Advertisement
 
Articles
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Often people who work with computers and information develop an affinity for certain programming languages and particular operating systems. Those in the forensic and security fields are no exception. In the smartphone world, the two major players, Androi

Smartphone Forensics: Challenges of the Many and the One

June 12, 2015 11:27 am | by Ernie Austin, Associate Editor | Comments

Often people who work with computers and information develop an affinity for certain programming languages and particular operating systems. Those in the forensic and security fields are no exception. In the smartphone world, the two major players, Android and iOS, have their fans as well. NowSecure CEO Andrew Hoog gives DFI News his perspective.

TOPICS:
The man being arrested had no identification, and gave a suspicious-sounding name. So the sheriff’s deputies in the Florida beach town pulled out a new tool: the mobile fingerprint scanner. Right there in the public park, the authorities identified the ma

Mobile Fingerprinting a 'Game Changer' for Law Enforcement

June 11, 2015 1:52 pm | by Seth Augenstein, Digital Reporter | Comments

The man being arrested had no identification, and gave a suspicious-sounding name. So the sheriff’s deputies in the Florida beach town pulled out a new tool: the mobile fingerprint scanner. Right there in the public park, the authorities identified the man with his real name — complete with the warrants for kidnapping, sexual battery and armed robbery charges attached to it.

TOPICS:

Cold Case: 'Amelia Earhart’s Last Photo Shoot' Surfaces

June 10, 2015 1:56 pm | by Seth Augenstein, Digital Reporter | Comments

A recently surfaced film showing Earhart, posing and playful at an airport in southern California in 1937 comes after debris, including airplane parts, were discovered on a deserted Pacific atoll in the early '90s.

TOPICS:
Advertisement
Digital forensic practitioners have many tools to conduct forensic investigations. Tools image hard drives, gather data from smartphones and pull information from the internet cloud. But, as those tools evolve, some of them bring forensic investigation in

Forensic, Security Convergence Found in Mobile Software Platform

June 10, 2015 12:51 pm | by Ernie Austin, Associate Editor | Comments

Digital forensic practitioners have many tools to conduct forensic investigations. Tools image hard drives, gather data from smartphones and pull information from the internet cloud. But, as those tools evolve, some of them bring forensic investigation into other areas, such as incident response and even security. 

TOPICS:

Your Perfect Crime Scene Kit

June 10, 2015 10:30 am | by Dick Warrington | Comments

To make the most of your crime scene kit, you need to plan ahead. In organizing your kit, take into account your own level of expertise — the best crime scene kit in the world is useless, if you don’t know how to use the items inside.

TOPICS:

As Manhunt Continues for Escaped Killers, New Prison-Break Details Emerge

June 9, 2015 12:49 pm | by Sean Allocca, Editor | Comments

Governor Cuomo elaborated on the “inside” help that the two convicted murderers must have had during the escape, including access to power tools and intricate knowledge of the facility’s piping and sewage systems. 

TOPICS:
On Monday, the Syrian Electronic Army defaced the official Army website,   www.army.mil. Pop-ups also appeared criticizing the U.S. Army.

Syrian Electronic Army Hacks US Army Website

June 9, 2015 11:28 am | by Ernie Austin, Associate Editor | Comments

On Monday, the official Army website, www.army.mil., was defaced by the Syrian Electronic Army, a hacker group that supports Syrian President Bashar al-Assad. Pop-ups also appeared that said, "Your commanders admit they are training the people they have sent you to die fighting."

TOPICS:
The U.S. Airforce has used the Islamic State's ability with social media against it. The need to share doesn't seem to be a good military strategy.

ISIS Social Media Post Enables Airstrike Targeting

June 8, 2015 2:32 pm | by Ernie Austin, Associate Editor | Comments

The U.S. Air Force has used the Islamic State's ability with social media to create some advantage of its own. The need to share doesn't seem to be good for military strategy.

TOPICS:
Advertisement

'Inside' Help Suspected in N.Y. Prison Escape

June 8, 2015 11:37 am | by Seth Augenstein, Digital Reporter | Comments

As the manhunt continues into its third day, authorities are investigating whether the pair had “inside” help from civilian employees or private contractors.

TOPICS:

Faces from Doomed Northwest Passage Voyage Finally Emerge 170 Years Later

June 5, 2015 3:23 pm | by Sean Allocca, Editor | Comments

Although the exact story of what happened to the 128 men that were lost in the High Arctic in 1845 remains a mystery, a team of forensic scientists have set out to identify at least two skulls using artist reconstructions.

TOPICS:

Forensic Evidence Supports Nobel-Laureate Poet Neruda Was Poisoned

June 5, 2015 3:05 pm | by Seth Augenstein, Digital Reporter | Comments

The chauffeur told a Mexican magazine in 2011 the Nobel laureate was murdered by an injection into his stomach. The chauffeur’s story prompted the exhumation of Neruda’s body in 2013.

TOPICS:
China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time, according to The Associated Press.

Massive Data Breach of 4M Government Workers; China Denies Involvement

June 5, 2015 2:06 pm | by Ernie Austin, Associate Editor | Comments

China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time, according to The Associated Press.

TOPICS:
Debbie Smith, the namesake of a watershed act to eliminate the backlog of hundreds of thousands of rape-testing kits sitting on law enforcement shelves nationwide, says the end could be in sight.

Debbie Smith Says End of Rape-Kit Backlog is Near

June 4, 2015 3:33 pm | by Seth Augenstein, Digital Reporter | Comments

Debbie Smith, the namesake of a watershed act to eliminate the backlog of hundreds of thousands of rape-testing kits sitting on law enforcement shelves nationwide, told Forensic Magazine that the end could be in sight.

TOPICS:
New York state's chief financial regulator has issued final rules for companies   dealing in bitcoin, adding more oversight to the virtual currency that has widened in   popularity and moved into the commercial mainstream.

NY Regulator Issues Final Bitcoin Rules

June 4, 2015 3:04 pm | by Ernie Austin, Newsletter Editor | Comments

New York state's chief financial regulator has issued final rules for companies dealing in bitcoin, adding more oversight to the virtual currency that has widened in popularity and moved into the commercial mainstream.

TOPICS:

Sex Toy Turns National Spotlight on Civil Asset Forfeiture

June 4, 2015 2:26 pm | by Sean Allocca, Editor | Comments

Ginnifer Hency spoke before a Michigan judiciary hearing in May explaining she has been cleared of any wrongdoing by the judge in her case, but still is not been able to retrieve her possession 10 months later.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading