Forensic Exploitation and Identity Operations | IWTSD
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Focus Areas

Digital/Multimedia Forensics

Develop computer forensic hardware, software, decryption tools, and digital methods. Improve document and media acquisition and exploitation. Develop advanced methods to extract, decrypt, analyze, and enhance audio recordings, video images, and other forensic information from analog and digital sources.

Technical and Forensic Exploitation

Develop capabilities to identify individuals; improve the recovery, identification, and analysis of captured enemy material and traces; and inform tactical or strategic objectives in support of identity operations. Improve tools and methods to establish and link an individual's identity using measurable physiological and behavioral characteristics. Develop expeditionary capabilities that deny adversaries their anonymity (biometrics and identity intelligence), increase attribution (forensic science), and enhance force protection measures (technical exploitation).

Human Information Acquisition

Develop instruments, equipment, techniques and methods to collect and validate greater quantities of accurate and truthful information and potential intelligence from persons of interest. Improve interviewing and interrogation tactics, techniques, and protocols through behavioral and operational psychology, including psycholinguistics, cognitive methods, and applied motivational techniques.

Have an operational need that could be addressed by this Subgroup's Focus Areas?

Featured Projects