Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Increasingly, law enforcement investigators across the country are putting their faith in cadaver dogs to help find remains — bodies, bones and blood from the missing and the murdered. These dogs have helped convict some murder suspects, even when no body

Cadaver Dogs Find Evidence When Others Can't

November 3, 2014 3:00 pm | by Martha Irvine, Associated Press | Comments

Increasingly, law enforcement investigators across the country are putting their faith in cadaver dogs to help find remains — bodies, bones and blood from the missing and the murdered. These dogs have helped convict some murder suspects, even when no body is found. Trainers and some forensic scientists say the dogs can detect human residue that's been left behind in a trunk, or on a blanket or tarp, or a temporary grave of some sort.

TOPICS:

State Forensic Agency Will No Longer Process Misdemeanor Marijuana Evidence

November 3, 2014 12:08 pm | by Ashlie Walter, The News & Advance | Comments

In a bid to limit the number of backlogged drug cases, the Virginia Department of Forensic Science will no longer process marijuana in its labs for evidence in misdemeanor cases.                     

TOPICS:
A retired San Diego police criminalist connected through DNA to the 1984   murder of 14-year-old Claire Hough apparently told a friend earlier this year   that he’d photographed the girl on Torrey Pines State Beach shortly before   she turned up dead, acc

Warrants Reveal Evidence in 1984 Killing

November 3, 2014 12:03 pm | by Kristina Davis, U-T San Diego | Comments

A retired San Diego police criminalist connected through DNA to the 1984 murder of 14-year-old Claire Hough apparently told a friend earlier this year that he’d photographed the girl on Torrey Pines State Beach shortly before she turned up dead, according to search warrant affidavits unsealed recently.

TOPICS:
Advertisement

Michael Morton Act Creates Backlog In Texas County

November 3, 2014 11:40 am | by Mitch Goulding, Time Warner Cable News | Comments

Leaders in Williamson County, Texas have come up with a creative solution to tackle a growing jail population.                                       

TOPICS:
Facebook has never had much of a reputation for letting users hide their   identities online. But now the world’s least anonymous website has just   joined the Web’s most anonymous network.

Facebook Tor Users Anonymous to Everyone but Facebook

November 3, 2014 11:15 am | by Andy Greenberg, Wired | Comments

Facebook has never had much of a reputation for letting users hide their identities online. But now the world’s least anonymous website has just joined the Web’s most anonymous network.                   

TOPICS:

NIST Drafts Cyber Threat Info Sharing Guidance

November 3, 2014 10:43 am | by GCN | Comments

When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, shared threat intelligence can reduce the impact of future attacks.

TOPICS:
The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.

Navy Becoming Cyber Ready

November 3, 2014 10:24 am | by Aliya Sternstein, Nextgov | Comments

The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.                    

TOPICS:
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of secur

Raising the Limits of Cryptography

November 3, 2014 10:02 am | by Larry Hardesty, MIT | Comments

Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security.

TOPICS:
Advertisement
Onlookers shouted "Are you sorry?" and "Why did you do it?" as a gaunt and battered-looking Eric Frein — the survivalist suspected in the ambush slaying of a Pennsylvania state trooper — was led from court Friday, the morning after his capture ended a gru

Trooper Ambush Suspect in Court after Long Manhunt

October 31, 2014 2:17 pm | by Kathy Matheson and Michael Rubinkam, Associated Press | Comments

Onlookers shouted "Are you sorry?" and "Why did you do it?" as a gaunt and battered-looking Eric Frein — the survivalist suspected in the ambush slaying of a Pennsylvania state trooper — was led from court Friday, the morning after his capture ended a grueling seven-week manhunt.

TOPICS:
A Circuit Court judge has ruled that a criminal defendant can be compelled to give up his fingerprint, but not his pass code, to allow police to open and search his cellphone.

Police Can Require Cellphone Fingerprint, Not Pass Code

October 31, 2014 1:57 pm | by Elisabeth Hulette, Pilot Online | Comments

A Circuit Court judge has ruled that a criminal defendant can be compelled to give up his fingerprint, but not his pass code, to allow police to open and search his cellphone.                     

TOPICS:
The skulls of an older man and woman were found at a Connecticut waste transfer station near some books and videos on witchcraft and Satan, police said Friday. The skulls and a jaw bone were found Thursday at a Stamford transfer station in a pile of recyc

Human Skulls Found at Connecticut Transfer Station

October 31, 2014 1:38 pm | by Pat Eaton-Robb, Associated Press | Comments

The skulls of an older man and woman were found at a Connecticut waste transfer station near some books and videos on witchcraft and Satan, police said Friday. The skulls and a jaw bone were found Thursday at a Stamford transfer station in a pile of recyclables brought from the home of a Fairfield man who had recently died.

TOPICS:
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.

Pirate Bay Founder Sentenced for Hacking Danish Data

October 31, 2014 10:45 am | by Associated Press | Comments

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.        

TOPICS:
Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background

Cybersecurity Not Just about Hackers

October 31, 2014 10:22 am | by Maria Zacharias, The National Science Foundation | Comments

Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background in computer and information science, but also on an understanding of human behavior and psychology and the political and economic environment.

TOPICS:
An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.

Only Top Legislators Informed of White House Cyber Breach

October 30, 2014 4:39 pm | by Mark Hosenball, Reuters | Comments

An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.           

TOPICS:
IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.

IBM Big Data Uncovers Criminal Cyber Activity

October 30, 2014 4:27 pm | by IBM | Comments

IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.                

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading