
- Cybersecurity (12)
- Digital Devices (12)
- Photo Forensics (12)
- mobile device (12)
- Cryptocurrency Forensics (11)
- technology (11)
- Culture Code (10)
- Early Case Assessment (10)
- IIOC (10)
- RAM Capture (10)
- iOS (10)
- DOMEX (9)
- Site Exploitation (9)
- forensics (9)
- Anti-Terrorism (8)
- Cyber Security (8)
- Economic Crime (8)
- Europe (8)
- Forensic Science (8)
- Hash Sets (8)
- Identity Operations (8)
- MDI Field Tablet (8)
- Cloud Forensics (7)
- Digital First Responder (7)
- District Attorney (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Artifacts (7)
- Forensic Lab Solutions (7)
- Government (7)
- Griffeye (7)
- Project VIC UK (7)
- Classifier (6)
- Cloud Computing Forensics (6)
- DFIR (6)
- Dark Web (6)
- Featured Video (6)
- Machine Learning (6)
- Sensitive Site Exploitation (6)
- White Collar Crime (6)
- APFS (5)
- Anti-Forensic Traces (5)
- Austrialia (5)
- Boot Scan (5)
- Careers (5)
- Field Investigator PRO for Teams (5)
- Fraud Forensics (5)
- IPOC (5)
- Language Gisting (5)
- Live Scan (5)
- PhotoDNA (5)
- Africa (4)
- BitLocker (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- Corporate Compliance (4)
- Incident Response (4)
- Interpol (4)
- Press Release (4)
- Probation (4)
- Product Release (4)
- Rosoka Add-on (4)
- Singapore (4)
- South Africa (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- United Arab Emirates (4)
- Video Forensics (4)
- adf certified training (4)
- Basic Computer Forensic Examiner (3)
- Certified Forensic Examiner (3)
- Constable (3)
- Drone Forensics (3)
- IACIS (3)
- IT Security (3)
- Labor Trafficking (3)
- Microsoft Windows Forensics (3)
- Parole (3)
- Security (3)
- Data Analytics (2)
- Detective (2)
- Digital Forensic Imaging (2)
- E-Discovery (2)
- Facial Analytics (2)
- Forensic Accounting (2)
- Forensic Hardware (2)
- Forward Operator (2)
- IT Forensics (2)
- Information Security (2)
- Microsoft (2)
- Screen Recording (2)
- Screen Shots (2)
- Sex Offender Management (2)
- Social Media Discovery (2)
- Technology Partner (2)
- Thailand (2)
- Virtual Reality (2)
- Wildlife Trafficking (2)
- Asia (1)
- BCFE (1)
- Big Data (1)
- CFCE (1)
- Data Decryption (1)
- Digital Forensic Workstations (1)
- ESI (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Insider Threat (1)
- Mexico (1)
- Modern Slavery (1)
- SDVOSB (1)
- Saved Credentials (1)
- Vehicle Forensics (1)
- eDiscovery (1)