This video from the 1960s shows the U.S. Army/CIA shows the importance of good pictures in forensic evidence. Does it have relevance to today?
NIST Fellow and DNA expert John Butler describes his work in DNA forensic science, how NIST standards enable accurate DNA measurements to be made, how NIST methods helped ID victims of 9/11, how he got interested in forensics, and how NIST's role in DNA forensics is making a difference.
Coalition-supported lab analyzes ballistics, fingerprints and other evidence.
Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.
The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.
By combining surface scans of the body with CT and MRI scans it is possible to work out what happened to a person without cutting them open. Plus: See inside the head of a man who died from a gunshot wound.
Visionary Digital Enterprises designs, manufactures, and sells proprietary micro and macro digital imaging systems. Our systems help our clients provide the hard evidence required to close their case.
Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools, Flasher box, JTAG, or chip-off extraction methods become necessary.
This short demonstration is for the DABIT™ (Drugs of ABuse Identification Test kit) from Field Forensics, Inc. The test is used to identify the presence of mephederone.
This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform investigations more efficiently, but it is important that you not take these tools for granted.
As new requirements emerge from the DoD for cyber defense, the National Guard is leaning forward to prepare the states' and territories' 54 Computer Network Defense Teams for real world attacks. Capt. Kyle Key reports from the 2014 Cyber Shield exercise at the Professional Education Center in North Little Rock, Ark.
Today we’ll be discussing the collection and packaging of cell phones and other mobile devices. Proper packaging is essential to preserve the sometimes volatile electronic evidence these devices contain.
In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different set of procedures from those you are familiar with.
In this video, NIJ subject matter experts describe how they solve real world crime problems using science and innovation and describe the impact their work is having on criminal justice.
Forensic knowledge and technology provide the objectivity needed for a strong criminal justice chain in a secure democratic society, says Andro Vos of the Netherlands Forensic Institute (NFI): forensics don't judge you on your skin color, religion or sexual orientation.