When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in.
Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


OJJDP Announces New Wounded Veterans Hiring for ICAC Task Forces
As communities search for new ways to employ wounded, injured, or ill special operations veterans, there's a new federal government program that offers hope.
The program which provides financial support for communities seeking to further increase their effectiveness in the fight against child exploitation is run by the U.S. Department of Justice. Communities will benefit in two key ways:
- Employ wounded veterans paid for via federal grant money
- Help communities fight the ever growing battle to stop child exploitation

What is Sensitive Site Exploitation?
Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world. The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can:

What is DOMEX?
Military and intelligence officers process an ever-increasing amount of data from which they need to gather actionable intelligence. This data comes from a variety of devices seized in combat operations or during an investigation.
Document and Media Exploitation (DOMEX) is the "collection and exploitation of captured equipment, documents, and media to generate actionable intelligence." DOMEX analysis helps officers, special forces, and field operatives on the front lines complete a holistic picture of the intelligence available to them at the time.
Get Your News (once a month)
Posts by Tag
- Digital Forensics (105)
- Law Enforcement (76)
- Digital Evidence Investigator (71)
- How To Video (57)
- Mobile Device Investigator (55)
- Triage-Investigator (49)
- United States (49)
- Triage-G2 (48)
- DEI PRO (43)
- Computer Forensics (40)
- Crimes Against Children (39)
- ICAC Task Force (38)
- Digital Evidence (37)
- Triage (36)
- Forensic Triage (35)
- Triage-G2 PRO (32)
- Triage-Investigator PRO (31)
- Mobile Forensics (30)
- Mobile Device Forensics (29)
- Cyber Crime (28)
- Child Exploitation (27)
- Project Vic (27)
- Forensic Analysis (26)
- ICAC (23)
- iOS Forensics (22)
- AllinForensics (21)
- Law Enforcement Conferences (20)
- Android Forensics (19)
- United Kingdom (19)
- CAID (18)
- DEI PRO Field Tablet (18)
- CSAM (17)
- Cyber Forensics (16)
- Military (16)
- Forensic Software (15)
- High Tech Crime (14)
- Police (14)
- Field Forensics (13)
- Human Trafficking (13)
- Custom Search Profiles (12)
- Digital Media Investigator (12)
- Military Police (12)
- Mobile Triage Kits (12)
- Sheriff (12)
- Canada (11)
- Internet Investigation (11)
- Culture Code (10)
- Early Case Assessment (10)
- Forensic Training (10)
- RAM Capture (10)
- Search Profiles (10)
- IIOC (9)
- Site Exploitation (9)
- technology (9)
- Computer Forensic Lab (8)
- Counter Terrorism (8)
- DOMEX (8)
- Hash Sets (8)
- MDI Field Tablet (8)
- Prosecutors (8)
- forensics (8)
- Apple Mac Forensics (7)
- Entity Extraction (7)
- Force Protection (7)
- Forensic Science (7)
- Photo Forensics (7)
- Project VIC UK (7)
- Classifier (6)
- Digital Devices (6)
- Economic Crime (6)
- Financial Crime (6)
- Griffeye (6)
- Identity Operations (6)
- Sensitive Site Exploitation (6)
- APFS (5)
- Anti-Terrorism (5)
- Austrialia (5)
- Careers (5)
- Cybersecurity (5)
- Europe (5)
- Field Investigator PRO for Teams (5)
- IPOC (5)
- Language Gisting (5)
- White Collar Crime (5)
- Anti-Forensic Traces (4)
- BitLocker (4)
- Boot Scan (4)
- Certified Forensic Computer Examiner (4)
- Collection Key (4)
- DFIR (4)
- Digital First Responder (4)
- District Attorney (4)
- Forensic Artifacts (4)
- Special Forces (4)
- Special Operations (4)
- Standalone Viewer (4)
- Thumbcache Images (4)
- Translation (4)
- mobile device (4)
- ADF Authorized Partner (3)
- Artificial Intelligence (3)
- Certified Forensic Examiner (3)
- Forensic Lab Solutions (3)
- IACIS (3)
- IT Security (3)
- Incident Response (3)
- Interpol (3)
- Microsoft Windows Forensics (3)
- Rosoka Add-on (3)
- Singapore (3)
- South Africa (3)
- United Arab Emirates (3)
- iOS (3)
- Africa (2)
- Basic Computer Forensic Examiner (2)
- Data Analytics (2)
- Detective (2)
- Drone Forensics (2)
- Forward Operator (2)
- Fraud Forensics (2)
- Government (2)
- IT Forensics (2)
- Information Security (2)
- Labor Trafficking (2)
- Live Scan (2)
- Machine Learning (2)
- Microsoft (2)
- Security (2)
- Asia (1)
- BCFE (1)
- CFCE (1)
- Constable (1)
- Cryptocurrency Forensics (1)
- Cyber Security (1)
- Data Decryption (1)
- Digital Forensic Imaging (1)
- Expert Witness Format (1)
- FLETC (1)
- Field Investigator for Teams (1)
- Forensic Accounting (1)
- Forensic Hardware (1)
- Insider Threat (1)
- Modern Slavery (1)
- PhotoDNA (1)
- SDVOSB (1)
- Technology Partner (1)
- Video Forensics (1)
- adf certified training (1)