The Forensic Teacher Magazine Issue 34

Total Page:16

File Type:pdf, Size:1020Kb

The Forensic Teacher Magazine Issue 34 The Forensic Teacher Magazine Issue 34 Page left intentionally blank This magazine is best viewed with the pages in pairs, side by side (View menu, page display, two- up), zooming in to see details. Odd numbered pages should be on the right. New takes on autopsies The ForensicTeacher Magazine Unique? Not so much. Spring 2019 $5.95 US/$6.95 Can New takes on autopsies 3 Spring 2015 The Forensic Teacher • Spring 2019 $5.95 US/$6.95 Can The Volume 12, Number 34, Spring 2019 The Forensic Teacher Magazine is published quarterly, and is owned by Wide Open Minds Educational Services, LLC. Our mailing address is P.O. Box 5263, Wilmington, DE 19808. Please see inside for more information. ForensicTeacher Magazine Articles 30 Aww Rats! An autopsy 6 Interview activity By Mark Feil, Ed.D. By Jessica Parker We’ve never interviewed a fingerprint examiner and This isn’t just a dissection lab in a forensic setting. when we asked around one name kept coming up: This is much more because you’re going to customize Ken Moses. He doesn’t just do it for a living, he does it each corpse to the crime. Your students will definitely because it’s in his bones. This is the guy the FBI calls remember this class. for advice, so who better to talk to our readers about fingerprints? 39 Raising Your Standards 18 Autopsy of a Dill Pickle By Donald J. Frost II By Shelley Montgomery, Ed.D. Putting fingerprints on a 10 print card seems like it should be easy, but too often it’s easy to screw it up. If your students are squeamish or your budget is tight This piece will show you how to make it look simple. this activity transforms a deli staple into a surprisingly engaging and relevant exercise. 45 Fingerprinting 101 28 Using Details to Learn By Erin Radebe and Megan Hart Forensics Using chemicals to visualize fingerprints can seem By Enrico Pelazzo and Tracy (Trimpe) Tomm intimidating, but this guide will walk you through everything you need to know to give your students a Examining fingerprints is pretty straightforward when great experience. students are looking at perfect exemplars from a textbook. This exercise shows them what it’s like to work in the real world. 58 Sticky Fingers Rice University Center for Teaching Excellence A crime has been committed and the cops have a suspect in custody. Your students must use what Features they’ve learned about fingerprints to determine if the 2 Editorial right person has been arrested. 4 Mini-mystery 5 Hot Links 38 Crossword Puzzle 71 Ten Print Card Template 55 Photo Mystery Courtesy of the FBI and adopted by just about everyone taking fingerprints, you can photocopy this template to 70 Answer page take prints from your students. 72 Morgue Guy 72 What’s Going On? 73 Just For Fun 74 Stoopid Crooks 11 www.theforensicteacher.com www.theforensicteacher.comwww.theforensicteacher.com The Forensic Teacher • Spring 2019 Editorial The ForensicTeacher Magazine Editor-in-Chief We Need You Mark R. Feil, Ed.D. Over the past 13 years we’ve published hundreds of articles, most of which Assistant Editor came from our readers who were kind enough to share what worked in their Tammy Feil, Ed.D. classrooms. Some were straightforward how-to guides, some were improvements Book Editor over what they were given to work with, but most were activities our readers Enrico Pelazzo Henssge’s Nomogram developed on their own and wanted to share. And it’s this last group that made The Forensic Teacher Magazine special. The quirky, different, and often cost effective Science Editor activities sent our way from teachers who’d struggled with bored students, tight T. Ann Kosloski budgets, and a lack of mentors or training are exactly the sort of things that get us Copy Editor up in the morning. Tammy Feil In the last couple months we’ve heard from teachers who used our magazine when they first started teaching forensics and wanted to give back.Their Contributing Editor submissions either built on something we published before or they were original Jeanette Hencken activities the teachers had come up with on their own. This magazine is by teachers Layout/Graphic Design for teachers, and we were tickled they wanted to pay it forward. Mark Feil Many forensics educators have put their exercises and lessons on Teachers Pay Teachers, a wonderful website where educators make their resources available for Circulation very reasonable prices. In fact, some of the activities in this issue came from that Don Penglioni website after their authors granted us permission. So, we know some of you are Editorial Assistant actively creating content for the forensic classroom. It’s the rest of you we’d love to Sandy Weiss hear from. One of the main reasons we’ve been publishing so long is because some of our readers approached us with ideas about sharing what works in their classroom. At the risk of sounding like a PBS pledge drive, I can’t stress enough how much Editorial Advisory Board we need your support. Don’t send something you’ve taken word for word from a published textbook or lab manual or we’ll receive a nasty letter from their legal department. However, if you don’t have something original, but you have a lab Lt. John R. Evans or exercise based on something commercial that you changed, added to, AND Section Chief of the Delaware State customized for your classroom, hit us up! Police Homicide Unit Head, DSP Crime Lab and Forensic Readers: we love you and we need you. Please help us. Email us at admin@ Services Unit theforensicteacher.com and tell us what’s on your mind. What works for you? What do you do that makes all the difference when your students start a new chapter Jeanette Hencken or topic in your curriculum? Reach out to us and we will continue to publish. Forensic Science Teacher Otherwise, just like PBS programming, without your support we might not be Webster Grove High School, Webster Groves, MO around too much longer. Cheri Stephens Mark Forensic Science Teacher Washington High School, Washington, MO Adjuct faculty at St. Louis U. Dr. Mark Feil Hugh E. Berryman, PhD, D-ABFA Forensic Anthropologist Volume 12, Number 34, Spring 2019 Director, Forensic Institute for Research The Forensic Teacher Magazine (ISSN 2332-3973) is published two or three times a year and is owned by Wide Open Minds Educational Services, LLC. Our mailing address is P.O. and Education Box 5263, Wilmington, DE 19808. Letters to the editors are welcome and should be sent to Middle Tennessee State University [email protected]. Submissions are welcome and guidelines are available, as is a rate sheet for advertisers at our website www.theforensicteacher.com. If you sign up for a Ted Yeshion, Ph.D. subscription you will receive an email when it is ready for download provided your spam filter doesn’t screen it out, and you opened the email announcing the previous issue; sign up at our Professor - Criminal Justice & website. Back issues are available singularly on our website, or all on a CD. The Forensic Criminalistics, Gannon University Teacher is copyrighted 2019 Wide Open Minds Educational Services, LLC, all rights reserved. All opinions expressed by contributors represent their own views, and not necessarily the views of the staff or editorial board. 2 The Forensic Teacher • Spring 2019 www.theforensicteacher.com www.theforensicteacher.com Congrats! Try or buy ISBN 9781138487451 Try or Buy 3 www.theforensicteacher.com www.theforensicteacher.com The Forensic Teacher • SpringISBN 97811384880522019 Try or Buy Mini-Mystery The Norfolk Bank Robbery THOMAS P. STANWICK, the amateur logician, was a Brinner, whom he admired like a kid brother. Both used to familiar and welcome visitor at Royston Police headquarters. work at a local electronics plant. Shortly after noon on a fine Tuesday in spring, he returned a “3. Pickett was involved in the robbery. Despite his nod to the duty sergeant and strolled to the office of Inspector phobia about guns, which he refuses to touch, he once worked Matt Walker. as a private security guard. “The Ides of April are almost upon us, my lad,” said “4. Schartner and Langley were both involved in the Stanwick cheerily. Walker looked up from the piles of papers robbery or the driver was either Kuhlman or Schartner. on his desk with a weary smile. “5. The driver is a champion bowler. He doesn’t “Tax time! Don’t remind me,” he said. “It’s good to know any other games, but he lifts weights to stay in shape. see you though, Tom.” “Naturally, our main concern is identifying the “What’s been happening?” Stanwick began to fill his shooter,” concluded Walker, “but we’re eager to identify all pipe. three involved in the robbery and their roles.” “How about a bank “Well, Matt,” said Stanwick with a smile, “if you’re robbery?” sure of your facts, I can identify each of the three robbers “A bank robbery!” right now.” Stanwick laughed. “Isn’t that a bit old-fashioned, what with electronic transfers and all? I suppose you’ll be Who were the shooter, the driver, and the collector? investigating a stagecoach holdup next.” “You’d be surprised, Tom,” Walker replied. “Banks still handle quite a lot of actual cash, and that still (Answer on page 70) attracts the bad guys.” “Indeed!,” said Stanwick, arching his eyebrows. “What bank got held up?” “Last Friday, about two o’clock,” related Walker, “two men wearing Halloween masks entered the Norfolk Bank and Trust and demanded the money in the teller cages and in the safe.
Recommended publications
  • Part 1 Digital Forensics Module Jaap Van Ginkel Silvio Oertli
    Part 1 Digital Forensics Module Jaap van Ginkel Silvio Oertli July 2016 Agenda • Part 1: Introduction – Definitions / Processes • Part 2: Theory in Practice – From planning to presentation • Part 3: Live Forensics – How to acquire a memory image – Investigate the image • Part 4: Advanced Topics – Tools – Where to go from here – And more 2 Disclaimer§ • A one or two-day course on forensics will not make you a forensics expert. – Professionals spend most of their working time performing forensic analysis and thus become an expert. • All we can offer is to shed some light on a quickly developing and broad field and a chance to look at some tools. • We will mostly cover Open Source Forensic Tools. 3 Introduction Forensics in History 4 Forensics – History 2000 BC 1200 BC 5 Introduction Definitions / Processes 6 Forensics – The Field digital forensics Computer Forensics Disk Forensics Mobil Forensics Memory Forensics Datenbase Forensics Live Forensics Network Forensics 7 Forensics - Definition • Digital Forensics [1]: – Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. • Computer Forensics [2]: – Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. 8 Forensics - Definitions • Network Forensics [3]: – Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.[1] Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information.
    [Show full text]
  • Experiment: Latent Fingerprinting
    EXPERIMENT: DUSTED! Operating Guide Dusted! Visitors press their fingertips onto a clean Plexiglas sheet. Their fingerprints are then revealed as visitors dust over the print with fingerprint powder. OBJECTIVES: Visitors will learn that every person has a unique set of fingerprints. Visitors will understand how fingerprints are revealed on surfaces. SCIENCE TOPICS PROCESS SKILLS VOCABULARY Properties of Matter Observing Fingerprint Properties of Electrons Comparing/Contrasting Latent UNIT 7 CRIME SCENE CHEMISTRY U7.1 EXPERIENCING CHEMISTRY ©2006 OMSI EXPERIMENT: DUSTED!! Operating Guide Dusted! Procedure: 1. Always wear safety goggles. 2. Use the towel to clean and dry the plastic Plexiglas. 3. Firmly press one of your fingertips, fingerprint side down, anywhere on the Plexiglas. Try not to smudge your print. Can you see your print? 4. Take the same finger and dab it gently onto the oil sponge, then press firmly onto the Plexiglas near your other print. Can you see your print? 5. Pull the brush out of the powder container. 6. Carefully brush over where you left your fingerprints until you see clear prints. What do you see? Is one print more visible than the other? 7. Push the brush back into the powder container. 8. Take a piece of tape and press it down onto one of your prints and rub firmly. 9. Lift the tape off and place it onto a square of the black paper. U7.2 UNIT 7 CRIME SCENE CHEMISTRY EXPERIENCING CHEMISTRY ©2006 OMSI EXPERIMENT: DUSTED! Operating Guide Does all the powder lift with the tape? How does your lifted print compare to the original? Why do we leave fingerprints behind? How can we collect them? A Closer Look: In this experiment, you left your fingerprint on a Plexiglas surface.
    [Show full text]
  • Nature Flaunts Her Glory
    Volume 34, Number 1 ■ January, 2019 Center for the Study of the First Americans Department of Anthropology Texas A&M University 4352 TAMU College Station, TX 77843-4352 www.centerfirstamericans.com - Nature flaunts her glory Near Vik, Iceland, a geologic formation known as a columnar basalt rose spectacularly showcases University of Oregon anthropologist Jon Erlandson, who takes time off from his research on the California Channel Islands to explore Viking-age sites (and engage his Nordic roots). His principal goal is to marshal convincing evidence for the coastal-entry route, one of several competing hypotheses that explain how the First Americans entered North America. See part 1 of our series on how the First Americans got here on page 13. To learn more about Erlandson’s work and career, see his profile on page 17. Photo by Erik Erlandson he Center for the Study of the First Americans fosters research and public T interest in the Peopling of the Americas. The Center, an integral part of the Department of Anthropology at Texas A&M University, pro motes inter disciplinary scholarly dialogue among physical, geological, biological and social scientists. The Mammoth Trumpet, news magazine of the Center, seeks to involve you in the peopling of the Americas by report- ing on developments in all pertinent areas of knowledge. JoinJoin inin thethe SearchSearch for the First Americans! Become a member of the Center for the Study of the First Americans on Center publications plus additional benefits according to the level of and explore the origin, lifeways, artifacts, and other aspects of the membership support you choose.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz Allen Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Forensic Biology 205 Administration Building • 419-372-2015
    Fall 2020 Bachelor of Science in Forensic Science Specialization in Forensic Biology 205 Administration Building • 419-372-2015 BG Perspective (BGP) Requirements FSCI Major Core Requirements (38 Hrs.) Must complete at least 1 course in each of the following: Hrs Grade English Composition and Oral Communication 4 BIOL 2040 Concepts in Biology I Course Credits 4 BIOL 2050 Concepts in Biology II 4 BIOL 3310 Human Anatomy & Physiology Quantitative Literacy 4 BIOL 3320 Human Anatomy & Physiology II _____________________________ ________ 3 CHEM 1770 Intro to Forensic Science 3 CRJU 4400 Law, Evidence, & Procedures in Must Complete at least 2 courses in each of the following: Forensic Science Humanities and the Arts 3 CRJU 4510 Criminal Justice Ethics 3 MATH 2470 Fund. of Statistics 5 PHYS 2010 or 2110 University Physics I 5 PHYS 2020 or 2120 University Physics II Natural Sciences - at least one Lab Science required FSCI Forensic Biology Specialization Requirements (16 hrs.) Social and Behavioral Sciences 4 BIOL 3500 Genetics 3 BIOL 4080 Molecular Biology 3 BIOL 4230 OR FSCI 4230 Forensic Biology Complete total required BGP credit hours by selecting courses from any 3 BIOL 4240 OR FSCI 4240 Forensic DNA Analysis of the above categories: 3 FSCI 4890 Internship OR FSCI 4990 Capstone Additional Requirements (25-26 Hrs.) These courses also fulfill the requirements for a minor in chemistry. Consult with an advisor about declaring the minor. University Requirements Designated courses in Humanities and the Arts and the Social and Behavorial Sciences
    [Show full text]
  • Fingerprint Capture Challenges and Opportunities
    Fingerprint Capture Challenges and Opportunities Dr. Rama Krishnan IDENT - Biometrics Quality Lead Presentation Overview □ Importance of Fingerprint Quality • Impacts on identification system □ Fingerprint Capture Challenges • Factors that will affect/impact fingerprint capture process □ Fingerprint Capture Opportunities • Possible approaches/solutions to enhance fingerprint capture quality Importance of Fingerprint Quality in an AFIS System □ Fingerprint Quality Impact on AFIS •NIST studies have shown that image quality has a direct impact on identification match accuracy □ Poor Fingerprint Image Quality Can Have the Following Negative Impacts in an AFIS System such as US-VISIT •Potential missed identification/verification of a subject •Additional secondary workload process •Additional fingerprint examiner workload Factors of Poor Fingerprint Quality Physiological • Dry fingers due to natural aging process • Worn ridge structure due to occupation • Finer ridge structure specific to a demographic group Behavioral • Uncooperative subject • Nervous Subject Environmental • Humidity / Temperature • Seasonal Change • Ambient Light Operational • High Throughput/ Reduced Capture Time • Unclean Scanner Platen Technological • Application Graphical User Interface (GUI) • Ease of Scanner Use / Interaction Poor Quality Image Illustrations Dry Finger Moist Finger Light Print Dark Print Poor Finger Worn Ridge Placement Structure Image Quality – User Demographics □ Male – Female • Female subjects have worse image quality □ Right Hand – Left Hand 41,000 Subjects • Left hand fingerprint quality is worse than right 24,000 Males hand 17,000 Females □ By Age of Subject • Image Quality worsens as subject age increases Image Quality Assurance Monitoring/Reporting 1 Application Identifies if there is an application-specific image quality issue - scanner, fingerprint capture GUI etc. 2 Site/Terminal Identifies if there is a site/terminal/operator-specific image quality issue within the application.
    [Show full text]
  • Cognitive Human Factors and Forensic Document Examiner Methods and Procedures Author(S): Mara L
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: Cognitive Human Factors and Forensic Document Examiner Methods and Procedures Author(s): Mara L. Merlino, Chandler Al Namer, Taleb Al Namer, La’Quida Smith, Veronica Blas Dahir, Charles Edwards, Derek L. Hammond Document Number: 254581 Date Received: March 2020 Award Number: 2015-DN-BX-K069 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Cognitive Human Factors and Forensic Document Examination Methods and Procedures 1 Cognitive Human Factors and Forensic Document Examiner Methods and Procedures Final Summary Overview NIJ Award Number 2015-DN-BX-K069 Principal Investigator: Mara L. Merlino Research Assistants: Chandler Al Namer, Taleb Al Namer, La’Quida Smith Kentucky State University Frankfort, Kentucky 40601 Subaward Principal Investigator: Veronica Blas Dahir Research Assistants: Charles Edwards University of Nevada, Reno Reno, Nevada 89557 Expert Consultant: Derek L. Hammond U.S. Army Criminal Investigation Laboratory Forest Park, Georgia Acknowledgements: Bryan J. Found, Victoria Police Forensic Services Department Adrian Dyer, Royal Melbourne Institute of Technology Kentucky State University: Piarre Easley, Robert Olson University of Nevada, Reno: Mauricio Alvarez, J. Guillermo Villalobos, Denise Schaar Buis, Emily Wood, Chris Swinger, Chris Sanchez, Katherine Caufield Submitted to the U.S.
    [Show full text]
  • Digital Forensics Based Analysis of Mobile Phones
    Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Digital Forensics Based Analysis of Mobile Phones Pooja V Chavan PG Student, Department of Computer Engineering, K. J. Somaiya College of Engineering, Mumbai, Maharashtra, India Email: [email protected] DOI: Abstract Now-a-day’s ratio of mobile phone is increasing day by day. Digital forensics methodology is use to recover and investigate data that found in a digital devices. Mobile phone usage is more that’s why not only judicial events occurred but also mobile forensics and subdivision of digital forensics are emerged. Some hardware and software are used for mobile phone investigations. Keywords: Digital forensics, digital devices, mobile phone INTRODUCTION because electronic device have a variety of Forensic science’s subdivision is a digital different operating system, technology, forensic, is a one type of process. The storage structure, Features. First identify main objective of this process to find the crime after that digital forensic work evidence in digital devices [1]. Digital on four important steps (Figure 1): forensics are used for the analysis of data, such as audio, video, pictures, etc. After • Collection: The collected of evidence the analysis of electronic devices data that like fingerprints, broken fingernails help for legal process. The usage of blood and body fluids. advanced technology is increasing rapidly. • Examination: The examination of Electronic device have a variety of product process is depending on evidence. like tablet, flash memory, memory card, • Analysis: The crime scenes obtain SD card, etc. When forensic analysis is different digital evidence, analysis is performed at that time data should be done on storage evidence this secure.
    [Show full text]
  • Government Institute of Forensic Science, Aurangabad M.Sc
    DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY, AURANGABAD SYLLABUS Of M.Sc. II (Semester III and IV) (Forensic Science) Effective from Academic Year 2013-2014 onwards 1 Government Institute Of Forensic Science, Aurangabad M.Sc. II Year (Finger print and Questioned Document) Preamble M.Sc.-II (Sem-III & IV) (Forensic Science) Ordinance ------------:- Title of the Program: - M.Sc.-II (Sem-III & IV) (Forensic Science) Ordinance ------------:-- Eligibility: - M.Sc.-I (Forensic Science) Regulation no. ----------- : Specializations :- Four Specializations viz. Finger print and Questioned Document, Forensic Chemistry and Toxicology, Forensic Biology, Serology and DNA Finger Printing, Cyber Space, IT Security and Cyber Forensic may be offered subject to the availability of students as mentioned in the preceding Para/ regulation. Regulation no. -----------:- Minimum intake capacity for each specialization: - There shall be minimum 25% of the intake capacity of the students for each specialization. Regulation no. ----------- :-Allotment of specialization :- The specialization to the students will be allotted on the basis of choice and merit (M.Sc.-I) of the students. However, if the criterion of minimum intake capacity for a particular specialization as mentioned above is not full filled, in such case the students will be diverted to other specialization strictly based on the marks obtained by him/her at M.Sc.-I examination. In such situation the decision of the Head of the concerned Institution shall be final. Regulation no.-------------- :- Course structure Each semester will have four theory papers and two theory based practical papers. In the fourth semester students will carry out Dissertation instead of one practical paper. Each paper shall be of 75 marks.
    [Show full text]
  • L-1 Identity Solutions Fingerprint Reader
    L-1 Identity Solutions Fingerprint Reader Savance Phone: 248-478-2555 | Fax: 248-478-3270 www.eioboard.com | [email protected] | www.savance.com © 2014 L-1 Identity Solutions Fingerprint Reader Table of Contents Fingerprint Reader Hardware Installation (4G V-Flex) 3 Fingerprint Reader Hardware Installation (4G V-Flex Lite) 5 Kiosk/Punch RS-232 Wiring Installation (Option 1) 9 Kiosk/Punch RS-485 Wiring Installation (Option 2) 13 Infinias Door Module Wiegand Wiring Installation (Option 3) 14 SecureAdmin Software Installation 19 SecureAdmin Software Configuration 30 EIOBoard Kiosk Software Configuration 37 Savance EIOBoard • www.eioboard.com • Phone: 248-478-2555 • Fax: 248-478-3270 2 1111 W. Oakley Park Rd., Ste 103 Commerce Township, MI 48390 L-1 Identity Solutions Fingerprint Reader Fingerprint Reader Hardware Installation (4G V-Flex) Here are the instructions for setting up the fingerprint reader to the computer. This applies to the 4G V-Flex model only. 1. Unbox your L-1 Identity Solutions Fingerprint Reader. 2. Connect the power adapter into the back of the unit in the round connector. Plug the other end into the wall. The unit’s lights should turn on. Savance EIOBoard • www.eioboard.com • Phone: 248-478-2555 • Fax: 248-478-3270 3 1111 W. Oakley Park Rd., Ste 103 Commerce Township, MI 48390 L-1 Identity Solutions Fingerprint Reader 3. One option for communicating between the fingerprint reader and the SecureAdmin fingerprint software is to use an Ethernet cable. You would plug one end of the Ethernet cable into the back of the unit, and the other end into a router or switch on your network.
    [Show full text]
  • Hacking Exposed Computer Forensics, Second Edition, Delivers the Most Valuable Insight on the Market
    HACKING EXPOSED™ COMPUTER FORENSICS SECOND EDITION REVIEWS “This book provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties all the complex pieces together with real-world case studies. With so many books on the topic of computer forensics, Hacking Exposed Computer Forensics, Second Edition, delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.” —Brian H. Karney, COO, AccessData Corporation “Hacking Exposed Computer Forensics is a ‘must-read’ for information security professionals who want to develop their knowledge of computer forensics.” —Jason Fruge, Director of Consulting Services, Fishnet Security 00-FM.indd i 8/23/2009 3:54:42 AM “Computer forensics has become increasingly important to modern incident responders attempting to defend our digital castles. Hacking Exposed Computer Forensics, Second Edition, picks up where the first edition left off and provides a valuable reference, useful to both beginning and seasoned forensic professionals. I picked up several new tricks from this book, which I am already putting to use.” —Monty McDougal, Raytheon Information Security Solutions, and author of the Windows Forensic Toolchest (WFT) (www.foolmoon.net) “Hacking Exposed Computer Forensics, Second Edition, is an essential reference for both new and seasoned investigators. The second edition continues to provide valuable information in a format that is easy to understand and reference.” —Sean Conover, CISSP, CCE, EnCE “This book is an outstanding point of reference for computer forensics and certainly a must-have addition to your forensic arsenal.” —Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co.
    [Show full text]
  • Associate of Science to B.S. in Forensic Biology
    Guilford College Bi-Lateral Transfer Agreement Proposal Guilford Technical Community College ASSOCIATE OF SCIENCE TO B.S. IN FORENSIC BIOLOGY GENERAL EDUCATION REQUIREMENTS FOUNDATIONS ENGL 102 ENG 111 = ENGL 102 (3T) Historical Perspectives ENG 112 = ENGL 150 + HIST 131 = HIST 103 (6T) Foreign Language SPA 111 = SPAN 101 (3T) Quantitative Literacy MAT 152 = MATH 112 (4T) EXPLORATIONS – BREADTH Arts MUS 110 = MUS 111 (3T) Business and Policy Studies BUS 110= BUS 120 (3T) Humanities ENG 232 = ENGL 226 (3T) Natural Science BIO 112 = BIOL 112 (4T) Social Science ECO 251=ECON 222 (3T) EXPLORATIONS – CRITICAL PERSPECTIVES Intercultural REL 110 = REL 150 (3T) Social Justice/Environmental Responsibility PHI 240= PHIL 111 (3T) Diversity in the U.S. ENG 232 = ENGL 226 INTERDISCIPLINARY CAPSTONE COURSE IDS 400-level One approved Guilford course MAJOR: FORENSIC BIOLOGY BIO 111 = BIOL 111 Int. Biol.: Molecules & Cells (4T) BIOL 245 Introduction to Forensic Science BIOL 246 Forensic Chemistry BIOL 313 Cell Biology BIOL 341 Human Anatomy and Physiology I Two courses from: BIOL 115 General Botany BIOL 342 Human Anatomy and Physiology II BIOL 434 Biochemistry BIOL 443 Genetics CHM 151=CHEM 111 Chemical Principles I (4T) CHM 152=CHEM 112 Chemical Principles II (4T) PHYS 211 College Physics I PHYS 212 College Physics II One course from MATH 115 Elementary Functions MATH 271=MATH 121 (4T) MATH 122 Calculus II MATH 123 Accelerated Calculus ELECTIVES: MAT 172 = MATH 150 (4T) PED 110= SPST 109 (2T) ACA 122= GST 150 (1T) One Guilford elective at 4 credit hours One Guilford elective at 4 credit hours One Guilford elective at 4 credit hours One Guilford elective at 3 credit hours Students must satisfy all General Education, major, and minor requirements and complete a minimum of 128 credits with at least a “C” (2.0) average in order to earn a baccalaureate degree.
    [Show full text]