Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

It's not often that the public gets to hear about the Air Force's inner workings when pertaining to highly classified networks; however, a special programs team from Hanscom Air Force Base’s Command, Control, Communications, Intelligence and Networks Dire

Air Force Program Combats Insider Cyber Threats

March 13, 2015 11:26 am | by Justin Oakes, U.S. Air Force | Comments

It's not often that the public gets to hear about the Air Force's inner workings when pertaining to highly classified networks; however, a special programs team from Hanscom Air Force Base’s Command, Control, Communications, Intelligence and Networks Directorate has recently emerged, making their presence known.

TOPICS:
If anyone had forgotten the sheer scale of the dark-web drug trade, German police just offered a helpful reminder. They’ve seized more than a third of a ton of narcotics from a single online drug seller—a haul that, despite its size, represents an insigni

German Police Just Made Gigantic Dark-Web Drug Bust

March 13, 2015 11:01 am | by Andy Greenberg, Wired | Comments

If anyone had forgotten the sheer scale of the dark-web drug trade, German police just offered a helpful reminder. They’ve seized more than a third of a ton of narcotics from a single online drug seller—a haul that, despite its size, represents an insignificant dent in the burgeoning digital narcotics market known as Evolution.

TOPICS:
The goal of this project was a comprehensive analytical study of those benzylpiperazines, phenylpiperazines, benzoylpiperazines and designer phenethylpiperazines of significance in forensic drug chemistry.

Analytical and Synthetic Studies on Designer Drugs of the Piperazine Class

March 13, 2015 10:23 am | by C. Randall Clark and Jack DeRuiter, NIJ | Comments

The goal of this project was a comprehensive analytical study of those benzylpiperazines, phenylpiperazines, benzoylpiperazines and designer phenethylpiperazines of significance in forensic drug chemistry.

TOPICS:
Advertisement
In September 2014, NIJ convened a meeting with crime laboratory directors from various regions of the United States to gather information on strengthening the DNA Capacity Enhancement and Backlog Reduction (DNA) and Paul Coverdell Forensic Science Improve

Strengthening Forensic Science Services, Final Report

March 12, 2015 10:41 am | by Forensic Technology Center of Excellence, NIJ | Comments

In September 2014, NIJ convened a meeting with crime laboratory directors from various regions of the United States to gather information on strengthening the DNA Capacity Enhancement and Backlog Reduction (DNA) and Paul Coverdell Forensic Science Improvement Grants (Coverdell) programs. This report provides a summary of generalized comments and opinions from the group, but does not represent the views of all recipients.

TOPICS:
The University of Dundee’s world-renowned expertise in forensic and medical art is being further developed with the creation of a range of pioneering new courses.

University Expands World-Leading Forensic Art Program

March 12, 2015 10:21 am | by Roddy Isles, University of Dundee | Comments

The University of Dundee’s world-renowned expertise in forensic and medical art is being further developed with the creation of a range of pioneering new courses.

TOPICS:
A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.

Centuries-Old DNA Helps Identify Origins of Caribbean Slave Skeletons

March 12, 2015 9:53 am | by Krista Conger, Stanford University | Comments

A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.  

TOPICS:
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpe

Software Spots Online Child Sex Abuse

March 12, 2015 9:27 am | by Tilburg University | Comments

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.

TOPICS:
The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.

Politics Intrude as Cybersecurity Firms Hunt Foreign Spies

March 12, 2015 8:35 am | by Joseph Menn, Reuters | Comments

The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.

TOPICS:
Advertisement
The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.

Imprint of License Plate in Snow Leads to Burglary Suspects

March 11, 2015 11:36 am | by Associated Press | Comments

The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.

TOPICS:
A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.

Stolen Data Worth Less Over Time

March 11, 2015 11:10 am | by INFORMS | Comments

A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.

TOPICS:
Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago t

Mexican Town Where 43 Students Disappeared is Opium Hotbed

March 11, 2015 9:53 am | by Christopher Sherman and Alberto Arce, Associated Press | Comments

Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago to replace the city's police force have had no effects on the killings and kidnappings. The violence continues because Iguala's most lucrative business still thrives: the opium trade.

TOPICS:
Cryptography Services, a team of consultants from several security research firms,   have announced that they have been tasked with auditing OpenSSL, the popular and   widely used open-source implementation of the SSL and TLS protocols.

Core Infrastructure Initiative Kickstarts OpenSSL Audit

March 11, 2015 9:44 am | by Zeljka Zorn, Help Net Security | Comments

Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used open-source implementation of the SSL and TLS protocols.

TOPICS:
Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack.

Boston Bombing Jury Sees Suspect's Bullet-Ridden Notes

March 11, 2015 8:35 am | by Denise LaVoie, Associated Press | Comments

Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack. 

TOPICS:
The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown,

Forensic Anthropologist Helps Police Identify Old Bones

March 11, 2015 8:35 am | by Matt McKinney, Star Tribune | Comments

The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown, the people who once animated those bones somehow went unaccounted for. It’s Myster’s job to figure out who they were.

TOPICS:
In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.

Cutting-Edge Hack Exploits DRAM Weakness

March 11, 2015 8:34 am | by Dan Goodin, Ars Technica | Comments

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading