Effective training in professional ethics doesn’t primarily consist of rote memorization of rules, but instead must prepare the examiner in the art of ethical issue spotting. Similarly, an effective code of ethics consists not only of certain static core principles, but also may consist of components that can be adapted over time to keep pace with the law and with professional norms.
As I've mentioned before, understanding what is possible—not just by you, but by others—is crucial. Prints are a good example. In the past, we couldn’t lift prints from certain surfaces. Now, experts can lift latents from documents, papers, and adhesive tape.
The mobile device industry is evolving very quickly. To stay current on the latest devices and the proper techniques for acquiring and analyzing data, smartphone and mobile device forensic analysis training courses are becoming more and more necessary.
This apparently innocent question may be the one you agonize over the most. Personally, we feel there is no substitute for face to face interviews and a physical walk through of each laboratory. The crucial thing here is that the auditor or surveyor must be trained and knowledgeable about the type of work being performed in the laboratory undergoing the safety audit.
A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers announced that a layer-3 DDoS attack was causing an overload of its DNS servers.
When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.
Contamination of equipment at a crime scene is a serious problem and can occur in many ways. Any time your equipment comes into contact with blood, fluids, or other substances at a scene, you run the risk of contamination.
When someone says I don’t like my job, there’s little hope of retaining that employee, right? Not necessarily, there’s a fair chance that 1) I don’t like my job reflects feelings of discontent rather than a clear picture of dissatisfaction, and 2) a decision to leave would be premature.
Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if each area of an image belongs to the whole.
A laser device allows you to measure in almost any unit and resolution. The use of this type of device makes taking scene measurements a one-person job.
As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.
Far too often, people use a high compression setting, on digital cameras and flatbed scanners or in software used to make images smaller (in size), to either store more images on memory cards or to download or email images faster. Unfortunately, what many people don’t realize is that JPG (also known as JPEG, short for "Joint Photographic Experts Group") compression discards real pixel values.
The height of an individual can be determined by his/her footprint and shoeprint. The foot tends to be approximately 15 percent of the person’s average height. At times series of footprints are left at the scene of a crime forming a recognizable gait cycle. The information gathered during examination of footprints and also on closed circuit television (CCTV) may be of value for forensic application.
If you’re lucky, you may arrive at a crime scene and find an ideal situation for processing. Usually, though, scenes are not pristine. You may have anything from an unsecured shed to open fields to swamps and ponds. Weather is often a problem. In this issue, I’ll look at fingerprinting essentials in extreme conditions.
Future data storage needs for businesses, corporations, and governments are going to far exceed the ability of current technology to provide those storage devices. Obviously, without major technological advancements, the cost of future data storage could be unprecedented. There are however, a number of technologies under development which may eventually be able to store vast amounts of information, far exceeding today’s devices.