A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.
A team of ghost hunters found the body of a missing woman as they explored the old Kuhn Memorial...
Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many...
A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims...
Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.
What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr. Susan Walsh has received funding from the U.S. Department of Justice to develop tests to get a picture of physical appearance from DNA.
A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.
The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.
MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing.
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.
A rocket's dead, blown to bits in public view. Now it's time for "Rocket Science CSI." After 18 straight successful launches, SpaceX's Falcon 9 rocket broke apart Sunday morning minutes after soaring away from Cape Canaveral, Florida. Lost with the rocket was a capsule packed with supplies for the crew on the International Space Station.
Before you prosecute thieves, you have to know what they stole. It's the same for crimes against nature. The world's only wildlife forensic lab is in southern Oregon. The lab usually specializes in endangered animal cases, but armed with a high-tech device, it's now helping track shipments of contraband wood.
Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.
A cyber strategy announced last week by the head of the agency that hackers robbed of sensitive dossiers on federal employees has potential to deter future attacks, say private investigators who probe computer espionage campaigns.