Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.

Fitness Watch Data Disproves Rape Accusation

July 2, 2015 | by Myles Snyder, ABC27 News | Comments

A woman who reported she was raped by an intruder was criminally charged after police said her fitness watch told a different story.

 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The Animal Farm, an espionage group believed to be part of a French intelligence agency, has added to its zoo of tools with Dino, a backdoor espionage Trojan that uses complex methods to execute commands in a stealthy fashion.

Animal Farm Adds Dino Trojan to Menagerie

July 6, 2015 9:27 am | by Tara Seals, Infosecurity Magazine | Comments

The Animal Farm, an espionage group believed to be part of a French intelligence agency, has added to its zoo of tools with Dino, a backdoor espionage Trojan that uses complex methods to execute commands in a stealthy fashion.

TOPICS:
The federal hacking investigation of the St. Louis Cardinals could take longer if high-level executives are implicated in the breach of the Houston Astros' database, according to legal experts.

Experts: Hacking Probe Will Stretch if Cards Execs Involved

July 6, 2015 9:04 am | by Juan A. Lozano and Jim Vertuno, Associated Press | Comments

The federal hacking investigation of the St. Louis Cardinals could take longer if high-level executives are implicated in the breach of the Houston Astros' database, according to legal experts.

TOPICS:
In June 2014, a Russian soldier  posted on a social-media site a photo of himself standing in front of a military convoy against a nondescript background of hills, fields and scattered houses. It probably never occurred to him that such an innocuous image

Digital Investigators Try to Disperse Fog of War in Ukraine

July 2, 2015 4:15 pm | by Dmitry Volchek, Radio Free Europe/Radio Liberty | Comments

In June 2014, a Russian soldier  posted on a social-media site a photo of himself standing in front of a military convoy against a nondescript background of hills, fields and scattered houses. It probably never occurred to him that such an innocuous image could become part of an increasingly detailed case being assembled in a bid to prove the Russian government has been lying when it denies militarily involvement in eastern Ukraine.

TOPICS:
Advertisement
Investigators found no evidence of a shooting after the Washington Navy Yard went on lockdown Thursday because someone reported shots fired in the same building where a gunman killed 12 workers in a rampage two years ago.

Police: No Evidence of Shooting at Washington Navy Yard

July 2, 2015 3:44 pm | by Lolita C. Baldor and Ben Nuckols, Associated Press | Comments

Investigators found no evidence of a shooting after the Washington Navy Yard went on lockdown Thursday because someone reported shots fired in the same building where a gunman killed 12 workers in a rampage two years ago.

TOPICS:
A seventeenth-century university has become the victim of a twenty-first-century crime. Harvard University has announced that on June 19, it discovered a breach in the IT systems of its Faculty of Arts and Sciences and Central Administration, currently im

Harvard Reveals It Had an IT Breach

July 2, 2015 2:37 pm | by Ingrid Lunden, Tech Crunch | Comments

A seventeenth-century university has become the victim of a twenty-first-century crime. Harvard University has announced that on June 19, it discovered a breach in the IT systems of its Faculty of Arts and Sciences and Central Administration, currently impacting eight different schools and administrative organizations at the university.

TOPICS:
Recent estimates indicate that as many as 15 of every 100 incarcerated offenders where DNA was an element in their trial may be wrongfully convicted because of misused DNA evidence matching techniques. The purpose of this study was to evaluate the ability

Examining Ways to Reduce Error in Expert Forensic Testimony

July 2, 2015 12:27 pm | by Carolyn Wong, Eyal Aharoni, Gursel Rafig oglu Aliyev and Jacqueline Du Bois, NIJ | Comments

Recent estimates indicate that as many as 15 of every 100 incarcerated offenders where DNA was an element in their trial may be wrongfully convicted because of misused DNA evidence matching techniques. The purpose of this study was to evaluate the ability of expert blinding and consensus feedback to improve the validity of expert testimony, specifically in the context of forensic science.

TOPICS:
Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.

Corrupt Silk Road Investigator Pleads Guilty, Admits to $240K Movie Deal

July 2, 2015 12:09 pm | by Joe Mullin, Ars Technica | Comments

Carl Mark Force, the head of a Baltimore-based team of law enforcement that investigated the Silk Road drug trafficking website, has pled guilty to extortion, money laundering, and obstruction of justice.

TOPICS:
What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr Susan Walsh has received more than €900,000 from the US Department of Justice to develop tests to get a picture of physical ap

In the Future, DNA Could Put a Face to the Crime

July 2, 2015 11:13 am | by Anthony King, Irish Times | Comments

What if finding DNA was all the police needed to know what a suspect looked like? This could become reality. Irish geneticist Dr. Susan Walsh has received funding from the U.S. Department of Justice to develop tests to get a picture of physical appearance from DNA.

TOPICS:
Advertisement
A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.

Computer Forensics to Examine Son’s Claims That It was Dad’s Child Porn, Not His

July 2, 2015 8:11 am | by David Kravets, Ars Technica | Comments

A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.  

TOPICS:
The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

Auditor Says Rape Kit Backlog Means Criminals Go Free

July 1, 2015 1:16 pm | by James Pilcher, The Enquirer | Comments

The number of untested rape kits throughout Kentucky could number in the thousands, state Auditor Adam Edelen said Tuesday. The delay means a a backlog of up to a year for many victims and prosecutors around the commonwealth.

TOPICS:
A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

Forensic Lab Damage May Lead to Overturned Convictions

July 1, 2015 12:33 pm | by Kyle Barnett, Louisiana Record | Comments

A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

TOPICS:
MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the appl

Bug Repair System Imports From Other Programs

July 1, 2015 10:47 am | by Larry Hardesty, MIT | Comments

MIT researchers have presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing.

TOPICS:
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

New Chinese Law Reinforces Government Control of Cyberspace

July 1, 2015 10:43 am | by Christopher Bodeen, Associated Press | Comments

China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

TOPICS:
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

Surveillance Court Rules That NSA Can Resume Bulk Data Collection

July 1, 2015 10:14 am | by Charlie Savage, The New York Times | Comments

The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

TOPICS:
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

Coast Guard Unveils New Cyber Strategy

July 1, 2015 9:46 am | by Richard Sisk, Military.com | Comments

The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading