Shaun Bridges, a former Secret Service agent who was investigating the Silk Road drug trafficking website, pled guilty today to charges of money laundering and obstruction of justice.
Cyber attacks and cyber espionage are on the rise in Latin America, and the source of much of it is Brazilian hackers and Peruvian recent university graduates linking up with Russian-speaking experts, according to internet security analysts.
Reconstructing the travel-movement of individuals can be important to many forensic investigations, spanning from homeland security issues at the national level to cold-case investigations at the local level. Analysis of stable isotopes recorded in human scalp hair at natural abundance levels has shown to be a useful tool to law enforcement and has assisted in the reconstruction of the recent geographic-movement histories of individuals.
A northern Virginia teenager was sentenced Friday to more than 11 years in prison for helping another teen travel to Syria to join the Islamic State and for providing other aid to the militant group.
The Army is looking for soldiers and civilians to serve in new cyber units charged with protecting critical stateside infrastructure and creating “effects” on the battlefield in support of conventional forces. The challenge: Attracting the creative, energetic talent typically drawn to the freewheeling tech sector.
Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.
After burglars grab the cash, the electronics and the jewels, they often linger in the victim’s home for a beer or a bite to eat. Scientists seize the opportunity to help catch them, using the latest technology to find traces of DNA on silverware, rims of bottles and cans, even half-eaten food.
Planned Parenthood recently gave congressional leaders and a committee that is investigating allegations of criminality at its clinics an analysis it commissioned concluding that “manipulation” of undercover videos by abortion opponents make those recordings unreliable for any official inquiry.
Several recent studies have called for improved imaging technology and matching algorithms to support firearm identification. The author investigated and developed a novel, accurate, and low-cost system for structural 3D imaging and comparison of cartridge cases.
On August 21, a pump and dump penny stock scam targeting US users, and spread using WhatsApp, drove the share price of Avra Inc, a digital currency company, by 640 percent from its opening price of $0.17 to its peak of $1.26. What is unique about this scam is its use of WhatsApp to spread the threat, essentially using mobile applications to resurrect schemes that are dying out on email.
The Obama administration is developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government’s cyber theft of valuable U.S. trade secrets.
Researchers have linked a sophisticated hacking scheme targeting Iranian dissidents and at least one freedom of expression activist back to Iran.
When cyber crime pops up in the news, it’s often accompanied by footage of dramatic raids, or grand press conferences held by law enforcement. This time, however, the National Crime Agency (NCA) — which is essentially the UK's version of the FBI — has taken a different approach.
A former intern at security firm FireEye has admitted in federal court that he designed a malicious software tool that allowed attackers to take control of other Android phones so they could spy on their owners.
Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus news story and impersonated an AP journalist.