Dwayne Wilson was sentenced to life last week in Ohio after his DNA matched rape kit evidence relating to assaults on four women in Cleveland in the 1990s. Wilson, who the judge called “the worst of the worst,” was about to be released from prison when evidence from a 20-year-old rape kit kept the serial pedophile behind bars.
The D.C. Consolidated Forensic Laboratory, with its shiny solar-shading panels and green roof,...
Producer of "Bones" Kathy Reichs has had great success writing a series of novels about forensic...
In this episode, learn more about the newest mobile x-ray technology that is already on crime...
The $220 million facility has a 20,000-gallon cistern to collect greywater, and panes on the façade that aren’t solar panels like most people think, but are connected to a small weather station on the roof.
On Friday, the White House Summit on Cybersecurity and Consumer Protection was held at Stanford university.
During her TEDxVictoria talk, Social psychologist Elizabeth Brimacombe explains how social influence can change eyewitness testimony — and how it can affect anyone.
Bruce Schneier recently talked with Edward Snowden, who spoke using video chat from 4,500 miles away in Moscow, before an audience at Harvard's School of Engineering and Applied Sciences about encryption.
This video from the 1960s shows the U.S. Army/CIA shows the importance of good pictures in forensic evidence. Does it have relevance to today?
NIST Fellow and DNA expert John Butler describes his work in DNA forensic science, how NIST standards enable accurate DNA measurements to be made, how NIST methods helped ID victims of 9/11, how he got interested in forensics, and how NIST's role in DNA forensics is making a difference.
Coalition-supported lab analyzes ballistics, fingerprints and other evidence.
Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.
The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.
By combining surface scans of the body with CT and MRI scans it is possible to work out what happened to a person without cutting them open. Plus: See inside the head of a man who died from a gunshot wound.
Visionary Digital Enterprises designs, manufactures, and sells proprietary micro and macro digital imaging systems. Our systems help our clients provide the hard evidence required to close their case.
Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools, Flasher box, JTAG, or chip-off extraction methods become necessary.
This short demonstration is for the DABIT™ (Drugs of ABuse Identification Test kit) from Field Forensics, Inc. The test is used to identify the presence of mephederone.
This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform investigations more efficiently, but it is important that you not take these tools for granted.
As new requirements emerge from the DoD for cyber defense, the National Guard is leaning forward to prepare the states' and territories' 54 Computer Network Defense Teams for real world attacks. Capt. Kyle Key reports from the 2014 Cyber Shield exercise at the Professional Education Center in North Little Rock, Ark.