Subscribe to Forensic Magazine
View Sample

Forensic Magazine

Avoid Repetitive Motion Stress

April 29, 2014 9:27 am | Comments

Repetition by definition involves doing things over and over again. In repetitive work, these same types of motions are performed using the same parts of the body in the same fashion, time and time again. In activities such as typing, using a mouse, or referencing paper source documents, the affected muscles, tendons, and joints can be used thousands of times a day, week after week, year after year


Inspecting Metadata

April 25, 2014 8:40 am | by Daniel Cabezas and Bram Mooij | Comments

The term metadata is sometimes defined with the abstract expression: “data about data.” When any data is defined, described, or created, it can always be characterized in terms of similarities, structure, or related data.        


Make a Crime Scene Checklist

April 25, 2014 8:21 am | by Dick Warrington | Lynn Peavey Company | Comments

Good investigators can keep lots of details in their heads. Great investigators document the details. Remember that a trial may come right away, or it could be years later, after you’ve potentially investigated hundreds more crimes, and after your memory has faded. One way to deal with this problem is to use a checklist to document everything you can about the crime scene.


Hiring the Right People

April 24, 2014 8:43 am | by Kim Seeling Smith | Comments

The evolution in hiring starts with hiring the right people — without them, efforts to engage and retain staff become moot. The Industrial Age paradigm emphasized hiring for skills and experience. But skills can be taught and in today’s rapidly changing world, experience is far less important than agility and the ability to learn and adapt.


Communication is Key: Part 2

April 23, 2014 8:02 am | by Vince McLeod, CIH | Comments

This is the second and final installment on OSHA’s changes to the Hazard Communication standard (40CFR 1910.1200) or Haz Comm for short. Here we will discuss the details of the changes and how employers and manufacturers are affected.  


Health and Safety Basics: Workplace Design and Engineering

April 22, 2014 8:35 am | Comments

We often see failure in this aspect when we are called in to solve a problem. Designing safety into a workplace is as important as designing in efficiency (and these often go hand in hand).                 


Binary Files Analysis

April 18, 2014 8:40 am | by Daniel Cabezas and Bram Mooij | Comments

There are multiple techniques for comparing the code of two binaries, where none or only partial source code is present. A trivial way is to use a binary diffing utility. This utility is used in a similar way as plaintext code comparison listing.


Lifting Prints from Adhesive Surfaces

April 18, 2014 8:24 am | by Dick Warrington | Lynn Peavey Company | Comments

Prints found on the adhesive side of things like duct tape, masking tape, and mailing labels, can be developed and lifted, but it’s often quite difficult to do so. The key is to use a specially designed product, called an adhesive side powder, for the job.


The Myth of Work and Life Balance

April 17, 2014 8:39 am | by Jon Gordon | Comments

No wonder a recent survey of North American employees found that 87 percent of respondents say their work/life balance is negatively affecting their health. If you’ve been killing yourself trying to achieve daily work/life balance, it may be a pipe dream.


Today's CSO

April 16, 2014 8:15 am | by Dick Warrington | Comments

When I started working as a CSO in the ’70s, we’d go into a crime scene, take some photos, dust for prints, and bag the obvious evidence. Nowadays, CSOs have to do more. Changes in science and technology mean more tools for crime scene investigation. To take advantage of these advances, you have to be knowledgeable about the latest developments and about the capabilities of experts; you also need the right equipment.


Hazard Recognition, Evaluation and Control

April 15, 2014 8:36 am | Comments

This element is key to any health and safety program. When asked, most people on the street would say is this is what a safety program is all about.                             


Ropin' in Facebook, Twitter, LinkedIn

April 11, 2014 8:54 am | by Gary Torgersen | Comments

Each social media platform is different, with unique code and variations. Each one runs on its own hardware and software platform, and some, such as Facebook, have even developed custom technology to run their sites. Because of that, each requires its own method of forensically collecting data. 


Effective Delegation

April 10, 2014 8:24 am | Comments

There you are: too much to do, deadline looming, shorthanded, struggling to just keep your head above water…and now the boss wants you to take on a whole new project. It’s going to take lots of time, more time than you have. What to do? Delegate!


Contamination Control

April 9, 2014 7:37 am | by Dick Warrington | Lynn Peavey Company | Comments

Do you ever stop to think about how you might be contaminating your equipment? If you don’t consider this possibility and take steps to protect your equipment and decontaminate it when necessary, you could be putting yourself, your fellow officers, and the success of your case at risk. With some advanced planning and a little common sense, you can avoid many serious problems.


Preservation of SMS Messages: A Mobile Device eDiscovery Guide for Litigants

April 8, 2014 1:00 pm | by D4, LLC | Comments

As mobile device usage and capabilities increase, the importance of these gadgets as sources of electronically stored information becomes undeniable. The more we rely on these accessories as vehicles for business communications and entertainment, the more data we create and consume. For every additional bit and byte that is born in the ether, there is a heightened chance that the information will become fodder for electronic discovery.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.