Subscribe to Forensic Magazine
View Sample

Forensic Magazine

Four Reasons You Should Not Dry Evidence in a Fume Hood

June 11, 2014 8:32 am | by Kelly Williams | Labconco Corporation | Comments

If you are currently drying evidence in a fume hood, it might be time to consider obtaining an Evidence Drying Cabinet instead. Evidence Drying Cabinets (EDCs) are designed specifically to dry evidence in a secure environment too not only protect the evidence from cross contamination, but to maintain proper chain of custody.


Compensate Fairly for Staff Engagement

June 10, 2014 8:43 am | Comments

Many companies diligently strive to create attractive incentive programs in an effort to engage and retain staff. Unfortunately, these efforts actually may be counter-productive to accomplishing these goals.            


Use Check Lists to Manage Crime Scenes

June 6, 2014 8:42 am | Comments

Checklists are great tools for helping you manage complex crime scenes. By using a checklist, you can track the steps you need to take to do your job correctly.                         


Do You Know Where Your Data Is?

June 6, 2014 8:12 am | by Gary Torgersen | Comments

The Bring Your Own Device (BYOD) phenomenon is affecting forensic data acquisition because it creates crossover between data that is controlled by an individual versus by a company. People are using their personal devices for work-related tasks because it can seem easier than trying to use typical work resources. 


Introduction to Forensic Image Processing

June 4, 2014 8:15 am | by Marcus Borengasser, Ph.D. | Comments

Forensic image processing (FIP) involves the computer restoration and enhancement of surveillance imagery. The goal of FIP is to maximize information extraction from surveillance imagery, especially imagery that is noisy, incomplete, or over/under exposed. FIP techniques can be applied to various types of images, such as retinal images, shoe impression images, UAV (unmanned aerial vehicle) infrared images, and more.  


Skeletons in Your Client's "Digital Closet"

June 4, 2014 8:14 am | by Martin Siefert | Comments

Studies have shown that individuals are notoriously bad at remembering details about past events. Without replenishing or review of perceptions, neural traces in the brain degrade and information is lost. This article will examine how the use of digital forensics can aid the legal profession with fact finding to support or refute eye witness testimony involving details of events.  



June 3, 2014 10:35 am | by Rebecca Waters | Comments

By now most of you will have read about the Heartbleed bug, a major vulnerability in OpenSSL. Heartbleed results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension. Heartbleed presents an interesting forensic challenge because there is unlikely to be any indication that a data breach occurred.


Unsupported Smartphone Extractions

June 3, 2014 8:53 am | Comments

What happens when a smartphone is locked and unsupported by forensic tools? Flasher box, JTAG, or chip-off extraction methods become necessary. All three enable physical extraction — a logical examination cannot be performed on an unsupported locked device. However, even this capability can be limited.


Safety Performance Management

June 3, 2014 8:33 am | Comments

This can be thought of as the measurable actions of employees in relation to safety in their work. Performance measurement should reflect how workers (management and workers alike) are actually doing compared to applicable regulatory requirements and identified corporate goals.


Dusting Surfaces to Get Prints

May 30, 2014 8:53 am | Comments

When you find dust fingerprints and footprints, collect them with an electrostatic dust lifter such as the PathFinder.                                     


Boot Loaders Produce Forensic Soundness

May 30, 2014 8:34 am | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data.       


"Open to Dispute": CODIS STR Loci as Private Medical Information

May 28, 2014 8:27 am | by David Kaye, J.D., M.A. | Comments

For nearly 25 years, advocacy groups and legal scholars have been predicting that the day when the DNA features used in forensic identification will reveal predispositions to diseases or behavioral traits is just around the corner. Questions such as these were mooted by a panel at ISHI last October. Although I cannot presume to speak for the other panelists, I can offer three recommendations of my own.


Dealing with Beastly Employees: Mocking Birds

May 27, 2014 8:06 am | Comments

For the next few weeks, we'll present you with a list of commonly found “beastly” employees, with descriptions of their behavior and suggested strategies for coping with them. Mocking Birds will speak authoritatively on any subject— whether or not they know anything about it. They have an overwhelming need to be admired and respected and may not know they’re not experts.


Lifting Fingerprints from Wet Surfaces

May 23, 2014 12:07 pm | Comments

Most people think you can’t get prints from a wet surface, but you can if you use Small Particle Reagent (SPR).                                       


Evidence: Get It While You Can

May 23, 2014 8:46 am | Comments

For the digital crimes of today, specialists need to examine a much more complex environment. Investigators need to image digital media of a multitude of types: magnetic, solid-state, or optical, for example.            



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.