Advertisement
 
Videos
Subscribe to Forensic Magazine

The Lead

In the Public Eye: Why Testing the Rape Kit Backlog Works

June 24, 2015 | by Forensic Magazine | Comments

Dwayne Wilson was sentenced to life last week in Ohio after his DNA matched rape kit evidence relating to assaults on four women in Cleveland in the 1990s. Wilson, who the judge called “the worst of the worst,” was about to be released from prison when evidence from a 20-year-old rape kit kept the serial pedophile behind bars.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A Closer Look: The Consolidated Forensic Laboratory

June 2, 2015 9:42 am | Comments

The $220 million facility has a 20,000-gallon cistern to collect greywater, and panes on the façade that aren’t solar panels like most people think, but are connected to a small weather station on the roof.

TOPICS:
On Friday, the White House Summit on Cybersecurity and Consumer Protection was held at Stanford university.

White House Summit on Cybersecurity and Consumer Protection

February 13, 2015 4:28 pm | by Ernie Austin, Associate Editor | Comments

On Friday, the White House Summit on Cybersecurity and Consumer Protection was held at Stanford university.

TOPICS:
 During her TEDxVictoria talk, Social psychologist Elizabeth Brimacombe explains how social influence can change eyewitness testimony - and how it can affect anyone.

Social Influence of Eyewitness Testimony

January 30, 2015 8:17 am | by Ernie Austin, Associate Editor | Comments

During her TEDxVictoria talk, Social psychologist Elizabeth Brimacombe explains how social influence can change eyewitness testimony — and how it can affect anyone.                         

TOPICS:
Advertisement

Bruce Schneier Talks to Edward Snowden about Encryption

January 27, 2015 11:30 am | by Ernie Austin, Associate Editor | Comments

Bruce Schneier recently talked with Edward Snowden, who spoke using video chat from 4,500 miles away in Moscow, before an audience at Harvard's School of Engineering and Applied Sciences about encryption.             

TOPICS:
This video from the 1960s shows the U.S. Army/CIA shows the importance of good pictures in forensic evidence. Does it have relevance to today?

1960s US Army CSI Shows Importance of Good Photography for Forensic Evidence

January 12, 2015 12:56 pm | by Ernie Austin, Associate Editor | Comments

This video from the 1960s shows the U.S. Army/CIA shows the importance of good pictures in forensic evidence. Does it have relevance to today?                               

TOPICS:
NIST Fellow and DNA expert John Butler describes his work in DNA forensic science, how NIST standards enable accurate DNA measurements to be made, how NIST methods helped ID victims of 9/11, how he got interested in forensics, and how NIST's role in DNA f

DNA Expert John Butler of NIST Unscripted

November 12, 2014 12:08 pm | by NIST | Comments

NIST Fellow and DNA expert John Butler describes his work in DNA forensic science, how NIST standards enable accurate DNA measurements to be made, how NIST methods helped ID victims of 9/11, how he got interested in forensics, and how NIST's role in DNA forensics is making a difference.

TOPICS:
Coalition-supported lab analyzes ballistics, fingerprints and other evidence.

Afghan Forensics Lab Assists Crime Fighting Efforts

September 16, 2014 12:22 pm | by Sgt. Adam Ross, DVIDS | Comments

Coalition-supported lab analyzes ballistics, fingerprints and other evidence.                                                 

TOPICS:
Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.

Talk Forensics - Expert Witness Testimony

July 28, 2014 8:33 am | Comments

Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.                             

TOPICS:
Advertisement

Talk Forensics - Investigations in the Cloud

July 14, 2014 8:55 am | Comments

The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.

TOPICS:

Virtual Autopsy: Inside the Skull of a Suicide Victim

July 2, 2014 9:52 am | Comments

By combining surface scans of the body with CT and MRI scans it is possible to work out what happened to a person without cutting them open. Plus: See inside the head of a man who died from a gunshot wound.                              

TOPICS:

Visionary Digital Enterprises

June 17, 2014 1:58 pm | Comments

Visionary Digital Enterprises designs, manufactures, and sells proprietary micro and macro digital imaging systems. Our systems help our clients provide the hard evidence required to close their case.               

TOPICS:

Talk Forensics - Beyond the Tools

June 2, 2014 8:31 am | Comments

Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools, Flasher box, JTAG, or chip-off extraction methods become necessary. 

TOPICS:

Field Forensics DABIT-014 Mephedrone Test

May 30, 2014 11:33 am | Field Forensics, Inc. | Comments

This short demonstration is for the DABIT™ (Drugs of ABuse Identification Test kit) from Field Forensics, Inc. The test is used to identify the presence of mephederone.                       

TOPICS:

Talk Forensics - Validating Your Tools

May 19, 2014 4:28 pm | Comments

This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform investigations more efficiently, but it is important that you not take these tools for granted.

TOPICS:

2014 Cyber Shield Exercise Sharpens Guard Cyber Warriors

May 12, 2014 9:41 am | by Capt. Kyle Key | Comments

As new requirements emerge from the DoD for cyber defense, the National Guard is leaning forward to prepare the states' and territories' 54 Computer Network Defense Teams for real world attacks. Capt. Kyle Key reports from the 2014 Cyber Shield exercise at the Professional Education Center in North Little Rock, Ark.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading