A new bill in Ohio is attempting to keep the window of opportunity for prosecution open, by extending the statute of limitations cutoff another five years – and allowing DNA hits to reach even further back on the calendar.
In our modern Western world, decapitation is uncommon. It’s usually associated with homicide,...
The National Weather Service has consulted with investigators from the FBI to create a forensic...
A total re-analysis of American forensics is underway – and could be “transformational” to the...
In June 2014, a Russian soldier posted on a social-media site a photo of himself standing in front of a military convoy against a nondescript background of hills, fields and scattered houses. It probably never occurred to him that such an innocuous image could become part of an increasingly detailed case being assembled in a bid to prove the Russian government has been lying when it denies militarily involvement in eastern Ukraine.
The Trump Hotel Collection, a string of luxury hotel properties tied to business magnate and now Republican presidential candidate Donald Trump, appears to be the latest victim of a credit card breach, according to data shared by several U.S.-based banks.
Investigators found no evidence of a shooting after the Washington Navy Yard went on lockdown Thursday because someone reported shots fired in the same building where a gunman killed 12 workers in a rampage two years ago.
The U.S. Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to do it.
A seventeenth-century university has become the victim of a twenty-first-century crime. Harvard University has announced that on June 19, it discovered a breach in the IT systems of its Faculty of Arts and Sciences and Central Administration, currently impacting eight different schools and administrative organizations at the university.
Time of death after 36 hours can be difficult to pin down, owing to decomposition and other limiting physical factors. Now scientists are trying to use science to attempt to give investigators more-detailed timelines in death investigations.
Recent estimates indicate that as many as 15 of every 100 incarcerated offenders where DNA was an element in their trial may be wrongfully convicted because of misused DNA evidence matching techniques. The purpose of this study was to evaluate the ability of expert blinding and consensus feedback to improve the validity of expert testimony, specifically in the context of forensic science.
Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.
What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr. Susan Walsh has received funding from the U.S. Department of Justice to develop tests to get a picture of physical appearance from DNA.
A team of ghost hunters found the body of a missing woman as they explored the old Kuhn Memorial State Hospital in Vicksburg, a site known to be one of Mississippi's most haunted.
A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.
A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.
The founder of one of the Dark Web's fledgling search engines is warning Tor users about the presence of hundreds of fake and booby trapped .onion websites.
Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many soldiers outside of the U.S. Army Signal Corps do not grasp the concept of cyberspace as an operational realm. Empowering them with that understanding is essential to operational success.
I want to talk about a vulnerability disclosure trend that I have recently noticed – a trend that I believe may ultimately cause more harm than good: security vendors using vulnerability disclosure as a marketing tool with the goal of enhancing their company’s bottom line.