Advertisement
 
Videos
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Fingerprint Dusting

January 31, 2011 7:31 am | Comments

How to dust for fingerprints with a Magna brush and Magnetic powder.

TOPICS:

Chemistry Researchers Create Tool to Visualize Bloodstains

November 23, 2010 2:07 pm | Comments

Chemists at the University of South Carolina have developed a camera that can capture blood stains that the human eye can’t see using multimode imaging in the thermal infrared.

TOPICS:

Encase: Locating the MFT from the Volume Boot

November 17, 2010 10:13 am | Comments

Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase.

Advertisement

3 Weeks Left in the 2010 DC3 Digital Forensics Challenge

October 5, 2010 11:55 am | Comments

As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over 11 prizes available this year, make sure to get your submissions in.

Forensic Medical Center Opens at UMB

September 24, 2010 2:06 pm | Comments

The Maryland Forensic Medical Center, which officially opened last week, became the latest addition to the University of Maryland BioPark in Baltimore. The $44 million, state-of-forensic-science facility, under the Maryland Office of the Chief Medical Examiner, is one of the nation's largest stand-alone medical examiner services.

TOPICS:

UAB Fights Cybercrime Nationwide

September 22, 2010 8:59 am | Comments

Operation Swordphish partners the University of Alabama at Birmingham cybercrime laboratory with the Alabama Department of Public Safety and Alabama District Attorneys Association with the goal of prosecuting state and local cybercrimes.

Copy Machines, a Security Risk?

September 22, 2010 8:51 am | Comments

Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine.

Computational and Mathematical Techniques for Authenticating Digital Media

September 1, 2010 10:49 am | Comments

In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for authenticating digital media, and mathematical and computational forensic techniques.

Advertisement

What Happens When You Delete a File?

August 25, 2010 7:30 am | Comments

Computer Forensics Expert Steve Burgess explains what's left over when a file is deleted, and what happens when it is created.

Recovering Deleted E-mail

August 11, 2010 11:42 am | Comments

Computer Forensics Expert Steve Burgess explains what can and cannot be recovered from different kinds of e-mail programs such as Outlook, Eudora, and Webmail.

Computer Forensics: Tracing an E-mail (Hotmail)

August 3, 2010 11:32 am | Comments

A video guide on how to trace the geographic origin of a Hotmail e-mail.

Crime Scene Evidence

August 3, 2010 8:50 am | Comments

The role of the CSI is very specific. It's important to be meticulous and know when to call on specialists.

TOPICS:

Digital Cameras Leave a Fingerprint

July 27, 2010 8:27 am | Comments

Child pornographers will soon have a harder time escaping prosecution thanks to a new technology that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them.

Anthropology in Cold Cases

July 27, 2010 8:10 am | Comments

A University of South Florida anthropologist is joined by a team of graduate students helping Saint Petersburg Police excavate a trio of long-buried bodies, which will hopefully finally give the families of these unnamed murder victims some sense of closure.

TOPICS:

Manipulation of Digital Evidence in Investigations

July 20, 2010 3:54 pm | Comments

Ed Stroz, Co-President, Stroz Friedberg, speaks on the manipulation of digital evidence and its effect on investigations, especially when presenting evidence in legal proceedings.

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading