Advertisement
 
Articles
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The U.S. Airforce has used the Islamic State's ability with social media against it. The need to share doesn't seem to be a good military strategy.

ISIS Social Media Post Enables Airstrike Targeting

June 8, 2015 2:32 pm | by Ernie Austin, Associate Editor | Comments

The U.S. Air Force has used the Islamic State's ability with social media to create some advantage of its own. The need to share doesn't seem to be good for military strategy.

TOPICS:

'Inside' Help Suspected in N.Y. Prison Escape

June 8, 2015 11:37 am | by Seth Augenstein, Digital Reporter | Comments

As the manhunt continues into its third day, authorities are investigating whether the pair had “inside” help from civilian employees or private contractors.

TOPICS:

Faces from Doomed Northwest Passage Voyage Finally Emerge 170 Years Later

June 5, 2015 3:23 pm | by Sean Allocca, Editor | Comments

Although the exact story of what happened to the 128 men that were lost in the High Arctic in 1845 remains a mystery, a team of forensic scientists have set out to identify at least two skulls using artist reconstructions.

TOPICS:
Advertisement

Forensic Evidence Supports Nobel-Laureate Poet Neruda Was Poisoned

June 5, 2015 3:05 pm | by Seth Augenstein, Digital Reporter | Comments

The chauffeur told a Mexican magazine in 2011 the Nobel laureate was murdered by an injection into his stomach. The chauffeur’s story prompted the exhumation of Neruda’s body in 2013.

TOPICS:
China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time, according to The Associated Press.

Massive Data Breach of 4M Government Workers; China Denies Involvement

June 5, 2015 2:06 pm | by Ernie Austin, Associate Editor | Comments

China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time, according to The Associated Press.

TOPICS:
Debbie Smith, the namesake of a watershed act to eliminate the backlog of hundreds of thousands of rape-testing kits sitting on law enforcement shelves nationwide, says the end could be in sight.

Debbie Smith Says End of Rape-Kit Backlog is Near

June 4, 2015 3:33 pm | by Seth Augenstein, Digital Reporter | Comments

Debbie Smith, the namesake of a watershed act to eliminate the backlog of hundreds of thousands of rape-testing kits sitting on law enforcement shelves nationwide, told Forensic Magazine that the end could be in sight.

TOPICS:
New York state's chief financial regulator has issued final rules for companies   dealing in bitcoin, adding more oversight to the virtual currency that has widened in   popularity and moved into the commercial mainstream.

NY Regulator Issues Final Bitcoin Rules

June 4, 2015 3:04 pm | by Ernie Austin, Newsletter Editor | Comments

New York state's chief financial regulator has issued final rules for companies dealing in bitcoin, adding more oversight to the virtual currency that has widened in popularity and moved into the commercial mainstream.

TOPICS:

Sex Toy Turns National Spotlight on Civil Asset Forfeiture

June 4, 2015 2:26 pm | by Sean Allocca, Editor | Comments

Ginnifer Hency spoke before a Michigan judiciary hearing in May explaining she has been cleared of any wrongdoing by the judge in her case, but still is not been able to retrieve her possession 10 months later.

TOPICS:
Advertisement
File Shredder Programs and Data Destruction Software both use and support multiple data sanitization methods to permanently overwrite data. A data sanitization method is a specific way in which data is overwritten. These methods are often referred to as d

Permanently Sanitizing Data

June 4, 2015 10:38 am | Comments

File Shredder Programs and Data Destruction Software both use and support multiple data sanitization methods to permanently overwrite data. A data sanitization method is a specific way in which data is overwritten. These methods are often referred to as data wipe methods, wipe algorithms, data erasure methods and data wipe standards. 

TOPICS:

Rape Victims Still Paying for Exams in Some States

June 3, 2015 2:07 pm | by Seth Augenstein, Digital Reporter | Comments

In some places in the United States, rape victims pay for their own medical examinations after an attack – despite federal law. But legislation in some states is seeking to ban such practices.

TOPICS:
Retrieving a forensically-sound file is not the same as taking an image of a hard drive. Although recovering a file directly is easy, it doesn’t gather the same information that traditional digital forensic practice gathers. But, what are organizations le

Does eDiscovery Collection Service Threaten Traditional Digital Forensic Recovery?

June 3, 2015 12:58 pm | by Ernie Austin, Associate Editor | Comments

Retrieving a forensically-sound file is not the same as taking an image of a hard drive. Although recovering a file directly is easy, it doesn’t gather the same information as traditional digital forensic practice. But, what are organizations leaving aside in their pursuit of efficiency and lower costs?

TOPICS:

Man Gunned Down by Police Planned to Behead an Officer, Reports Say

June 3, 2015 10:52 am | by Sean Allocca, Editor | Comments

Usaam Rahim, who was under 24-hour surveillance by anti-terrorism task forces, was shot twice, once in the torso and once in the abdomen, after lunging at police with a knife.

TOPICS:

Secret FBI Planes Caught Snooping as NSA Debate Lingers in Congress

June 2, 2015 1:31 pm | by Seth Augenstein, Digital Reporter | Comments

The Bureau has been flying over major U.S. metropolitan areas with small Cessna aircraft, which have the capability to take high-resolution video and also use advanced cellphone surveillance technology.

TOPICS:

Woman's Body Found in Suitcase at Tokyo Train Station

June 1, 2015 12:59 pm | by Sean Allocca, Editor | Comments

Police are reviewing security camera footage for clues about the person who might have left the bag, and said that an employee noticed the locker was empty on April 25—the day before the bag was originally found.

TOPICS:
Before being sentenced to life in prison, Ross Ulbricht tried to plead for what time left in his life he could spend free in a letter to U.S. District Judge Katherine B. Forrest, the person responsible for the length of his sentence. But, believing the vi

Internet Drug Kingpin Gets Life

June 1, 2015 12:19 pm | by Ernie Austin, Associate Editor | Comments

Before being sentenced to life in prison, Ross Ulbricht tried to plead for what time left in his life he could spend free in a letter to U.S. District Judge Katherine B. Forrest, the person responsible for the length of his sentence. But, believing the virtual for the virtuous didn’t sway the judge that held his fate.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading