An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Lili Wang, Adolfas Gaigalas, Gerald Marti, Fatima Abbasi, Robert A. Hoffman
A procedure is presented for calibrating the output of a multicolor flow cytometer in units of antibodies bound per cell (ABC). The procedure involves two steps. First, each of the fluorescence channels of the flow cytometer is calibrated using Ultra
In the Information Age, with computer technology and applications evolving at a dizzying pace, no field of forensic science is more exciting or challenging than digital evidence analysis. Traditionally, the criminal justice system has lagged behind the
Subscriber Identity Modules (SIMs) are a fundamental standardized component of most cell phones used worldwide. A SIM can be removed from a phone handset and inserted into another, allowing users to port identity, personal information, and service between
Carolyn R. Steffen, Margaret C. Kline, Julio J. Mulero, Robert E. Lagace, Chien-Wei Chang, Lori K. Hennessy, John M. Butler
The AmpFlSTR MiniFiler PCR Amplification kit developed by Applied Biosystems enables size reduction on eight of the larger short tandem repeat (STR) loci amplified in the Identifiler kit, which will aid recovery of information from highly degraded DNA
The data that is captured on mobile phones can be a source of valuable information to organizations that are investigating crimes, policy violations and other security incidents. The science of recovering digital evidence from mobile phones, using
P. Jonathon Phillips, Alice J. O'Toole, Fang Jian, Julianne Ayadd, Nils Penard, Herve Abdi
We compared the accuracy of eight state-of-the-art face recognition algorithms with human performance on the same task. Humans and algorithms determined whether two face images, taken under different illumination conditions, were pictures of the same
W.Bertrand (Randy) Doriese, Joel Ullom, James A. Beall, William Duncan, S. L. Ferreira, Gene C. Hilton, Rob Horansky, Kent D. Irwin, John Mates, Carl D. Reintsema, Leila R. Vale, Yizi Xu, Barry L. Zink, Andrew Hoover, Michael W. Rabin, Clifford R. Rudy, Duc Vo
We present a prototype for a high-energy-resolution, high-count-rate, gamma-ray spectrometer intended for nuclear forensics and international nuclear safeguards. The prototype spectrometer is an array of 14 transition-edge-sensor microcalorimeters with an
E Salata, F Barni, C Rapone, A Berti, G Lago, John Butler, Margaret C. Kline
During the study of Y haplotype distribution of the Short Tandem Repeat (STR) loci included in the commercial kits PowerPlex Y System (Promega Corporation) and AmpFlSTR Yfiler PCR Amplification Kit (Applied Biosystems) we sampled 110 individuals across
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message
Alim A. Fatah, Richard D. Arcilesi, Tesema Chekol, Charlotte H. Lattin
In recognizing the needs of state and local emergency first responders, the Office of Law Enforcement Standards (OLES) at NIST is developing biological detection equipment guides, through funding provided by the Department of Homeland Security (DHS). This
The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for use by law enforcement and other organizations involved with computer forensic investigations. This paper examines whether the
This bulletin explains the need for the use of digital forensic techniques, which can help organizations respond more effectively to information security incidents, and protect the confidentially, integrity and availability of their information and systems
Timothy Grance, Suzanne Chevalier, Karen A. Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics. The
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones
John M. Butler, Michael D. Coble, Amy E. Decker, David L. Duewer, Carolyn R. Steffen, Margaret C. Kline, Janette W. Redman, Peter Vallone
Our project team at the U.S. National Institute of Standards and Technology (NIST) is funded by the National Institute of Justice (NIJ) to conduct research that benefits the human identity testing community and to create tools that enable forensic DNA
Single nucleotide polymorphisms(SNP) are the most frequent form of DNA sequence variation in the human genome and are becoming increasingly useful as genetic markers for genome mapping studies, medical diagnostics, and human identity testing. The primer
Over the past decade, the human identity testing community has settled on a set of core short tandem repeat (STR) loci that are widely used for DNA typing applications. A variety of commercial kits enable robust amplification of these core STR loci. A