Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use”

Most CIA Analysts Didn’t Know About NSA Spy Program

April 27, 2015 | by Cyrus Farivar, Ars Technica | Comments

A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities even several years after the September 11 attacks. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Champlain College has been recognized for the second time as winner of the Professional Award for Best Cybersecurity Higher Education Program at the 2015 SC Awards. The award was presented during the 2015 SC Awards Gala held in San Francisco.

Champlain College Awarded for Best Cybersecurity Higher Education Program

April 27, 2015 12:46 pm | by Champlain College | Comments

Champlain College has been recognized for the second time as winner of the Professional Award for Best Cybersecurity Higher Education Program at the 2015 SC Awards. The award was presented during the 2015 SC Awards Gala held in San Francisco.

TOPICS:
This project generated a national isotope database derived from the WBDSC and the other donated skeletal collections. The study also provided forensic anthropologists and criminal investigators a comparative isotopic database of known residence from vario

Isotopic and Elemental Analysis of Donated Skeletal Collections

April 27, 2015 8:50 am | by Nicholas Herrmann, Zheng-Hua Li and Monica Warner, NIJ | Comments

This project generated a national isotope database derived from the WBDSC and the other donated skeletal collections. The study also provided forensic anthropologists and criminal investigators a comparative isotopic database of known residence from various sampled tissues. In addition, the authors evaluated the effectiveness of implementing multiple isotope analyses to estimate the movement histories of modern humans for forensic cases.

TOPICS:
The cybersecurity workforce gap has been well-documented — and cultivating the next generation of cyber workers, the Millennials, from an early age has been widely seen as a mandate for continued industry viability.

Recruiting the Next-Generation Cyber Workforce

April 24, 2015 12:58 pm | by Tara Seals, Infosecurity Magazine | Comments

The cybersecurity workforce gap has been well-documented — and cultivating the next generation of cyber workers, the Millennials, from an early age has been widely seen as a mandate for continued industry viability.

TOPICS:
Advertisement
Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

Spies Like Us: German Intelligence Helps the NSA

April 24, 2015 12:22 pm | by Glyn Moody, Ars Technica | Comments

Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

TOPICS:
Defense Secretary Ash Carter announced new partnership initiatives on the first day of a two-day visit to California's Silicon Valley to learn from experts who run some of the highest-tech companies in one of the nation's innovation hotspots.

Defense Secretary Seeks Tech-Sector Partnerships for Innovation

April 24, 2015 11:56 am | by Cheryl Pellerin, Associated Press | Comments

Defense Secretary Ash Carter announced new partnership initiatives on the first day of a two-day visit to California's Silicon Valley to learn from experts who run some of the highest-tech companies in one of the nation's innovation hotspots.

TOPICS:
While the world of 3D printing is still in a fairly lawless, unregulated state (one to be enjoyed while it lasts by those on the right side of the law), that doesn’t mean it can’t be used to the law’s benefit.

3D Printed Beer Bottle Instrumental Evidence in UK Murder Conviction

April 24, 2015 10:05 am | by Bridget Butler Millsaps, 3DPrint.com | Comments

While the world of 3D printing is still in a fairly lawless, unregulated state (one to be enjoyed while it lasts by those on the right side of the law), that doesn’t mean it can’t be used to the law’s benefit.

TOPICS:
CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the a

The Rise of Counterintelligence in Malware Investigations

April 23, 2015 11:47 am | by John Bambenek, Dark Reading | Comments

CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the adversary.

TOPICS:
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations t

New Pentagon Strategy Warns of Cyberwar Capabilities

April 23, 2015 11:00 am | by Lolita C. Baldor, Associated Press | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

TOPICS:
Advertisement
Hackers aren’t just getting more aggressive — take a look at what happened last winter to Sony — they’re also getting harder to track down.

Mandia: Identifying Hackers is Getting More Difficult

April 23, 2015 10:36 am | by Kurt Wagner, re/code | Comments

Hackers aren’t just getting more aggressive — take a look at what happened last winter to Sony — they’re also getting harder to track down.

TOPICS:
Senate Majority Leader Mitch McConnell has introduced a bill to extend through 2020   a controversial surveillance authority under the Patriot Act. The move comes as a   bipartisan group of lawmakers in both chambers is preparing legislation to scale   ba

Senate Bill Would Extend NSA Surveillance

April 23, 2015 10:20 am | by Ellen Nakashima, The Washington Post | Comments

Senate Majority Leader Mitch McConnell has introduced a bill to extend through 2020 a controversial surveillance authority under the Patriot Act. The move comes as a bipartisan group of lawmakers in both chambers is preparing legislation to scale back the government’s spying powers under Section 215 of the Patriot Act.

TOPICS:
An anthropologist and pathologist who is part of the international team working to identify people killed when Malaysia Airlines Flight 17 was brought down in Ukraine has been publicly rebuked for discussing the case and showing photos of victims in a lec

Investigator Criticized for Showing Images of MH17 Victims

April 23, 2015 9:36 am | by Mike Corder, Associated Press | Comments

An anthropologist and pathologist who is part of the international team working to identify people killed when Malaysia Airlines Flight 17 was brought down in Ukraine has been publicly rebuked for discussing the case and showing photos of victims in a lecture to students.

TOPICS:
One of the most common body fluids encountered at a violent crime scene is blood. The forensic examination of soiled clothing and other textiles such as sheets, towels and upholstery can help forensic scientists to reconstruct a crime, and in some cases m

Bloodstain Patterns on Textile Surfaces: A Fundamental Analysis

April 23, 2015 8:48 am | by Stephen Michielsen, Michael Taylor, Namrata Parekh and Feng Ji, NIJ | Comments

One of the most common body fluids encountered at a violent crime scene is blood. The forensic examination of soiled clothing and other textiles such as sheets, towels and upholstery can help forensic scientists to reconstruct a crime, and in some cases might support or refute details shared by the complainant, suspect, or eyewitness.

TOPICS:
The FBI has issued and alert warning that law enforcement personnel and public officials may be at an increased risk of cyber attacks.

Hacktivists Targeting Law Enforcement

April 22, 2015 12:39 pm | by Ernie Austin, Associate Editor | Comments

The FBI has issued and alert warning that law enforcement personnel and public officials may be at an increased risk of cyber attacks. 

TOPICS:
The House is expected Wednesday to pass a bill, years in the making, that would push private companies to share access to their computer networks and records with federal cybercrime investigators, The New York Times reports.

House Cybersecurity Vote Gets Around Private Concerns

April 22, 2015 11:22 am | by Ernie Austin, Associate Editor | Comments

The House is expected Wednesday to pass a bill, years in the making, that would push private companies to share access to their computer networks and records with federal cybercrime investigators, The New York Times reports.

TOPICS:
Today, soil evidence regularly leads to bodies, overturns alibis and reveals the origins of artifacts. That is in no small part due to Lorna Dawson, who has advanced methods in soil forensics and worked to disseminate the techniques to others.

Forensic Science: The Soil Sleuth

April 22, 2015 8:25 am | by Chelsea Wald, Nature | Comments

Today, soil evidence regularly leads to bodies, overturns alibis and reveals the origins of artifacts. That is in no small part due to Lorna Dawson, who has advanced methods in soil forensics and worked to disseminate the techniques to others.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading