Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.

Fitness Watch Data Disproves Rape Accusation

July 2, 2015 | by Myles Snyder, ABC27 News | Comments

A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.

 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Recent estimates indicate that as many as 15 of every 100 incarcerated offenders where DNA was an element in their trial may be wrongfully convicted because of misused DNA evidence matching techniques. The purpose of this study was to evaluate the ability

Examining Ways to Reduce Error in Expert Forensic Testimony

July 2, 2015 12:27 pm | by Carolyn Wong, Eyal Aharoni, Gursel Rafig oglu Aliyev and Jacqueline Du Bois, NIJ | Comments

Recent estimates indicate that as many as 15 of every 100 incarcerated offenders where DNA was an element in their trial may be wrongfully convicted because of misused DNA evidence matching techniques. The purpose of this study was to evaluate the ability of expert blinding and consensus feedback to improve the validity of expert testimony, specifically in the context of forensic science.

TOPICS:
Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.

Corrupt Silk Road Investigator Pleads Guilty, Admits to $240K Movie Deal

July 2, 2015 12:09 pm | by Joe Mullin, Ars Technica | Comments

Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.

TOPICS:
What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr Susan Walsh has received more than €900,000 from the US Department of Justice to develop tests to get a picture of physical ap

In the Future, DNA Could Put a Face to the Crime

July 2, 2015 11:13 am | by Anthony King, Irish Times | Comments

What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr. Susan Walsh has received funding from the U.S. Department of Justice to develop tests to get a picture of physical appearance from DNA.

TOPICS:
Advertisement
A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.

Computer Forensics to Examine Son’s Claims That It was Dad’s Child Porn, Not His

July 2, 2015 8:11 am | by David Kravets, Ars Technica | Comments

A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.  

TOPICS:
The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

Auditor Says Rape Kit Backlog Means Criminals Go Free

July 1, 2015 1:16 pm | by James Pilcher, The Enquirer | Comments

The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

TOPICS:
MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the appl

Bug Repair System Imports From Other Programs

July 1, 2015 10:47 am | by Larry Hardesty, MIT | Comments

MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing.

TOPICS:
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

New Chinese Law Reinforces Government Control of Cyberspace

July 1, 2015 10:43 am | by Christopher Bodeen, Associated Press | Comments

China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

TOPICS:
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

Surveillance Court Rules That NSA Can Resume Bulk Data Collection

July 1, 2015 10:14 am | by Charlie Savage, The New York Times | Comments

The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

TOPICS:
Advertisement
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

Coast Guard Unveils New Cyber Strategy

July 1, 2015 9:46 am | by Richard Sisk, Military.com | Comments

The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

TOPICS:
A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket

Engineers Turn Detectives to Figure Out What Happened to SpaceX Rocket

June 30, 2015 3:12 pm | by Seth Borenstein, The Associated Press | Comments

A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket was a capsule packed with supplies for the crew on the International Space Station.

TOPICS:
Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech devic

Wildlife Forensics Lab Uses Tech to Sniff, Identify Illegal Wood

June 30, 2015 2:47 pm | by Jes Burns, NPR | Comments

Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech device, it's now helping track shipments of contraband wood.

TOPICS:
Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this cl

Fingerprint Accuracy Stays the Same Over Time

June 30, 2015 2:36 pm | by Michigan State University | Comments

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.

TOPICS:
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.

OPM Takes Vulnerable Background Investigation Portal Offline

June 30, 2015 12:03 pm | by Zeljka Zorz, Help Net Security | Comments

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms. 

TOPICS:
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their d

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data

June 30, 2015 11:41 am | by Andy Greenberg, Wired | Comments

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.

TOPICS:
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and

Gas Stations in the Bullseye

June 30, 2015 11:12 am | by Kelly Jackson Higgins, Dark Reading | Comments

Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading