Advertisement
 
Articles
Subscribe to Forensic Magazine

The Lead

Security Measures Questioned after Co-pilot 'Intentionally' Downed Germanwings Jetliner

March 26, 2015 | by Sean Allocca, Editor | Comments

Strict aviation regulations, created after the events of 9/11, focused on securing the cockpit by requiring fortified cockpit doors that can withstand the blast from a hand grenade, and escape exits that can only be accessed from the inside, CNN reports. But, this latest tragedy has some asking: what's the use of an armored cockpit, if the pilot can be locked out of it?

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Unique DNA Code Nabs Thieves in the Act

March 25, 2015 1:49 pm | by Sean Allocca, Editor | Comments

Called Operation Shield, 433 people who had been taken into police custody, were examined to determine if a unique DNA liquid sprayed on objects, like cash tills and computer screens, could be found, forensically linking back the individual to the crime scene, according to a news report.

TOPICS:
Crime Attorney Arkady Bukh thinks that because of the US-led sanctions on Russia, there may be more hackers showing up. These are seven of the Russian Hackers that have already infiltrated US computer systems and have been caught.

7 Russian Hackers to Soon Appear in Court

March 25, 2015 11:38 am | by Ernie Austin, Newsletter Editor | Comments

Crime Attorney Arkady Bukh thinks that because of the US-led sanctions on Russia, there may be more hackers showing up. These are seven of the Russian Hackers that have already infiltrated US computer systems and have been caught.

TOPICS:
Digital information is stored on innumerable HDDs, SSDs, DVDs, USB sticks, SD cards, magnetic tapes, and so forth. Although the data is timeless, the storage devices are finite and of limited capacity. As the amount of data continues to grow, so will the

The Future of Data Storage is Upon Us

March 24, 2015 12:51 pm | Comments

Digital information is stored on innumerable HDDs, SSDs, DVDs, USB sticks, SD cards, magnetic tapes, and so forth. Although the data is timeless, the storage devices are finite and of limited capacity. As the amount of data continues to grow, so will the demand for larger and more efficient data storage devices.

TOPICS:
Advertisement

New DNA Software Helps Convict Two-Time Felon

March 23, 2015 12:43 pm | by Sean Allocca, Editor | Comments

John Wakefield, 48, now faces life in prison without parole, after his DNA was found and identified on the victim’s shirt collar and on the murder weapon, according to a press release.

TOPICS:
Working in forensic sciences will invariably bring you into potential contact with infectious agents. This is serious business. Performance of some forensic duties might lead to exposure to indigenous or exotic agents with potential for severe or lethal d

Have an Effective Exposure Control Plan

March 20, 2015 1:38 pm | Comments

Working in forensic sciences will invariably bring you into potential contact with infectious agents. This is serious business. Performance of some forensic duties might lead to exposure to indigenous or exotic agents with potential for severe or lethal disease. The foundation for safe performance of duties and proper containment is an effective exposure control plan. 

TOPICS:

Washington DC's Crime Lab Gets a Royal Inquisition

March 20, 2015 12:14 pm | by Sean Allocca, Editor | Comments

Camilla, the Duchess of Cornwall, toured the D.C. Consolidated Forensic Lab (CFL), on Thursday, the same lab that came under intense scrutiny this month after federal prosecutors stopped sending evidence there in January, and Mayor Muriel Bowser ordered an audit of the facility amidst allegations of misconduct.

TOPICS:
Rocket Kitten, the cyberattack group that recently launched an email malware campaign against European and Israeli targets, has delivered a new state-sponsored attack, according the a report by Trend Micro.

Rocket Kitten GHOLE Attack Returns With Keyloggers

March 20, 2015 11:03 am | by Ernie Austin, Associate Editor | Comments

Rocket Kitten, the cyberattack group that recently launched an email malware campaign against European and Israeli targets, has delivered a new state-sponsored attack, according the a report by Trend Micro.

TOPICS:

Remains of 'Don Quixote' Author, Cervantes, Found in Madrid

March 19, 2015 12:42 pm | by Sean Allocca, Editor and Ernie Austin, Associate Editor | Comments

Experts used infrared cameras, 3-D scanners and ground-penetrating radar to initially sweep the floor of the burial tomb to help pinpoint the best site for archeologists to start excavating. The bones, which were interred in 1616, were lost when Madrid’s Convento de las Monjas Trinitarias Descalzas was rebuilt sometime later in the 17th century.

TOPICS:
Advertisement

Can $41 Million Even Dent the Backlog?

March 18, 2015 2:17 pm | by Sean Allocca, Editor | Comments

The administration announced another $41 million, on Monday, to help test backlogged sexual assault kits, an estimated 400,000 kits nationwide, according to a White House press release. But for those 400,000 victims, justice might still depend on more federal funding.

TOPICS:

Mobile Device Search and Seizure in a Post-Riley World

March 18, 2015 8:32 am | by Christa Miller | Cellebrite | Comments

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.

TOPICS:

Inside the Mind of Forensic Science: An Interview with Dan Simon (Part 2)

March 17, 2015 1:17 pm | by Sean Allocca, Editor | Comments

Forensic Magazine recently spoke with Dan Simon about his work, and about an interesting presentation he gave during the Plenary Discussion at AAFS on cognitive biasin Orlando, Fla. Now, Simon discusses what needs to be done to minimize bias and make forensic science an effective “investigative tool” in all criminal investigations.

TOPICS:
SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browser

Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving

March 17, 2015 8:57 am | by David Makeev, Nikita Timofeev, Oleg Afonin and Yuri Gubanov | Belkasoft | Comments

SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.

TOPICS:

King Richard III’s Last Moments Revealed

March 16, 2015 12:42 pm | by Sean Allocca, Editor | Comments

Researchers believe an injury sustained to the interior surface of the cranium, consistent with wounds inflicted by a sword or the spiked top of a halberd, would have knocked the king unconscious before death.Eleven injuries have been identified in all, nine of them delivered to the skull around the time of death, two to the postcranial skeleton, although many are believed to have been sustained after death.

TOPICS:

Inside the Mind of Forensic Science: An Interview with Dan Simon

March 11, 2015 1:40 pm | by Sean Allocca, Editor | Comments

University of Southern California professor Dan Simon, S.J.D., researches the “messy” process of forming decisions in everyday walks of life and applies his findings to determinations in criminal cases. Human reasoning “infuses a process” throughout the course of an investigation, and Simon has dedicated most of his scientific career to finding out exactly how.

TOPICS:

Obama's 'Privacy Bill of Rights' Not Without Critics

March 9, 2015 12:52 pm | by Sean Allocca, Editor | Comments

President Obama released a draft bill outlining long-awaited legislation that would establish “baseline protections” for online consumers under a proposed Consumer Privacy Bill of Rights. But the bill is over three years in the making, and critics say it doesn’t do nearly enough

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading