{"id":14420,"date":"2021-12-30T00:00:00","date_gmt":"2021-12-30T00:00:00","guid":{"rendered":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/"},"modified":"2026-03-11T14:14:53","modified_gmt":"2026-03-11T14:14:53","slug":"mac-boot-for-m1-and-t2-chips","status":"publish","type":"post","link":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/","title":{"rendered":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers"},"content":{"rendered":"\n<p><span style=\"font-size: 18px;\">ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that <\/span><span style=\"font-size: 18px;\">communicates with the desktop application.&nbsp;<\/span><\/p>\n<!--more--><video width=\"100%\" controls>\n  <source src=\"https:\/\/4330725.fs1.hubspotusercontent-na1.net\/hubfs\/4330725\/Mac%20Remote%20Boot%20-%20New%20012024.mp4\" type=\"video\/mp4\">\n<\/video>\n<p>&nbsp;<\/p>\n<h3 style=\"font-weight: bold; font-size: 20px;\"><span style=\"color: #088e9f;\">How to Collect Evidence on a Mac<\/span><\/h3>\n<p>To perform <a href=\"\/news\/mac-forensics\" rel=\"noopener\">Mac Forensics<\/a>, follow these instructions.&nbsp;<\/p>\n<p style=\"font-weight: bold;\">Direct Ethernet Connection<\/p>\n<p>There are several ways to connect the target Mac computer and the ADF workstation. We recommend using <span style=\"font-size: 18px; font-weight: normal;\"><span style=\"color: #434343;\">Direct Ethernet Connection<\/span><\/span> as it will provide the fastest and most reliable connection.<\/p>\n<p>Also available is an Ethernet cable to the Router&nbsp; or Wireless connection &#8211; all detailed in our User Guides<\/p>\n<h2 style=\"font-size: 18px;\"><strong>Running the Remote Agent on a Mac<\/strong><\/h2>\n<p>The remote agent is deployed on the Collection Key and can be executed on a Mac that is already running (a live Mac), or a Mac that is in Recovery mode. We recommend using the recovery mode as it grants access to more files and is more stable. Note that the Recovery mode was only introduced in 2012 and older Macs do not offer it.<\/p>\n<h2><span style=\"font-size: 18px;\">Overview of the process:<\/span><\/h2>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px;\">Prepare a Collection Key so it contains the remote agent. Note that it doesn\u2019t matter which Search Profile is selected on the Collection Key as it will be selected later in the ADF desktop application.`<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 18px;\">Today we are going to show you the Mac M1 Running in Recovery Mode and using Direct Ethernet Connect.<\/span><\/p>\n<h3><span style=\"font-size: 18px; color: #434343;\">Use a regular Ethernet cable and connect it between the ADF workstation and the target computer. If no Ethernet port is present on the computer, use a USB-C to Ethernet adapter.<\/span><\/h3>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px;\">This will create a local network between the two computers and each will receive a network address (also called an Internet Protocol or IP address).<\/span>&nbsp;<\/li>\n<\/ul>\n<h2 style=\"font-size: 18px; font-weight: bold;\">Running in Recovery Mode<\/h2>\n<p>Follow these instructions to place the Mac in Recovery Mode and run the remote agent:<\/p>\n<ul>\n<li aria-level=\"1\">Make sure the Mac is turned off.<\/li>\n<li aria-level=\"1\">Turn on the M1 Mac immediately. <strong>press and hold the power button until \u201cLoading startup options&#8221; appears. For Older Macs <\/strong>press and hold down the Command (\u2318) and R keys. You can release the keys when you see the Apple logo<\/li>\n<li aria-level=\"1\">You might be prompted to enter a password, such as a firmware password or the password of a user who is an administrator of this Mac. Enter the requested password to continue.<\/li>\n<li aria-level=\"1\">Insert the USB Collection Key into the Mac.<\/li>\n<li aria-level=\"1\">To make sure the encrypted partitions are available:\n<ul>\n<li aria-level=\"2\">Run the Disk Utility.<\/li>\n<li aria-level=\"2\">Locate any disabled volumes in the left panel and select the Mount button for each one of them.<\/li>\n<li aria-level=\"2\">Quit the program in Disk Utility &gt; Quit Disk Utility.<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\">Run the Terminal application in Utilities &gt; Terminal.<\/li>\n<li aria-level=\"1\">Type the command \/Volumes\/CKY\/startMacOSAgent and press enter.<\/li>\n<\/ul>\n<p>The agent should start and display the following information:<\/p>\n<p>ADF Remote Agent<\/p>\n<p>To connect to this device enter the following IP address in the Scan screen of the ADF desktop application:<\/p>\n<p>&nbsp;&nbsp;eth0 &#8211; 192.168.0.22<\/p>\n<p>&nbsp;&nbsp;eth1 &#8211; 192.168.0.24<\/p>\n<p>Status: started<\/p>\n<p>Make a note of the IP address listed by the agent as it will have to be entered in the ADF desktop application.<\/p>\n<p style=\"line-height: 1;\">&nbsp;<\/p>\n<table style=\"border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;\">\n<tbody>\n<tr>\n<td style=\"background-color: #cfe2f3;\">\n<p>If the default connection port 32771 is not available, the remote agent will use a different port and display the message:<\/p>\n<br>\n<p><em>Server bind error on port 32771<\/em><\/p>\n<p><em>Agent started on port 32772<\/em><\/p>\n<br>\n<p>This port number will have to be entered with the IP address in the ADF desktop application as follows: xxx.xxx.xxx.xxx:32772<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2 style=\"font-size: 18px;\"><strong>Starting the Remote Scan<\/strong><\/h2>\n<ul>\n<li aria-level=\"1\">Navigate to the Scan screen (see details in the Desktop Scan section below).<\/li>\n<li aria-level=\"1\">Click on the <strong>Add Remote Agent<\/strong> button.<\/li>\n<li aria-level=\"1\">Select the agent in the list of agents discovered automatically by the ADF desktop application.<\/li>\n<li aria-level=\"1\">Click on the <strong>OK<\/strong> button.<\/li>\n<li aria-level=\"1\">The remote agent should now be listed as a target device.<\/li>\n<\/ul>\n<p>Note that all available volumes will be scanned and only allocated files will be processed (no deleted files recovery and no unallocated file carving).<\/p>\n<h2 style=\"font-size: 18px;\"><strong>Terminating the Remote Agent<\/strong><\/h2>\n<p>Once the scan is finished, if the target computer was in recovery mode:<\/p>\n<ul>\n<li aria-level=\"1\">Go to the Apple menu <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/f5bzQp4jzje1ndA8Kgsi3IjIpZD-hlALyGsVZlCL_eFImfrG9-TyNhN5HopRr7cY8BGRikM10-FgU_v1ySNPP-edKTb_eWboRDSc6Kmp37Ks9GBeft-tlHUNiYdoHYDYamRgpHc0\" width=\"29\" height=\"29\" loading=\"lazy\" alt=\"Apple Logo\"> and select Shut Down.<\/li>\n<\/ul>\n<p><a class=\"optech-default-btn btn-style cta_button\" href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/4330725\/1aab4bf4-28b8-4315-ab32-0256182e13eb\" target=\"_blank\" data-text=\"Watch: Boot Scan a Mac with APFS &#038; FileVault 2\"><span class=\"btn-wraper\">Watch: Boot Scan a Mac with APFS &#038; FileVault 2<\/span><\/a><\/p>\n<ul>\n<li><a href=\"\/news\/live-mac-forensics-round-out-your-on-scene-triage\" rel=\"noopener\">Learn Live Mac Forensics to round out your on-scene triage.<\/a><\/li>\n<li><a href=\"\/news\/boot-scan-mac-apfs-filevault-2\" rel=\"noopener\">How to boot scan a Mac with aPFS and FileVault 2<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application.&nbsp;<\/p>\n","protected":false},"author":3,"featured_media":12559,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[64,283],"tags":[146,95,96,73,136,36,74,33,30,157,99,142,138,143,102],"class_list":["post-14420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adf-blog","category-video","tag-apple-mac-forensics","tag-computer-forensics","tag-computer-forensics-video","tag-dei-pro","tag-dei-pro-field-tablet","tag-digital-evidence","tag-digital-evidence-investigator","tag-digital-forensics","tag-featured-video","tag-forensic-training","tag-how-to-video","tag-triage-g2","tag-triage-g2-pro","tag-triage-investigator","tag-triage-investigator-pro","optech-blog blog-single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions\" \/>\n<meta property=\"og:description\" content=\"ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\" \/>\n<meta property=\"og:site_name\" content=\"ADF Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adfsolutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-30T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T14:14:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Richard T. Frawley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:site\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Richard T. Frawley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\"},\"author\":{\"name\":\"Richard T. Frawley\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/f7fc6bb598702f2c7fd213ae40c2ac39\"},\"headline\":\"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers\",\"datePublished\":\"2021-12-30T00:00:00+00:00\",\"dateModified\":\"2026-03-11T14:14:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png\",\"keywords\":[\"Apple Mac Forensics\",\"Computer Forensics\",\"Computer Forensics Video\",\"DEI PRO\",\"DEI PRO Field Tablet\",\"Digital Evidence\",\"Digital Evidence Investigator\",\"Digital Forensics\",\"Featured Video\",\"Forensic Training\",\"How To Video\",\"Triage-G2\",\"Triage-G2 PRO\",\"Triage-Investigator\",\"Triage-Investigator PRO\"],\"articleSection\":[\"The Intelligent Triage Blog\",\"Video\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\",\"url\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\",\"name\":\"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png\",\"datePublished\":\"2021-12-30T00:00:00+00:00\",\"dateModified\":\"2026-03-11T14:14:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/adfsolutions.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/adfsolutions.com\/#website\",\"url\":\"https:\/\/adfsolutions.com\/\",\"name\":\"ADF Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/adfsolutions.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/adfsolutions.com\/#organization\",\"name\":\"ADF Solutions\",\"url\":\"https:\/\/adfsolutions.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ADF Solutions\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adfsolutions\",\"https:\/\/x.com\/adfsolutions\",\"https:\/\/www.linkedin.com\/company\/adf-solutions\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/f7fc6bb598702f2c7fd213ae40c2ac39\",\"name\":\"Richard T. Frawley\",\"url\":\"https:\/\/adfsolutions.com\/author\/richardtfrawley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/","og_locale":"en_US","og_type":"article","og_title":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions","og_description":"ADF tools have the ability to scan all available Mac computers (M1 and T2 chips) with all types of encryption and virtual drives by running a remote agent that communicates with the desktop application.&nbsp;","og_url":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/","og_site_name":"ADF Solutions","article_publisher":"https:\/\/www.facebook.com\/adfsolutions","article_published_time":"2021-12-30T00:00:00+00:00","article_modified_time":"2026-03-11T14:14:53+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png","type":"image\/png"}],"author":"Richard T. Frawley","twitter_card":"summary_large_image","twitter_creator":"@adfsolutions","twitter_site":"@adfsolutions","twitter_misc":{"Written by":"Richard T. Frawley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#article","isPartOf":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/"},"author":{"name":"Richard T. Frawley","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/f7fc6bb598702f2c7fd213ae40c2ac39"},"headline":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers","datePublished":"2021-12-30T00:00:00+00:00","dateModified":"2026-03-11T14:14:53+00:00","mainEntityOfPage":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/"},"wordCount":718,"publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"image":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png","keywords":["Apple Mac Forensics","Computer Forensics","Computer Forensics Video","DEI PRO","DEI PRO Field Tablet","Digital Evidence","Digital Evidence Investigator","Digital Forensics","Featured Video","Forensic Training","How To Video","Triage-G2","Triage-G2 PRO","Triage-Investigator","Triage-Investigator PRO"],"articleSection":["The Intelligent Triage Blog","Video"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/","url":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/","name":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers - ADF Solutions","isPartOf":{"@id":"https:\/\/adfsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage"},"image":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png","datePublished":"2021-12-30T00:00:00+00:00","dateModified":"2026-03-11T14:14:53+00:00","breadcrumb":{"@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#primaryimage","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/1-3-1.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/adfsolutions.com\/mac-boot-for-m1-and-t2-chips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adfsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Learn Mac Forensics: Mac Boot for M1 and T2 Chips | DFIR for Computers"}]},{"@type":"WebSite","@id":"https:\/\/adfsolutions.com\/#website","url":"https:\/\/adfsolutions.com\/","name":"ADF Solutions","description":"","publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adfsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adfsolutions.com\/#organization","name":"ADF Solutions","url":"https:\/\/adfsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","width":512,"height":512,"caption":"ADF Solutions"},"image":{"@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adfsolutions","https:\/\/x.com\/adfsolutions","https:\/\/www.linkedin.com\/company\/adf-solutions\/"]},{"@type":"Person","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/f7fc6bb598702f2c7fd213ae40c2ac39","name":"Richard T. Frawley","url":"https:\/\/adfsolutions.com\/author\/richardtfrawley\/"}]}},"_links":{"self":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/comments?post=14420"}],"version-history":[{"count":2,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14420\/revisions"}],"predecessor-version":[{"id":16424,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14420\/revisions\/16424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media\/12559"}],"wp:attachment":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media?parent=14420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/categories?post=14420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/tags?post=14420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}