In a weeklong workshop, fine art students tried to give faces to 11 unidentified crime victims found over the years who were now being handled by the city medical examiner’s office. The agency teamed up with the academy for this project.
In the latest NIJ Forensic Technology Center of Excellence training workshop, “Special Topics in Gunshot Residue,” two experts in the analysis of gunshot residue will answer these questions and more.
If you’ve been trying to access the online DNA Analyst Training but received an error, it’s not you. The folks at NFSTC.org moved the President’s DNA Initiative.
As the Pentagon seeks to recover 27,000 missing American war dead, it may turn away from Hawaii — where much of that government effort has been centered — and to private organizations to outsource some research, recovery and identifications.
The U.S. government's attribution of the Sony Pictures Entertainment hack attack to North Korea stems, in part, from the U.S. National Security Agency having infected a significant number of North Korean PCs with malware, which the intelligence agency has been using to monitor the country's hacking force.
Hacking group Lizard Squad’s DDoS-for-hire website LizardStresser has itself been hacked and the entire database of customers who signed up is now in the hands of the authorities, according to reports.
Mexican prosecutors said Tuesday that an Austrian forensics lab has been unable to find any more DNA that could be used by conventional means to identify charred remains that might be those of 42 missing college students, but said they have authorized a final, unconventional effort.
Silent Shield has released P2P Decryptor, its peer-to-peer decryption and reporting software. Training is also offered exclusively for law enforcement at no charge in Atlanta, Georgia, January 28, 2015.
A New York Post spokeswoman said some of the newspaper's Twitter accounts were briefly hacked. The Twitter feed of United Press International sent out identical suspicious tweets on false economic and military news.
When British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their communication products, and ban applications that use end-to-end encryption, security experts unanimously declared when asked that weakening users' security posture is not the right answer to the problem of fighting criminals and terrorists.
In the wake of the latest high-profile hack of Sony and claims of “cyber vandalism” being thrown about, it’s normal to feel a sense of unease. Just recently, yet another proposal for new cybersecurity legislation has been made, and by the president no less.
FBI agent Matthew Lowry checked out Item 1B4 from the evidence room at the bureau’s Washington field office on an August morning in 2013. He wrote “to lab” on a log sheet to explain why he was taking drugs that had been seized in an undercover operation dubbed Midnight Hustle.
One of the biggest challenges facing the advancement of forensic science and biometric technology is the availability of useful datasets for researchers. The lack of sufficient data limits the development of new technology, methods and informed policy decisions. To help resolve this issue, NIJ has sponsored NIST to investigate publically available biometric and forensic datasets.
No DNA or blood evidence has been found to connect a man on trial for murder to the 2012 death of his estranged wife.
Investigators from the FBI on Thursday concluded four days of “forensic digs” in Bedford County, Virginia, as part of a stepped-up investigation of the nearly 40-year-old case of two young girls who disappeared after walking to a Montgomery County shopping mall in 1975.