In terms of DNA profiling, by far the most expensive portion of obtaining a profile is the lab costs. Obtaining a better sample on the front end by using a new collection method, a hundred dollars price increase is a relatively insignificant amount.
Whether you run your own company or manage a team of people it’s important sometimes to stop and take some inspiration from those who have been through it all before and come out top.
I understand that most departments don’t have I.D. Units who come out and process scenes for latent prints, however, there is a solution. The backbone of every police department is its patrol division.
Safely storing flammable and combustible liquids in laboratories or stockrooms is risky business. However, by paying attention to the hazard class of the material, the largest container size and the total quantities we can minimize that risk. In addition, here are some general guidelines for safe flammable and combustible storage.
With bath salts being a new product with no exact chemical composition, toxicology companies have struggled to produce a detection technique. As many bath salts are made up of a large drug concoction, with current tests only detecting an individual drug and not a variety of drugs, this also decreases the possibility of detection.
As a manager you should help to make sure that you know each employee's career goals. These goals should be things the employee really wants, not just something that sounded good at that moment. You should also help the employee make sure his goals are high enough.
This is the conclusion of our discussion with Jake Williams, Instructor at SANS Institute. We've discused North Korea's involvement, or lack of involvement, in the Sony breach, but who else might have been involved? And what is Sony doing to find out? Also, Jake lets us know from a digital-forensic perpective what could be done in situtations like this in the future.
The Sony breach has given a great deal of attention to North Korea. Regardless of whether the insular country had a part in the attack or not, our continuing discussion with SANS Instructor, Jake Williams, touched on its capabilities.
Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!
Another year has passed and yet the financial and political climate has not changed much when it comes to dealing with the tremendous shortfall of resources our readers consistently report. We can hope for greater support for our organizations in the future, but in the meantime, let’s work together to make the most of what we have in the year to come.
The DNA database was legislated in every state and nationally for the singular purpose of solving crime. To suggest that investigative leads as important and reliable as a familial relationship cannot be used is absurd. DNA is significantly more reliable than any other kind of evidence available to law enforcement. And consider this fact: a familial match is also, by its very nature an exoneration.
Despite some laboratories moving away from GSR testing and others imposing limits, law enforcement personnel should collect GSR samples when probative.
At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current form factors (3.5”, 2.5”, etc.), escalating the cost per hard drive, having to have more read/write heads per hard drive, and so forth.
In an attempt to understand what has happened during the breach of Sony Picture's computers, DFI News has contacted SANS Institute's DFIR team. In an email interview, Jake Williams, an Instructor at SANS, provides his insights into the complex digital forensic story unfolding at Sony.
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed.