Strict aviation regulations, created after the events of 9/11, focused on securing the cockpit by requiring fortified cockpit doors that can withstand the blast from a hand grenade, and escape exits that can only be accessed from the inside, CNN reports. But, this latest tragedy has some asking: what's the use of an armored cockpit, if the pilot can be locked out of it?
Duke University professor Sara Katsanis says there’s a “humanitarian crisis” happening on our...
D.C. Mayor Muriel Bowser ordered an audit of the crime lab, last week, after federal prosecutors...
Called Operation Shield, 433 people who had been taken into police custody, were examined to determine if a unique DNA liquid sprayed on objects, like cash tills and computer screens, could be found, forensically linking back the individual to the crime scene, according to a news report.
Crime Attorney Arkady Bukh thinks that because of the US-led sanctions on Russia, there may be more hackers showing up. These are seven of the Russian Hackers that have already infiltrated US computer systems and have been caught.
Digital information is stored on innumerable HDDs, SSDs, DVDs, USB sticks, SD cards, magnetic tapes, and so forth. Although the data is timeless, the storage devices are finite and of limited capacity. As the amount of data continues to grow, so will the demand for larger and more efficient data storage devices.
John Wakefield, 48, now faces life in prison without parole, after his DNA was found and identified on the victim’s shirt collar and on the murder weapon, according to a press release.
Working in forensic sciences will invariably bring you into potential contact with infectious agents. This is serious business. Performance of some forensic duties might lead to exposure to indigenous or exotic agents with potential for severe or lethal disease. The foundation for safe performance of duties and proper containment is an effective exposure control plan.
Camilla, the Duchess of Cornwall, toured the D.C. Consolidated Forensic Lab (CFL), on Thursday, the same lab that came under intense scrutiny this month after federal prosecutors stopped sending evidence there in January, and Mayor Muriel Bowser ordered an audit of the facility amidst allegations of misconduct.
Rocket Kitten, the cyberattack group that recently launched an email malware campaign against European and Israeli targets, has delivered a new state-sponsored attack, according the a report by Trend Micro.
Experts used infrared cameras, 3-D scanners and ground-penetrating radar to initially sweep the floor of the burial tomb to help pinpoint the best site for archeologists to start excavating. The bones, which were interred in 1616, were lost when Madrid’s Convento de las Monjas Trinitarias Descalzas was rebuilt sometime later in the 17th century.
The administration announced another $41 million, on Monday, to help test backlogged sexual assault kits, an estimated 400,000 kits nationwide, according to a White House press release. But for those 400,000 victims, justice might still depend on more federal funding.
The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.
Forensic Magazine recently spoke with Dan Simon about his work, and about an interesting presentation he gave during the Plenary Discussion at AAFS on cognitive biasin Orlando, Fla. Now, Simon discusses what needs to be done to minimize bias and make forensic science an effective “investigative tool” in all criminal investigations.
SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.
Researchers believe an injury sustained to the interior surface of the cranium, consistent with wounds inflicted by a sword or the spiked top of a halberd, would have knocked the king unconscious before death.Eleven injuries have been identified in all, nine of them delivered to the skull around the time of death, two to the postcranial skeleton, although many are believed to have been sustained after death.
University of Southern California professor Dan Simon, S.J.D., researches the “messy” process of forming decisions in everyday walks of life and applies his findings to determinations in criminal cases. Human reasoning “infuses a process” throughout the course of an investigation, and Simon has dedicated most of his scientific career to finding out exactly how.
President Obama released a draft bill outlining long-awaited legislation that would establish “baseline protections” for online consumers under a proposed Consumer Privacy Bill of Rights. But the bill is over three years in the making, and critics say it doesn’t do nearly enough