Advertisement
 
Articles
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Why Employees Quit: Frustration about Co-workers

November 20, 2014 4:47 am | by Helen Kelly | Comments

When someone says I don’t like my job, there’s little hope of retaining that employee, right? Not necessarily, there’s a fair chance that 1) I don’t like my job reflects feelings of discontent rather than a clear picture of dissatisfaction, and 2) a decision to leave would be premature.

TOPICS:

Leading the Eyewitness: Digital Image Forensics in a Megapixel World

November 19, 2014 8:25 am | by William Weaver, Ph.D. | Comments

Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if each area of an image belongs to the whole.

TOPICS:
A laser device allows you to measure in almost any unit and resolution. The use of this type of device makes taking scene measurements a one-person job.

Measuring Crime Scenes with Laser Devices

November 14, 2014 12:56 pm | Comments

A laser device allows you to measure in almost any unit and resolution. The use of this type of device makes taking scene measurements a one-person job.                           

TOPICS:
Advertisement

Growth of Digital Forensic Workflow

November 14, 2014 12:05 pm | Comments

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.             

TOPICS:
Far too often, people use a high compression setting, on digital cameras and flatbed scanners or in software used to make images smaller (in size), to either store more images on memory cards or to download or email images faster. Unfortunately, what many

Mitigating Artifacts of JPG Compression in Digital Images

November 12, 2014 8:07 am | by David “Ski” Witzke | Comments

Far too often, people use a high compression setting, on digital cameras and flatbed scanners or in software used to make images smaller (in size), to either store more images on memory cards or to download or email images faster. Unfortunately, what many people don’t realize is that JPG (also known as JPEG, short for "Joint Photographic Experts Group") compression discards real pixel values.

TOPICS:
The height of an individual can be determined by his/her footprint and shoeprint. The foot tends to be approximately 15 percent of the person’s average height. At times series of footprints are left at the scene of a crime forming a recognizable gait cycl

Gathering Gait Evidence

November 7, 2014 9:13 am | Comments

The height of an individual can be determined by his/her footprint and shoeprint. The foot tends to be approximately 15 percent of the person’s average height. At times series of footprints are left at the scene of a crime forming a recognizable gait cycle. The information gathered during examination of footprints and also on closed circuit television (CCTV) may be of value for forensic application.

TOPICS:
If you’re lucky, you may arrive at a crime scene and find an ideal situation for processing. Usually, though, scenes are not pristine. You may have anything from an unsecured shed to open fields to swamps and ponds. Weather is often a problem. In this iss

Fingerprinting in Adverse Conditions

November 5, 2014 8:22 am | by Dick Warrington | Lynn Peavey Company | Comments

If you’re lucky, you may arrive at a crime scene and find an ideal situation for processing. Usually, though, scenes are not pristine. You may have anything from an unsecured shed to open fields to swamps and ponds. Weather is often a problem. In this issue, I’ll look at fingerprinting essentials in extreme conditions.  

TOPICS:

Data Storage Issues: Part 4

November 5, 2014 8:20 am | by John J. Barbara | Comments

Future data storage needs for businesses, corporations, and governments are going to far exceed the ability of current technology to provide those storage devices. Obviously, without major technological advancements, the cost of future data storage could be unprecedented. There are however, a number of technologies under development which may eventually be able to store vast amounts of information, far exceeding today’s devices.

TOPICS:
Advertisement
Do you ever feel overwhelmed as a manager? Being overburdened by the   responsibility of having to figure out what others want and need of you is a   familiar feeling shared among leaders. Fortunately, there is a “best   practice” for obtaining just the k

What Every Employee Wants in a Leader

November 4, 2014 8:37 am | by DeEtta Jones | Comments

Do you ever feel overwhelmed as a manager? Being overburdened by the responsibility of having to figure out what others want and need of you is a familiar feeling shared among leaders. Fortunately, there is a “best practice” for obtaining just the kind of information needed to increase your leadership effectiveness — ask them what they want. 

TOPICS:
The era of “Big Data” is already upon us and the continued exponential growth   of electronic devices and archival storage capacity will soon reach a crises   point regarding digital forensic analysis and investigations.

The Challenge of Finding Digital Evidence

October 31, 2014 8:49 am | Comments

The era of “Big Data” is already upon us and the continued exponential growth of electronic devices and archival storage capacity will soon reach a crises point regarding digital forensic analysis and investigations.         

TOPICS:

Accurate Data, Forensic Soundness

October 31, 2014 8:23 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

TOPICS:

Morgue Design: The Good, the Bad, and the Ugly

October 29, 2014 8:52 am | by Susan Halla | Crime Lab Design | Comments

Over the years we have been invited in to see many morgues of various ages, designs, and with varying wear and tear. We have designed and observed the construction of several facilities and have been invited to tour other new facilities. There are many lessons to be learned in each of these facilities. Some of these are lessons on what to implement in your own facility, while many of these are examples of what not to emulate. 

TOPICS:

Book Excerpt: Checklist: Building a Penetration Testing Lab

October 29, 2014 8:48 am | by Bruce Middleton | CRC Press/Taylor & Francis Group LLC | Comments

This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.                   

TOPICS:
Just consider autoclaves as large specialized pressure cookers. Autoclaves use heat and pressure with water to create superheated steam. As such, they can pose significant hazards to un-trained or lackadaisical employees.

Recognizing Autoclave Hazards

October 28, 2014 8:48 am | Comments

Just consider autoclaves as large specialized pressure cookers. Autoclaves use heat and pressure with water to create superheated steam. As such, they can pose significant hazards to un-trained or lackadaisical employees.        

TOPICS:

Cloud Computing Presents a Unique Forensic Challenge

October 23, 2014 8:00 pm | Comments

Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis. Further forensic issues concern the potential effect the cloud services could have on the digital data itself and how the forensic examiner can explain all these indiscretions to the court.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading