Increasingly, law enforcement investigators across the country are putting their faith in cadaver dogs to help find remains — bodies, bones and blood from the missing and the murdered. These dogs have helped convict some murder suspects, even when no body is found. Trainers and some forensic scientists say the dogs can detect human residue that's been left behind in a trunk, or on a blanket or tarp, or a temporary grave of some sort.
In a bid to limit the number of backlogged drug cases, the Virginia Department of Forensic Science will no longer process marijuana in its labs for evidence in misdemeanor cases.
A retired San Diego police criminalist connected through DNA to the 1984 murder of 14-year-old Claire Hough apparently told a friend earlier this year that he’d photographed the girl on Torrey Pines State Beach shortly before she turned up dead, according to search warrant affidavits unsealed recently.
Leaders in Williamson County, Texas have come up with a creative solution to tackle a growing jail population.
Facebook has never had much of a reputation for letting users hide their identities online. But now the world’s least anonymous website has just joined the Web’s most anonymous network.
When an agency identifies and successfully responds to a cyber attack, it gains knowledge that can be used by others facing the same or similar threats. Because attackers often use similar strategies, tools, and methods against multiple organizations, shared threat intelligence can reduce the impact of future attacks.
The Navy is embarking on a year-long effort to protect hardware and software servicewide, as the Internet of Things takes hold of everything from ship speakers to missile launchers.
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security.
Onlookers shouted "Are you sorry?" and "Why did you do it?" as a gaunt and battered-looking Eric Frein — the survivalist suspected in the ambush slaying of a Pennsylvania state trooper — was led from court Friday, the morning after his capture ended a grueling seven-week manhunt.
A Circuit Court judge has ruled that a criminal defendant can be compelled to give up his fingerprint, but not his pass code, to allow police to open and search his cellphone.
The skulls of an older man and woman were found at a Connecticut waste transfer station near some books and videos on witchcraft and Satan, police said Friday. The skulls and a jaw bone were found Thursday at a Stamford transfer station in a pile of recyclables brought from the home of a Fairfield man who had recently died.
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.
Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background in computer and information science, but also on an understanding of human behavior and psychology and the political and economic environment.
An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior congressional leaders were initially notified about it, U.S. officials say.
IBM has developed new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.