Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

In a weeklong workshop, fine art students tried to give faces to 11 unidentified crime victims found over the years who were now being handled by the city medical examiner’s office. The agency teamed up with the academy for this project.

Through Art and Forensics, Faces of Unidentified Victims Emerge

January 21, 2015 12:56 pm | by Cory Kilgannon, The New York Times | Comments

In a weeklong workshop, fine art students tried to give faces to 11 unidentified crime victims found over the years who were now being handled by the city medical examiner’s office. The agency teamed up with the academy for this project.   

TOPICS:
In the latest NIJ Forensic Technology Center of Excellence training workshop, “Special Topics in Gunshot Residue,” two experts in the analysis of gunshot residue will answer these questions and more.

Analyzing Gunshot Residue Training

January 21, 2015 12:37 pm | by NIJ | Comments

In the latest NIJ Forensic Technology Center of Excellence training workshop, “Special Topics in Gunshot Residue,” two experts in the analysis of gunshot residue will answer these questions and more.               

TOPICS:

The President's DNA Initiative Analyst Training Has Moved

January 21, 2015 8:56 am | National Forensic Science Technology Center (NFSTC) | Comments

If you’ve been trying to access the online DNA Analyst Training but received an error, it’s not you. The folks at NFSTC.org moved the President’s DNA Initiative.                         

TOPICS:
Advertisement
As the Pentagon seeks to recover 27,000 missing American war dead, it may turn away from Hawaii -- where much of that government effort has been centered -- and to private organizations to outsource some research, recovery and identifications.

Private Groups Seek to Take Over MIA Search Duty from Pentagon

January 20, 2015 1:36 pm | by William Cole, Military.com | Comments

As the Pentagon seeks to recover 27,000 missing American war dead, it may turn away from Hawaii — where much of that government effort has been centered — and to private organizations to outsource some research, recovery and identifications.

TOPICS:
The U.S. government's attribution of the Sony Pictures Entertainment hack attack to North Korea stems, in part, from the U.S. National Security Agency having infected a significant number of North Korean PCs with malware, which the intelligence agency has

How NSA Hacked North Korean Hackers

January 20, 2015 1:19 pm | by Mathew J. Schwartz, Gov Info Security | Comments

The U.S. government's attribution of the Sony Pictures Entertainment hack attack to North Korea stems, in part, from the U.S. National Security Agency having infected a significant number of North Korean PCs with malware, which the intelligence agency has been using to monitor the country's hacking force.

TOPICS:
Hacking group Lizard Squad’s DDoS-for-hire website LizardStresser has itself been hacked and the entire database of customers who signed up is now in the hands of the authorities, according to reports.

Net Closes around Lizard Squad as DDoS Site is Hacked

January 20, 2015 12:36 pm | by Phil Muncaster, Infosecurity Magazine | Comments

Hacking group Lizard Squad’s DDoS-for-hire website LizardStresser has itself been hacked and the entire database of customers who signed up is now in the hands of the authorities, according to reports.              

TOPICS:
Mexican prosecutors said Tuesday that an Austrian forensics lab has been unable to find any more DNA that could be used by conventional means to identify charred remains that might be those of 42 missing college students, but said they have authorized a f

DNA Tests Can't Identify Possible Mexican Student Remains

January 20, 2015 12:21 pm | by Associated Press | Comments

Mexican prosecutors said Tuesday that an Austrian forensics lab has been unable to find any more DNA that could be used by conventional means to identify charred remains that might be those of 42 missing college students, but said they have authorized a final, unconventional effort.

TOPICS:
Silent Shield has released P2P Decryptor, its peer-to-peer decryption and reporting software. Training is also offered exclusively for law enforcement at no charge in Atlanta, Georgia, January 28, 2015.

Training Offered for Peer-to-Peer Decryption Software Release

January 20, 2015 11:58 am | by Ernie Austin, Associate Editor | Silent Shield, LLC | Comments

Silent Shield has released P2P Decryptor, its peer-to-peer decryption and reporting software. Training is also offered exclusively for law enforcement at no charge in Atlanta, Georgia, January 28, 2015.             

TOPICS:
Advertisement
A New York Post spokeswoman said some of the newspaper's Twitter accounts were briefly hacked. The Twitter feed of United Press International sent out identical suspicious tweets on false economic and military news.

New York Post Says Twitter Accounts Hacked

January 16, 2015 3:46 pm | by Mae Anderson, Associated Press | Comments

A New York Post spokeswoman said some of the newspaper's Twitter accounts were briefly hacked. The Twitter feed of United Press International sent out identical suspicious tweets on false economic and military news.         

TOPICS:
When British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their communication products, and ban applications that use end-to-end encryption, security experts una

UK PM Demonizes Encryption, US Report Says It's Vital

January 16, 2015 3:36 pm | by Zeljka Zorz, Help Net Security | Comments

When British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their communication products, and ban applications that use end-to-end encryption, security experts unanimously declared when asked that weakening users' security posture is not the right answer to the problem of fighting criminals and terrorists.

TOPICS:
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just recently, yet another proposal for new cybersecurity legislation has been made, and by the president no les

Hard Evidence: how much is cyber crime really costing us?

January 16, 2015 2:16 pm | by Benjamin Dean, The Conversation | Comments

In the wake of the latest high-profile hack of Sony and claims of “cyber vandalism” being thrown about, it’s normal to feel a sense of unease. Just recently, yet another proposal for new cybersecurity legislation has been made, and by the president no less.

TOPICS:
FBI agent Matthew Lowry checked out Item 1B4 from the evidence room at the bureau’s Washington field office on an August morning in 2013. He wrote “to lab” on a log sheet to explain why he was taking drugs that had been seized in an undercover operation d

FBI Files Tell How Addicted Agent was Able to Get the Drugs

January 16, 2015 2:00 pm | by Peter Hermann, The Washington Post | Comments

FBI agent Matthew Lowry checked out Item 1B4 from the evidence room at the bureau’s Washington field office on an August morning in 2013. He wrote “to lab” on a log sheet to explain why he was taking drugs that had been seized in an undercover operation dubbed Midnight Hustle.

TOPICS:
One of the biggest challenges facing the advancement of forensic science and biometric technology is the availability of useful datasets for researchers. The lack of sufficient data limits the development of new technology, methods and informed policy dec

Improving Biometric and Forensic Technology: The Future of Research Datasets

January 16, 2015 1:33 pm | by NIJ | Comments

One of the biggest challenges facing the advancement of forensic science and biometric technology is the availability of useful datasets for researchers. The lack of sufficient data limits the development of new technology, methods and informed policy decisions. To help resolve this issue, NIJ has sponsored NIST to investigate publically available biometric and forensic datasets.

TOPICS:
No DNA or blood evidence has been found to connect a man on trial for murder to the 2012 death of his estranged wife.

Jury Hears DNA, Blood Evidence in Murder Trial

January 16, 2015 12:32 pm | by Lisa Trigg, Tribune Star | Comments

No DNA or blood evidence has been found to connect a man on trial for murder to the 2012 death of his estranged wife.                                     

TOPICS:

4 Days of 'Forensic Digs' End in Lyon Sisters Case; Evidence Unclear

January 16, 2015 12:05 pm | by Dan Morse, The Washington Post | Comments

Investigators from the FBI on Thursday concluded four days of “forensic digs” in Bedford County, Virginia, as part of a stepped-up investigation of the nearly 40-year-old case of two young girls who disappeared after walking to a Montgomery County shopping mall in 1975.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading