Tianjin University Prof. Hao Zhang has been arrested in connection with a 32-count indictment that charges him and five others. The defendants are accused of economic espionage and theft of trade secrets for their roles in a long-running effort to obtain U.S. trade secrets for the benefit of universities and companies controlled by the Chinese government.
John Bambenek, a handler for the Internet Storm Center at the SANS Institute continues his discusion of takedowns with DFI News/Forensic Magazine. In part 2, Bambenek give us more details of his work disrupting criminal networks. He tells us how he avoids the risk of destroying information both for the victims and for law enforcement trying to obtain evidence.
Four sham cancer charities were charged with bilking more than $187 million from consumers by telling donors the funds would help cancer patients, including children – but then pocketed the money, federal authorities announced.
The person, dressed all in black, is seen holding what appears to be a white object, according to the pixelated and intermittent images posted to Youtube by the Metropolitan Police Department over the weekend.
Waco police Sgt. Patrick Swanton told media outlets that the weapons taken by police are mostly firearms and knives, but a chain with a padlock attached was also seized that was allegedly used for the purpose of beating others.
Ross Ulbricht, convicted of seven counts related to running the Silk Road drug marketplace website, used internet resources to look after the welfare of his clients.
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
The Amtrak train crash that resulted in eight deaths and hundreds of injuries last week is being investigated with a new lead – that the train may have been struck by a projectile before the fatal derailment.
The campaign warns it will collect cigarette butts, coffee cups, and other sources of DNA – and could use the genetic material found on it to construct a face of whoever didn’t throw away their trash, making them the literal poster-child for the campaign.
William Evans sat down with Forensic Magazine to talk about the Boston Marathon Bombing and the sentencing. "I just have very mixed emotions," Evans said. "I’ll say this: If you are for the death penalty, this is an ideal case of someone who deserves it."
A recent study published in Microbiome, found that “skin-associated” bacteria can be identified on a number of different surfaces—including shoes, cellphones and computer keyboards—and that differences in the nature of these micro-bacterial communities can be used to distinguish who handled them.
This year, digital forensic practitioners gather at Ceasar's Palace in Las Vegas to expand their expertise at the Computer and Enterprise Investigations Conference (CEIC) 2015, May 18-21. For those who don't want to gamble with their organization's security in today's threat landscape, CEIC offers hands-on training labs, classrooms and presentations from some of the most well-known experts in their fields.
To an innocent person suspected of drug possession, simple mistakes in drug-identification tests taken by law enforcement in the field have caused more complex problems.
The House of Representatives overwhelmingly approved a bill Wednesday which would end the bulk collection of phone records, an ongoing surveillance program on the American public under the PATRIOT Act.
Even the same finger that’s been cut, burned, bitten, or even shorn off using sandpaper is different than it was before. Criminals who want to avoid detection will try almost any method to alter their fingerprints – even sometime enlisting medical professionals to try and change their unique markings.