Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
Published Date
Displaying 376 - 400 of 540

The Triad of Scientific Publication: Reading, Writing, and Reviewing

October 2, 2013
Author(s)
John M. Butler
A workshop on scientific publication was presented at the 2013 ISFG conference by the author, who has written four widely-used textbooks and 150 peer-reviewed articles and invited book chapters. This article is a summary of key points made during the

Biology and Genetics of New Autosomal STR Loci Useful for Forensic DNA Analysis

August 19, 2013
Author(s)
John M. Butler, Carolyn R. Steffen
Short tandem repeats (STRs) are regions of tandemly repeated DNA segments found throughout the human genome that vary in length (through insertion, deletion, or mutation) with a core repeated DNA sequence. Forensic laboratories commonly use tetranucleotide

Forensic Science Laboratories: Handbook for Facility Planning, Design, Construction, and Relocation.

June 25, 2013
Author(s)
James Aguilar, Tom Barnes, Joseph Browne, Yvette Burney, John Byrd, Bonnie Carver, Adam Denmark, Susan Halla, Lou Hartman, Alison Kennedy, Deborah Leben, Greg Matheson, Jim McClaren, Russell McElroy, Romeo Miranda, Kenneth Mohr, Michael Mount, Steve Sigel, Jennifer Smither, Melissa Taylor, Aliece Watts, Shannan Williams
This handbook is a resource for laboratory directors, designers, consultants, and other stakeholders involved in the construction or major renovation of forensic science laboratories. Laboratory construction and renovation projects must meet the unique

A New Metric for Latent Fingerprint Image Preprocessing

June 23, 2013
Author(s)
Mary Frances Theofanos, Andrew Dienstfrey, Brian Stanton, Haiying Guan
Although fingerprint recognition is a well-studied area, forensic fingerprint preprocessing based on computational theory is still a relatively new domain in need of further scientific study and development of standards of best practice. Latent fingerprint

Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint Identification Systems

May 14, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

Writing Guidelines for Requests for Proposals for Automated Fingerprint Identification Systems

April 25, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers

April 23, 2013
Author(s)
Susan M. Ballou, Margaret C. Kline, Mark D. Stolorow, Melissa Taylor, Shannan Williams, Phylis S. Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E. Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime scene

Guidelines for Minimum Information for Publication of Quantitative Digital PCR Experiments

April 9, 2013
Author(s)
Ross J. Haynes, Jim Huggett, Carole Foy, Vladimir Benes, Kerry Emslie, Jeremy Garson, Jan Hellemans, Mikael Kubista, Tania Nolan, Michael Pfaffl, Gregory Shipley, Jo Vandesompele, Carl Wittwer, Stephen Bustin
There is growing interest in the digital polymerase chain reaction (dPCR) as technological progress makes it a practical and increasingly affordable technology. dPCR allows the precise quantification of nucleic acid, facilitating the measurement of small

Latent Interoperability Transmission Specification

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
The Latent Interoperability Transmission Specification (LITS) is an application profile of the American National Standards Institute/National Institute of Standards and Technology, Information Technology Laboratory (ANSI/NIST-ITL) standard entitled

Markup Instructions for Extended Friction Ridge Features

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/National

Mapping Evidence Graphs to Attack Graphs

January 17, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to

Using Attack Graphs in Forensic Examinations

January 16, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help

Extended Feature Set Profile Specification

January 14, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are designed to

Forensic DNA Advisory Groups: DAB, SWGDAM, ENFSI, and BSAG

December 28, 2012
Author(s)
John M. Butler
A number of organizations exist around the world that work on a national or international level to aid quality assurance and to promote accurate forensic DNA testing. These organizations are made up primarily of working scientists who coordinate their

Developmental Validation of the PowerPlex(R) ESI 17 Pro System

December 27, 2012
Author(s)
Carolyn R. Steffen, Margaret C. Kline, John Butler, Robert S. McLaren, Jaynish Patel, Margaret Ewing, Douglas R. Storts, Fabrice Noel, Sophie Dognaux
The SE33 locus is one of the most polymorphic markers used in human identification. However, it also possesses multiple microvariants both within the repeat and in the flanking regions. Such flanking region mutations can generate discordant allele calls
Was this page helpful?