It's not often that the public gets to hear about the Air Force's inner workings when pertaining to highly classified networks; however, a special programs team from Hanscom Air Force Base’s Command, Control, Communications, Intelligence and Networks Directorate has recently emerged, making their presence known.
If anyone had forgotten the sheer scale of the dark-web drug trade, German police just offered a helpful reminder. They’ve seized more than a third of a ton of narcotics from a single online drug seller—a haul that, despite its size, represents an insignificant dent in the burgeoning digital narcotics market known as Evolution.
The goal of this project was a comprehensive analytical study of those benzylpiperazines, phenylpiperazines, benzoylpiperazines and designer phenethylpiperazines of significance in forensic drug chemistry.
In September 2014, NIJ convened a meeting with crime laboratory directors from various regions of the United States to gather information on strengthening the DNA Capacity Enhancement and Backlog Reduction (DNA) and Paul Coverdell Forensic Science Improvement Grants (Coverdell) programs. This report provides a summary of generalized comments and opinions from the group, but does not represent the views of all recipients.
The University of Dundee’s world-renowned expertise in forensic and medical art is being further developed with the creation of a range of pioneering new courses.
A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.
The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.
The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.
A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.
Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago to replace the city's police force have had no effects on the killings and kidnappings. The violence continues because Iguala's most lucrative business still thrives: the opium trade.
Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used open-source implementation of the SSL and TLS protocols.
Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack.
The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown, the people who once animated those bones somehow went unaccounted for. It’s Myster’s job to figure out who they were.
In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.