The person, dressed all in black, is seen holding what appears to be a white object, according to the pixelated and intermittent images posted to Youtube by the Metropolitan Police Department over the weekend.
Waco police Sgt. Patrick Swanton told media outlets that the weapons taken by police are mostly firearms and knives, but a chain with a padlock attached was also seized that was allegedly used for the purpose of beating others.
Ross Ulbricht, convicted of seven counts related to running the Silk Road drug marketplace website, used internet resources to look after the welfare of his clients.
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
The Amtrak train crash that resulted in eight deaths and hundreds of injuries last week is being investigated with a new lead – that the train may have been struck by a projectile before the fatal derailment.
The campaign warns it will collect cigarette butts, coffee cups, and other sources of DNA – and could use the genetic material found on it to construct a face of whoever didn’t throw away their trash, making them the literal poster-child for the campaign.
William Evans sat down with Forensic Magazine to talk about the Boston Marathon Bombing and the sentencing. "I just have very mixed emotions," Evans said. "I’ll say this: If you are for the death penalty, this is an ideal case of someone who deserves it."
A recent study published in Microbiome, found that “skin-associated” bacteria can be identified on a number of different surfaces—including shoes, cellphones and computer keyboards—and that differences in the nature of these micro-bacterial communities can be used to distinguish who handled them.
This year, digital forensic practitioners gather at Ceasar's Palace in Las Vegas to expand their expertise at the Computer and Enterprise Investigations Conference (CEIC) 2015, May 18-21. For those who don't want to gamble with their organization's security in today's threat landscape, CEIC offers hands-on training labs, classrooms and presentations from some of the most well-known experts in their fields.
To an innocent person suspected of drug possession, simple mistakes in drug-identification tests taken by law enforcement in the field have caused more complex problems.
The House of Representatives overwhelmingly approved a bill Wednesday which would end the bulk collection of phone records, an ongoing surveillance program on the American public under the PATRIOT Act.
Even the same finger that’s been cut, burned, bitten, or even shorn off using sandpaper is different than it was before. Criminals who want to avoid detection will try almost any method to alter their fingerprints – even sometime enlisting medical professionals to try and change their unique markings.
Is it possible to eradicate the workings of cyber criminals? Takedown experts would say, yes. One of those experts, John Bambenek, tells DFI News how he disrupts criminal malware networks.
An inside look into one of the most expensive, progressive, and controversial crime labs ever built.
It’s a typical summer day in southwest Louisiana. The air is spongy with heat as alligators sun themselves lazily along the lakes and bayous of Lake Charles. But, the city was a frightening place to be a woman from late 2002 through the summer of 2003. Five bodies had been found raped, murdered and dumped in the swamps between Lafayette and Baton Rouge.