scholarly journals An Interlaboratory Study to Evaluate the Forensic Analysis and Interpretation of Glass Evidence

2021 ◽  
pp. 100378
Author(s):  
Katelyn Lambert ◽  
Shirly Montero ◽  
Anuradha Akmeemana ◽  
Ruthmara Corzo ◽  
Gwyneth Gordon ◽  
...  
2021 ◽  
Author(s):  
Katelyn Lambert ◽  
Shirly Montero ◽  
Anuradha Akmeemana ◽  
Ruthmara Corzo ◽  
Gwyneth Gordon ◽  
...  

Author(s):  
Edward G. Bartick ◽  
John A. Reffner

Since the introduction of commercial Fourier transform infrared (FTIR) microscopic systems in 1983, IR microscopy has developed as an important analytical tool in research, industry and forensic analysis. Because of the frequent encounter of small quantities of physical evidence found at crime scenes, spectroscopic IR microscopes have proven particularly valuable for forensic applications. Transmittance and reflectance measurements have proven very useful. Reflection-absorption, specular reflection, and diffuse reflection have all been applied. However, it has been only very recently that an internal reflection (IRS) objective has been commercially introduced.The IRS method, also known as attenuated total reflection (ATR), has proven very useful for IR analysis of standard size samples. The method has been applied to adhesive tapes, plastic explosives, and general applications in the analysis of opaque materials found as evidence. The small quantities or uncontaminated areas of specimens frequently found requiring forensic analysis will often be directly applicable to microscopic IRS analysis.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


PCI Journal ◽  
2020 ◽  
Vol 65 (4) ◽  
Author(s):  
Rémy D. Lequesne ◽  
William N. Collins ◽  
Enrico Lucon ◽  
David Darwin ◽  
Ashwin Poudel

Sign in / Sign up

Export Citation Format

Share Document