Subscribe to Forensic Magazine
View Sample

Forensic Magazine

Futures Exploration at the CDFAE

February 5, 2013 6:21 am | Comments

  A look at the Department of Defense Cyber Crime Center's Digital Forensics Academic Excellence Program.  


The Criminal Techniques Academy

October 1, 2012 12:53 pm | Comments

Afghans are being taught how to gather forensic data at a site in Parwan. The Criminal Techniques Academy was set up last year by a US Task Force. Hundreds of students are taking lessons on how to collect fingerprint, DNA and ballistic evidence.


3D Software Recreates Aurora Crime Scene

July 27, 2012 12:46 pm | Comments

Investigators can use sophisticated technology to analyze complicated crime scenes with multiple victims.


NIST Colloquium Series: Digital Forensics

July 23, 2012 1:06 pm | Comments

Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images.

A Geek's Guide to Digital Forensics

January 20, 2012 9:18 am | Comments

A technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting.

Backpacks, Not the Bombs Inside, Key to Finding DNA

December 13, 2011 5:40 am | Comments

Catching terrorists who detonate bombs may be easier by testing the containers that hide the bombs rather than the actual explosives, according to pioneering research led by Michigan State University.


A Culture of Science within NIJ

October 26, 2011 8:00 am | Comments

NIJ Director John H. Laub discusses the creation of a culture of science within the National Institute of Justice, including the value of embracing transparency and a critical perspective.


New Forensic Fingerprinting Approach Retrieves Elusive Prints

August 3, 2011 9:13 am | Comments

Forensics experts can't always retrieve fingerprints from objects, but a new coating process developed by Penn State professors may change that. The process reveals hard-to-develop fingerprints on nonporous surfaces without altering the chemistry of the print.


Advanced Post Exploitation with Rootkits

July 6, 2011 8:04 am | Comments

This is a post-exploitation demonstration with a walk-through of exploiting a Windows machine, getting a copy of the Web server's home page, and then modifying it with an iframe that points to an exploit server.

Cadaver Dog Searches on USMC Cemetery in Tarawa

June 1, 2011 2:20 am | Comments

History Flight's clandestine grave detection team runs Buster, the world's most scientifically tested cadaver dog, on a lost U.S. Marine cemetery #27 that they found with ground penetrating radar in 2008.


Bullet-Resistant Wool Softens the Blow

April 11, 2011 4:29 am | Comments

Researchers at RMIT University in Melbourne, Australia are developing wool-Kevlar blends for ballistic materials, in a bid to create lighter, cheaper, and more effective bullet-resistant vests that work in both dry and wet conditions.


Digital Mapping in Police Work

March 18, 2011 4:47 am | Comments

Geospatial technology allows law enforcement officials to identify crime hot spots in the communities they serve, so they can dedicate the necessary resources to these areas, thus maximizing efficiency.


Fingerprint Dusting

January 31, 2011 7:31 am | Comments

How to dust for fingerprints with a Magna brush and Magnetic powder.


Chemistry Researchers Create Tool to Visualize Bloodstains

November 23, 2010 2:07 pm | Comments

Chemists at the University of South Carolina have developed a camera that can capture blood stains that the human eye can’t see using multimode imaging in the thermal infrared.


Encase: Locating the MFT from the Volume Boot

November 17, 2010 10:13 am | Comments

Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase.


You may login with either your assigned username or your e-mail address.
The password field is case sensitive.