NIST Fellow and DNA expert John Butler describes his work in DNA forensic science, how NIST standards enable accurate DNA measurements to be made, how NIST methods helped ID victims of 9/11, how he got interested in forensics, and how NIST's role in DNA forensics is making a difference.
Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you...
The software and data for cloud applications are stored on servers owned by a third party and...
By combining surface scans of the body with CT and MRI scans it is possible to work out what...
This video from the 1960s shows the U.S. Army/CIA shows the importance of good pictures in forensic evidence. Does it have relevance to today?
Coalition-supported lab analyzes ballistics, fingerprints and other evidence.
Visionary Digital Enterprises designs, manufactures, and sells proprietary micro and macro digital imaging systems. Our systems help our clients provide the hard evidence required to close their case.
Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools, Flasher box, JTAG, or chip-off extraction methods become necessary.
This short demonstration is for the DABIT™ (Drugs of ABuse Identification Test kit) from Field Forensics, Inc. The test is used to identify the presence of mephederone.
This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform investigations more efficiently, but it is important that you not take these tools for granted.
As new requirements emerge from the DoD for cyber defense, the National Guard is leaning forward to prepare the states' and territories' 54 Computer Network Defense Teams for real world attacks. Capt. Kyle Key reports from the 2014 Cyber Shield exercise at the Professional Education Center in North Little Rock, Ark.
Today we’ll be discussing the collection and packaging of cell phones and other mobile devices. Proper packaging is essential to preserve the sometimes volatile electronic evidence these devices contain.
In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different set of procedures from those you are familiar with.
In this video, NIJ subject matter experts describe how they solve real world crime problems using science and innovation and describe the impact their work is having on criminal justice.
Forensic knowledge and technology provide the objectivity needed for a strong criminal justice chain in a secure democratic society, says Andro Vos of the Netherlands Forensic Institute (NFI): forensics don't judge you on your skin color, religion or sexual orientation.
With the help of ISAF, Afghanistan now has a new forensics lab to help solve crimes.
The CRU Ditto Forensic FieldStation combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data. It has all of the classic characteristics required for forensic investigations and IT personnel.
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.