Advertisement
 
The authoritative voice in forensic disciplines
Subscribe to Forensic Magazine

The Lead

Fire that Destroyed Historic Black Church Likely Caused by Lightning

July 1, 2015 | by Sean Allocca, Editor | Articles | Comments

The National Weather Service has consulted with investigators from the FBI to create a forensic report of lightning strikes from heavy storm cells, and with the use of meteorological evidence, the FBI now believes the likely cause is four lightning strikes that were reported by radar in the area last night.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

Auditor Says Rape Kit Backlog Means Criminals Go Free

July 1, 2015 1:16 pm | by James Pilcher, The Enquirer | News | Comments

The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

TOPICS:

Temporary Tunnel String Light Set

July 1, 2015 12:58 pm | by Larson Electronics LLC | Product Releases

Supplier of explosion proof lighting equipment Larson Electronics has released a temporary tunnel string light set that is designed for high output illumination and daisy chain connections across a total length of 510’ away from the power source. 

A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

Forensic Lab Damage May Lead to Overturned Convictions

July 1, 2015 12:33 pm | by Kyle Barnett, Louisiana Record | News | Comments

A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

TOPICS:
Advertisement
MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the appl

Bug Repair System Imports From Other Programs

July 1, 2015 10:47 am | by Larry Hardesty, MIT | News | Comments

MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing.

TOPICS:
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

New Chinese Law Reinforces Government Control of Cyberspace

July 1, 2015 10:43 am | by Christopher Bodeen, Associated Press | News | Comments

China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

TOPICS:
Cyber criminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyber

Crooks Use Hacked Routers to Aid Cyber Heists

July 1, 2015 10:25 am | by Brian Krebs | Blogs | Comments

Cyber criminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyber heists are leveraging hacked wireless routers to deliver their password-stealing crimeware.

TOPICS:
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

Surveillance Court Rules That NSA Can Resume Bulk Data Collection

July 1, 2015 10:14 am | by Charlie Savage, The New York Times | News | Comments

The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

TOPICS:
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

Coast Guard Unveils New Cyber Strategy

July 1, 2015 9:46 am | by Richard Sisk, Military.com | News | Comments

The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

TOPICS:
Advertisement
A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket

Engineers Turn Detectives to Figure Out What Happened to SpaceX Rocket

June 30, 2015 3:12 pm | by Seth Borenstein, The Associated Press | News | Comments

A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket was a capsule packed with supplies for the crew on the International Space Station.

TOPICS:
Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech devic

Wildlife Forensics Lab Uses Tech to Sniff, Identify Illegal Wood

June 30, 2015 2:47 pm | by Jes Burns, NPR | News | Comments

Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech device, it's now helping track shipments of contraband wood.

TOPICS:
Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this cl

Fingerprint Accuracy Stays the Same Over Time

June 30, 2015 2:36 pm | by Michigan State University | News | Comments

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.

TOPICS:

LED Skid Mount Light Mast

June 30, 2015 2:23 pm | by Larson Electronics LLC | Product Releases

Industrial lighting specialist Larson Electronics has released a 1600 watt skid mount five stage light mast. This tower features a rotating boom that allows for 360° of rotation, a removable mast head, and a cube frame with skid pockets with 4-corner pick eyes for easy transportation. 

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.

OPM Takes Vulnerable Background Investigation Portal Offline

June 30, 2015 12:03 pm | by Zeljka Zorz, Help Net Security | News | Comments

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms. 

TOPICS:
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their d

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data

June 30, 2015 11:41 am | by Andy Greenberg, Wired | News | Comments

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.

TOPICS:
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and

Gas Stations in the Bullseye

June 30, 2015 11:12 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading