Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Cold Case Detectives Buoyed by Arrest in Beck Murder

April 13, 2015 11:58 am | by Andy Thompson, Post-Crescent Media | Comments

Ehnert is the aunt and godmother of Amber Wilde, who was 19 and pregnant when she disappeared in Green Bay on Sept. 23, 1998. Seeing news reports about the recent arrest of a suspect in Beck's slaying reminded Ehnert how much she wants Wilde's case to be solved.

TOPICS:
A member of the identity theft and credit card fraud ring known as “Carder.su” was sentenced recently to 150 months in federal prison for selling stolen and counterfeit credit cards over the Internet.  He was further ordered to pay $50.8 million in restit

Member of Credit Card Cybercrime Ring Sentenced to 150 Months in Prison

April 13, 2015 11:49 am | by DoJ | Comments

A member of the identity theft and credit card fraud ring known as “Carder.su” was sentenced recently to 150 months in federal prison for selling stolen and counterfeit credit cards over the Internet. He was further ordered to pay $50.8 million in restitution.

TOPICS:

Husband, 83, Knew of Murder Scene Secrets, Court Told

April 13, 2015 11:24 am | by Pia Akerman, The Australian | Comments

The long-running investigation into the slaying of Margaret Penny and her hairdresser Claire Acocks reached a milestone yesterday as police charged Robert Penny, 83, over the 1991 murders.

TOPICS:
Advertisement
Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said.

Researchers Attribute Hacking in Southeast Asia, India to China

April 13, 2015 11:24 am | by Jeremy Wagstaff, Reuters | Comments

Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said.

TOPICS:
An Inspector General audit found potential for abuse of the FBI's forensic kiosks that could violate the Fourth Amendment and also mentioned the FBI’s Training Registration System was hacked in 2014.

Information Extracting Kiosks Tempt Police to Go Rogue

April 13, 2015 10:57 am | by Ms. Smith, Network World | Comments

An Inspector General audit found potential for abuse of the FBI's forensic kiosks that could violate the Fourth Amendment and also mentioned the FBI’s Training Registration System was hacked in 2014.  

TOPICS:
This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be poss

A Comparative Study of Email Forensic Tools

April 13, 2015 8:29 am | by V. Devendran, H. Shahriar and V. Clincy, SCIRP | Comments

This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic.

TOPICS:
In Contra Costa County, California, two cold cases dating back more than two decades are now believed solved thanks to new DNA technology.

New DNA Technology Helps Solve Two Decades-Old Murder Cases

April 10, 2015 2:56 pm | by Janet O, ABC 7 Chicago | Comments

In Contra Costa County, California, two cold cases dating back more than two decades are now believed solved thanks to new DNA technology.

TOPICS:
It wasn't messrs Clooney, Pitt and their nine accomplices who sailed down an elevator shaft and cracked open dozens of safety deposit boxes at a London vault during the Easter weekend. But last weekend's raid in the heart of the city's jewelry district fe

How a Heist is Masterminded

April 10, 2015 2:09 pm | by Roy Ramm, CNN | Comments

It wasn't messrs Clooney, Pitt and their nine accomplices who sailed down an elevator shaft and cracked open dozens of safety deposit boxes at a London vault during the Easter weekend. But last weekend's raid in the heart of the city's jewelry district feels like it has been taken from a movie like "Ocean 11" given its daring and planning.

TOPICS:
Advertisement
Cartoonishly tiny arms? Check. Massive, bone-crunching jaws? Huge check. How about bloodthirsty cannibalistic impulses? For certain enormous Tyrannosaurs dinosaurs—including T. rex—apparently that's a big check, too.

Fossil Forensics Reveal Tyrannosaur Cannibalism

April 10, 2015 12:26 pm | by William Herkewitz, Popular Mechanics | Comments

Cartoonishly tiny arms? Check. Massive, bone-crunching jaws? Huge check. How about bloodthirsty cannibalistic impulses? For certain enormous Tyrannosaurs dinosaurs — including T. rex — apparently that's a big check, too.

TOPICS:
USA TODAY has reported that the U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the f

DEA Collected American Call Data for Years

April 10, 2015 11:42 am | by Brad Heath, USA TODAY | Comments

USA TODAY has reported that the U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.

TOPICS:
French TV broadcaster TV5Monde has suffered a major cyber-attack on its systems by pro-ISIS hackers which caused a broadcasting blackout for several hours and hijacked its social media pages and website.

French TV Network TV5Monde Shunted Off Air by Pro-ISIS Hackers

April 10, 2015 10:27 am | by Phil Muncaster, Infosecurity Magazine | Comments

French TV broadcaster TV5Monde has suffered a major cyber-attack on its systems by pro-ISIS hackers which caused a broadcasting blackout for several hours and hijacked its social media pages and website.

TOPICS:
A new strain of ransomware has been broken, allowing for victims to circumvent payment and access their locked data.

Ransomware Strain Breaks, Victims Avoid Payment

April 10, 2015 9:42 am | by Charlie Osborne, ZD Net | Comments

A new strain of ransomware has been broken, allowing for victims to circumvent payment and access their locked data.

TOPICS:
Lawyers hired by the family of a black man who was found hanging in Mississippi said Wednesday that they are hiring independent experts, including a high-profile forensic pathologist, to conduct an investigation separate from the one pursued by state and

Family of Man Found Hanging in Mississippi Hiring Forensic Experts

April 9, 2015 1:59 pm | by Emily Wagster Pettus, Associated Press | Comments

Lawyers hired by the family of a black man who was found hanging in Mississippi said Wednesday that they are hiring independent experts, including a high-profile forensic pathologist, to conduct an investigation separate from the one pursued by state and federal authorities.

TOPICS:
The intent of this study was to measure consensus, not whether the analysts were actually correct in their conclusions. This reflects an ugly reality about the pattern-matching fields of forensics: Because they’re so subjective, it isn’t difficult for att

Bite Mark Matching Advocacy Group Conducted a Study That Discredits Bite Mark Evidence

April 9, 2015 12:36 pm | by Radley Balko, The Washington Post | Comments

The intent of this study was to measure consensus, not whether the analysts were actually correct in their conclusions. This reflects an ugly reality about the pattern-matching fields of forensics: Because they’re so subjective, it isn’t difficult for attorneys on either side of a case to find an expert who will testify to the conclusion they’re looking for.

TOPICS:
The FBI’s Criminal Justice Information Services (CJIS) Division took biometric identification to the next level when the Next Generation Identification (NGI) System — now the FBI’s largest information technology system — became fully operational.

FBI's Next Generation Identification is Fully Operational

April 9, 2015 12:00 pm | by C. Michael Riley, FBI | Comments

The FBI’s Criminal Justice Information Services (CJIS) Division took biometric identification to the next level when the Next Generation Identification (NGI) System — now the FBI’s largest information technology system — became fully operational.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading