The National Weather Service has consulted with investigators from the FBI to create a forensic report of lightning strikes from heavy storm cells, and with the use of meteorological evidence, the FBI now believes the likely cause is four lightning strikes that were reported by radar in the area last night.
A total re-analysis of American forensics is underway – and could be “transformational” to the...
Grainy amateur cell phone video shot by two residents returning home from vacation has captured...
The Houston Forensic Science Center board of directors has eight members who are judges, cops...
The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.
Supplier of explosion proof lighting equipment Larson Electronics has released a temporary tunnel string light set that is designed for high output illumination and daisy chain connections across a total length of 510’ away from the power source.
A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.
MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing.
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.
Cyber criminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyber heists are leveraging hacked wireless routers to deliver their password-stealing crimeware.
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.
A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket was a capsule packed with supplies for the crew on the International Space Station.
Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech device, it's now helping track shipments of contraband wood.
Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.
Industrial lighting specialist Larson Electronics has released a 1600 watt skid mount five stage light mast. This tower features a rotating boom that allows for 360° of rotation, a removable mast head, and a cube frame with skid pockets with 4-corner pick eyes for easy transportation.
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.