Subscribe to Forensic Magazine
View Sample

Forensic Magazine

Education in Digital Forensics

March 7, 2014 8:36 am | by John J. Barbara | Comments

A question often asked is, “What education and training is necessary to work in digital forensics?” There is not one easy, simple answer to this question. First of all, an individual has to make a choice of career pathways, namely do they wish to work in the public sector or in the private sector. 


Crime Scene Lighting is Key

March 6, 2014 7:00 pm | Comments

CSOs have many options for lighting. Most important, you want the scene as bright as day. If you have an outdoor scene at night, you’ll need large lights. Even if the scene is primarily inside a residence or other building, you still need lights to illuminate the exterior. 


Ten Steps to Long Term Conflict Management

March 5, 2014 7:13 pm | Comments

The situation is out of control and you don’t have time to deal with it. So what do you do? These ten steps will help you create a plan to deal with conflict in your workplace.                                                       


Continuing Education in Digital Forensics

March 5, 2014 5:31 am | by Rebecca Waters | Comments

We speak of it often and think about it even more: considering the pace at which technology is advancing, digital forensic investigators must constantly continue to learn new skills, understand new techniques, and keep appraised of the changing demands of the job.


Data Storage Issues: Part 2

March 5, 2014 5:26 am | by John J. Barbara | Comments

Hard drives provide an efficient and cost-effective means to manage large amounts of data. However, we should remember that throughout the history of data storage, current media technology only lasts a short time (i.e., the floppy disk) before being replaced by some newer, bigger, better, and faster method of storing data.


Profile: Ed Primeau, Audio Forensic Expert

March 4, 2014 1:47 pm | by Rebecca Waters | Comments

Ed Primeau, a Michigan-based audio forensic expert, plays an important role analyzing sound recordings to be presented as admissible evidence in a court of law, and typically completes 40 to 50 voice identification cases each year. DFI News spoke with him to see what it takes to specialize in audio forensics.  


Product Insight: Remote Forensic Acquisition Using Hardware Tools

March 4, 2014 1:35 pm | by James Wiebe | CRU-DataPort/WiebeTech | Comments

Recognizing the need to acquire information and evidence from distant computers, a new group of E-Discovery and forensic tools have evolved in the last five years. An alternative device now exists: a very small computing device (CRU Ditto Forensic FieldStation)3 which combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data.


Professional Ethics in the Digital Forensics Discipline: Part 1

March 4, 2014 1:17 pm | by Sean Harrington | Comments

Digital forensics examiners all confront ethical dilemmas. In fact, examiners are ill prepared to solve these dilemmas. The profession has, for its part, endeavored to provide examiners with a framework within which the digital forensics examiner must not only recognize, classify, and manage ethical dilemmas, but also respect boundaries and honor obligations.


Label All Chemicals Properly

March 3, 2014 7:00 pm | Comments

Label all chemicals to show the name of the material, the nature and degree of hazard, the appropriate precautions, and the name of the perosn responsible for the container. Don't leave a booby trap for another person. Make sure that all containers are appropriately labeled. OSHA's hazard communication standard and lab standards require labeling of containers.


It's About Time

February 28, 2014 5:46 am | by Chris Asplen | Comments

Several months ago I wrote an article juxtaposing the recent successes we’ve had eliminating rape kit backlogs in a few cities with the lack of a national strategy to actually address the scandal of untested kits that allows identifiable rapists and murderers to continue to stalk our streets. Fortunately, a lot can happen in five months.


Wal-Mart Stores, Inc. Leads with E-Discovery

February 23, 2014 11:51 pm | by Ken Mohr and Larry Depew | Comments

When you hear about recent organizations who have achieved ASCLD/LAB accreditation, you may not expect to hear Wal-mart Stores, Inc. named. Ken Mohr, a principal at Crime Lab Design, heard about the project Larry Depew and his company, Digital Forensics.US, LLC was doing with Walmart’s E-Discovery and Forensic Services Laboratory and wanted to learn more about the trend for convergence of E-Discovery and digital forensic services.  


Plaintext Files Analysis

February 23, 2014 11:41 pm | Comments

Source code and text comparison is an established, well-known analysis technique. Using a program capable of simply listing file A in the left window and file B in the right window and highlighting the differences between each and every line, preferably in a different color, is frequently an easy way to detect copied text. Some of the more advanced analysis utilities can also compare, merge, and synchronize files and directories. 


Three Important Management Tips

February 22, 2014 8:01 pm | Comments

This list of tips is intended to help you focus on the key issues that are important to your success as a manager. It's easy to get caught up in the details and lose sight of the big picture.                  


Take Your Time at the Crime Scene

February 22, 2014 7:00 pm | Comments

Crime scene investigators should resist the urge to rush the process because someone is asking them how long they will be. Crime scene processing requires a methodical approach each and every time and deviating from this can have negative consequences.


Emergency Plans Should Be Function-Based Not Incident-Based

February 22, 2014 7:00 pm | Comments

Power loss, for example, may be a result of many potential incidents (a windstorm, downed tree, ice storm, or even a car hitting a power pole). Regardless of the cause, there are actions that must take place to ensure the protection of employees and the samples, records, and operations contained within the facility.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.