Welcome Guest
Sign In
Register
News
All News
Digital Forensics
DNA Analysis
Fingerprint Analysis
Forensic Anthropology
Genetic Genealogy
Law Enforcement
Toxicology
Editorial Features
Forensic Tips
Suppliers Guide
Forensic Investigation
Forensic Docket
Webinars
Events
Register
Sign In
News
News
Editorial Features
Editorial Features
Filter
Hide Filter
Select Category
Automated Solid Phase Extraction System (SPE System)(1)
Confocal Microscopy(1)
DNA Extraction(1)
DNA Thermal Cycler / PCR Instrument(1)
Energy Dispersive XRF Spectrometer (EDXRF Spectrometer)(1)
Evidence Storage(4)
Fingerprint Analysis(2)
Forensic Camera(1)
Forensic DNA Analysis(8)
Forensic Laboratory Equipment(20)
Forensic Light Sources(1)
Forensic Toxicology(1)
Gas Chromatograph Mass Spectrometer / GC MS Instrument(1)
Histology and Pathology Laboratory Equipment(1)
Laboratory and Industrial Freezers(1)
Laboratory Internet of Things (IoT) Devices(17)
Liquid Handling Robotics (Automated Systems)(3)
Microscope Slide Loader(1)
Microscopy(1)
Minus 20 freezer (-20C to -40C Freezers)(1)
Next Generation DNA Sequencer(2)
NGS Sample Preparation(2)
Nucleic Acid Purification Instruments(1)
Pipettes / Micropipettes(1)
Portable FTIR Spectrometer / Handheld FTIR Spectro(1)
Scanning Electron Microscopes (SEM)(1)
Search Forensic Supplies(21)
Slide Stainer(1)
Toxicology Controls(1)
Sort
Date Published
How to Lawfully Collect and Examine Data in the Cloud
May 07, 2021
For law enforcement investigators, the cloud is both an investigative opportunity and a challenge: there is a wealth of data about crimes and suspects within the cloud, but also many challenges in terms of gaining access to critical information.
read more
DNA Matters: Why Forensic Genotypes are Probabilistic
April 30, 2021
The DNA on the purple gloves came from the victim, her boyfriend and her rapist. The genotypes of all three people were present on each purple glove. But forensic DNA science would be needed to reveal those identities.
read more
When More is Much More than Just More: Elevate Your Workflow Beyond Throughput
April 16, 2021
What pops into your head when you think of automation? Was increased throughput the only thing? The ability to process more samples at once is certainly a plus, but that’s not where the automation story even begins.
read more
Perspectives from Bridge Group@NCFS: Glitter and Shimmer as Forensic Tools
March 19, 2021
At the National Center for Forensic Science, Candice Bridge leads a team of students working diligently to help the victims of violent crimes by shedding light on some of the most unlikely trace material possibly found on a victim or suspect.
read more
Women in Forensics: Prioritizing Self-care to Minimize Burnout
March 15, 2021
We don't intentionally neglect our self-care, but multitasking becomes a routine that can lead to burnout among forensic scientists. Stress has become normalized for the forensic science community, and it's compromising the mental and physical health of women who have a difficult time saying no.
read more
How to Lawfully Collect, Examine and Analyze Data from Computers
March 03, 2021
In spite of modern difficulties, there are successful best practices and technologies for law enforcement agencies to deploy in terms of lawfully collecting digital intelligence (DI) from desktop and laptop computers.
read more
Collecting Data from Encrypted Phones
February 12, 2021
When lawful or consent-based access has been secured, if you’re confronted with devices using file-based encryption and you really need that data, there are workflows that allow your encrypted-device experts to take their best swing accessing the device.
read more
Cut the Clutter: Reimagining Evidence Collection to Improve Downstream Processing
January 15, 2021
All collected evidence, and every swab taken of those items, has to be sealed in a primary container that is sealed inside a secondary container. Place, seal, label, repeat. And what is the result? Swabs.
read more
Gaining Access 101: A Simple Guide to Data Extractions
January 08, 2021
For law enforcement, the days of simply asking suspects for their log-in credentials and collecting data from their phones are long gone, as are the days of easily bypassing a passcode.
read more
Page
<<
<
1
2
3
>
>>