Digital Forensic News & Events

Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics

Sensitive Site Exploitation and Triage-G2: Just like Jack Ryan

February 20, 2020

When you find yourself looking for something to watch this season, you may find yourself scrolling through Netflix, Disney+ or Amazon Prime Video to find something to watch. Choosing what to watch while you relax in front of the TV or your computer can cause you to tense up before you’re able to settle back in. 

Read More

What is Sensitive Site Exploitation?

January 28, 2019

Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world.  The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can: 

Read More

SOFIC 2018 Highlights

May 30, 2018

Last week, leaders from the military, special operations and industry gathered together in Tampa, Florida for the 2018 Special Operations Forces Industry Conference (SOFIC) and Exhibition.  The event, sponsored by the National Defense Industrial Association (NDIA) emphasized the USSOCOM Commander's vision to "Win - Transform - People" and was joined by international military members from US partner nations.

Read More

New Release of Media Exploitation Software: Triage-G2

November 16, 2016

ADF Solutions, a leading provider of digital forensic and media exploitation software, has released Triage-G2, the latest evolution of ADF's award-winning media exploitation tool. Triage-G2 is deployed by special forces, military and intelligence agencies worldwide and has a proven track record of supporting site exploitation missions, including Tactical Media Exploitation, DOMEX, MEDEX, and biometric identity operations.

Designed for nontechnical operators, Triage-G2 employs a simple two-step process to rapidly scan, extract, and analyze critical intelligence from computers and digital devices. The tool can be deployed on existing computing devices and on a small portable USB key. The collected data can then be easily distributed via portable reports or ingested into data repositories, which include Processing, Exploitation, and Dissemination Systems (PED).

Read More

Posts by Tag

See all

Recent Posts

New ADF Free Trial Website Ad
  • READY TO ACCELERATE YOUR DIGITAL INVESTIGATIONS?