Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsyc

Understanding Men Who Kill Intimate Partners

August 26, 2015 9:03 am | by Marla Paul, Northwestern University | Comments

Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsychology of these individuals. 

TOPICS:
The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data neede

Development in Analyzing Pediatric Cranial Fracture Trauma

August 26, 2015 8:50 am | by Todd Fenton, NIJ | Comments

The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data needed to more accurately interpret pediatric cranial trauma and determine whether it is consistent with abusive or accidental injury.

TOPICS:
Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be u

Determining the Age of Fingerprints

August 25, 2015 3:16 pm | by NIST | Comments

Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be used to give forensic scientists something they’ve long wished for: A way to date fingerprints.

TOPICS:
Advertisement
Cyber warfare has arrived: the Defense Department is under attack, and national security is at stake. Yet in a field defined by rapid growth, DOD arms itself at the same pace with which it buys major weapons, an acquisition cycle of seven to 10 years. The

Why Defense Department Can't Buy Cyber Stuff Fast Enough

August 25, 2015 12:29 pm | by Daniel E. Schoeni, Government Executive | Comments

Cyber warfare has arrived: the Defense Department is under attack, and national security is at stake. Yet in a field defined by rapid growth, DOD arms itself at the same pace with which it buys major weapons, an acquisition cycle of seven to 10 years. The Pentagon has been reluctant to adopt different methods for software than it uses for other acquisitions. But unless it does so, it will lose its edge.

TOPICS:
The cost of recovering from a security incident doubles when the attack affects virtual infrastructure, according to new research from Kaspersky Lab.

Attacks on Virtual Infrastructure Cause Double the Pain

August 25, 2015 12:03 pm | by Mike Hine, Infosecurity Magazine | Comments

The cost of recovering from a security incident doubles when the attack affects virtual infrastructure, according to new research from Kaspersky Lab.

TOPICS:
Since cybercrime laws lag behind technology, lawyers are constantly seeking creative ways to stretch old laws to fit new crimes, such as the latest - comparing the movie-sharing app Popcorn Time to a burglar’s tool in order to press criminal charges.

Legal Teams Bend Old Laws to Fit Cyber Crimes

August 25, 2015 10:35 am | by Tim Greene, Network World | Comments

Since cybercrime laws lag behind technology, lawyers are constantly seeking creative ways to stretch old laws to fit new crimes, such as the latest - comparing the movie-sharing app Popcorn Time to a burglar’s tool in order to press criminal charges.

TOPICS:

US Has 31 Percent of World's Public Mass Shooters

August 25, 2015 10:34 am | by American Sociological Association | Comments

Despite having only about 5 percent of the world's population, the United States was the attack site for a disproportionate 31 percent of public mass shooters globally from 1966-2012, according to new research.

TOPICS:
A U.S. appeals court said the Federal Trade Commission has authority to regulate corporate cybersecurity, and may pursue a lawsuit accusing hotel operator Wyndham Worldwide Corp of failing to properly safeguard consumers' information.

FTC Has Power to Police Cybersecurity Says Appeals Court

August 25, 2015 9:49 am | by Jonathan Stempel, Reuters | Comments

A U.S. appeals court said the Federal Trade Commission has authority to regulate corporate cybersecurity, and may pursue a lawsuit accusing hotel operator Wyndham Worldwide Corp of failing to properly safeguard consumers' information.

TOPICS:
Advertisement

NFL Players Have Lower Total Crime Rate Than General Population

August 25, 2015 9:39 am | by University of Texas, Dallas | Comments

A 24-hour news cycle, viral videos and tweets about football players' run-ins with the law can make it seem like criminal activity is an epidemic in the National Football League.

TOPICS:
When they arrived at Jared Fogle's home last month, law enforcement officials were armed with more than a search warrant: They rolled up with a mobile forensics laboratory that has revolutionized how Indiana investigates child-exploitation and pornography

Indiana Team That Raided Fogle's Home Used Mobile Laboratory

August 24, 2015 1:08 pm | by Tammy Webber and Rick Callahan, Associated Press | Comments

When they arrived at Jared Fogle's home last month, law enforcement officials were armed with more than a search warrant: They rolled up with a mobile forensics laboratory that has revolutionized how Indiana investigates child-exploitation and pornography crimes and helped make the state a national model.

TOPICS:

Collecting DNA At Time Of Arrest Could Help Solve Crimes

August 24, 2015 1:08 pm | by Christy Lewis, News 9 | Comments

The Oklahoma State Bureau of Investigations (OSBI) is working with lawmakers to allow DNA samples to be taken upon the arrest of an alleged criminal. Currently, fingerprints and photos are taken of arrestees during booking. And only convicted felons are swabbed for DNA.

TOPICS:

Law Enforcement Concerns: New Ways to Consume Marijuana

August 24, 2015 12:59 pm | by Patty Hastings, The Columbian | Comments

However, when a suspected marijuana-infused product becomes evidence in a crime, there is no valid way for state labs to test it, making it difficult prove that it's actually marijuana.

TOPICS:
On the heels of the Ashley Madison data leak, unsuspecting folks who plan to go online to meet that someone special this week are at risk again.

Dating Site PlentyofFish Hit With Malvertising Wave

August 24, 2015 12:43 pm | by Tara Seals, Infosecurity Magazine | Comments

On the heels of the Ashley Madison data leak, unsuspecting folks who plan to go online to meet that someone special this week are at risk again.

TOPICS:

Burglar Ate Children's Easter Eggs During Raid, Caught with DNA

August 24, 2015 11:37 am | Comments

A hungry burglar was caught after his DNA was found on the remains of Easter eggs he had eaten during a break-in, it has emerged today.

TOPICS:
The identity of the hacker or hackers who crippled Rutgers University computer networks at least four times during the last school year is still a mystery. But Rutgers is spending big money to make sure cyber attackers don't knock the school offline again

Rutgers University Spending Up to $3M to Stop Next Cyber Attack

August 24, 2015 10:27 am | by Kelly Heyboer, NJ.com | Comments

The identity of the hacker or hackers who crippled Rutgers University computer networks at least four times during the last school year is still a mystery. But Rutgers is spending big money to make sure cyber attackers don't knock the school offline again.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading