Subscribe to Forensic Magazine

The Science and Art of the Facial Reconstruction Process

June 7, 2013 3:42 pm | by nysmuseum | Comments

This video demonstrates the process of facial reconstruction completed by Museum Specialist Gay Malin. The video provides a step-by-step description of how artists go about rebuilding the features of a long-dead person, based only on the shape of their skull.

Evidence Tape - Fresher Tape Sticks Better

June 7, 2013 11:36 am | by Mike McCutcheon | Comments

This is an introduction into the new technology of certified evidence tape and it's purpose. Watch the video from Mike McCutcheon's YouTube channel, where he demonstrates many procedures and techniques useful to forensic practitioners. 


Casting Foot Impressions

June 7, 2013 7:00 am | Comments

This video illustrates the proper technique for casting a foot impression. Creating an impression allows you to look at its unique characteristics and compare it to a known sample, such as a shoe. Unique characteristics include gum, wear patterns, etc.


Acquittals Leave 2004 Murder Unsolved

June 5, 2013 11:09 am | by Brandi Grissom and Justin Dehn | Comments

Megan Winfrey spent six years behind bars before she was acquitted of murder. Now, she is hoping to help solve the mystery of who brutally killed school janitor Murray Burr in 2004. In February, Texas’ highest criminal court acquitted Winfrey, ruling that the dog scent evidence prosecutors used against her was insufficient.

Early Forensics and Crime-solving Chemists - Deborah Blum

April 2, 2013 4:22 pm | Comments

In a CSI age, we take forensic science for granted. New York did not have a medical examiner or forensic toxicologist until 1918, whose eventual arrival changed the landscape of crime investigation forever.

Acceptability of Digital Evidence

February 5, 2013 8:36 am | Comments

Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.


Futures Exploration at the CDFAE

February 5, 2013 6:21 am | Comments

  A look at the Department of Defense Cyber Crime Center's Digital Forensics Academic Excellence Program.  

The Criminal Techniques Academy

October 1, 2012 12:53 pm | Comments

Afghans are being taught how to gather forensic data at a site in Parwan. The Criminal Techniques Academy was set up last year by a US Task Force. Hundreds of students are taking lessons on how to collect fingerprint, DNA and ballistic evidence.


3D Software Recreates Aurora Crime Scene

July 27, 2012 12:46 pm | Comments

Investigators can use sophisticated technology to analyze complicated crime scenes with multiple victims.


NIST Colloquium Series: Digital Forensics

July 23, 2012 1:06 pm | Comments

Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images.

A Geek's Guide to Digital Forensics

January 20, 2012 9:18 am | Comments

A technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting.

Backpacks, Not the Bombs Inside, Key to Finding DNA

December 13, 2011 5:40 am | Comments

Catching terrorists who detonate bombs may be easier by testing the containers that hide the bombs rather than the actual explosives, according to pioneering research led by Michigan State University.


A Culture of Science within NIJ

October 26, 2011 8:00 am | Comments

NIJ Director John H. Laub discusses the creation of a culture of science within the National Institute of Justice, including the value of embracing transparency and a critical perspective.

New Forensic Fingerprinting Approach Retrieves Elusive Prints

August 3, 2011 9:13 am | Comments

Forensics experts can't always retrieve fingerprints from objects, but a new coating process developed by Penn State professors may change that. The process reveals hard-to-develop fingerprints on nonporous surfaces without altering the chemistry of the print.


Advanced Post Exploitation with Rootkits

July 6, 2011 8:04 am | Comments

This is a post-exploitation demonstration with a walk-through of exploiting a Windows machine, getting a copy of the Web server's home page, and then modifying it with an iframe that points to an exploit server.


You may login with either your assigned username or your e-mail address.
The password field is case sensitive.