Advertisement
 
News
Subscribe to Forensic Magazine
CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the a

The Rise of Counterintelligence in Malware Investigations

April 23, 2015 11:47 am | by John Bambenek, Dark Reading | Comments

CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the adversary.

TOPICS:
On Monday, the FBI released what was almost certainly a painful admission. The vast majority of the agents that it had sent to court to testify about a specific forensic analysis had submitted erroneous statements to the court. In its preliminary review o

The Science (and lack thereof) Behind the FBI's Retreat on Hair Analysis

April 23, 2015 11:20 am | by John Timmer, Ars Technica | Comments

On Monday, the FBI released what was almost certainly a painful admission. The vast majority of the agents that it had sent to court to testify about a specific forensic analysis had submitted erroneous statements to the court. In its preliminary review of relevant cases, at least 90 percent of them were problematic.

TOPICS:
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations t

New Pentagon Strategy Warns of Cyberwar Capabilities

April 23, 2015 11:00 am | by Lolita C. Baldor, Associated Press | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

TOPICS:
Advertisement
Hackers aren’t just getting more aggressive — take a look at what happened last winter to Sony — they’re also getting harder to track down.

Mandia: Identifying Hackers is Getting More Difficult

April 23, 2015 10:36 am | by Kurt Wagner, re/code | Comments

Hackers aren’t just getting more aggressive — take a look at what happened last winter to Sony — they’re also getting harder to track down.

TOPICS:
Senate Majority Leader Mitch McConnell has introduced a bill to extend through 2020   a controversial surveillance authority under the Patriot Act. The move comes as a   bipartisan group of lawmakers in both chambers is preparing legislation to scale   ba

Senate Bill Would Extend NSA Surveillance

April 23, 2015 10:20 am | by Ellen Nakashima, The Washington Post | Comments

Senate Majority Leader Mitch McConnell has introduced a bill to extend through 2020 a controversial surveillance authority under the Patriot Act. The move comes as a bipartisan group of lawmakers in both chambers is preparing legislation to scale back the government’s spying powers under Section 215 of the Patriot Act.

TOPICS:
An anthropologist and pathologist who is part of the international team working to identify people killed when Malaysia Airlines Flight 17 was brought down in Ukraine has been publicly rebuked for discussing the case and showing photos of victims in a lec

Investigator Criticized for Showing Images of MH17 Victims

April 23, 2015 9:36 am | by Mike Corder, Associated Press | Comments

An anthropologist and pathologist who is part of the international team working to identify people killed when Malaysia Airlines Flight 17 was brought down in Ukraine has been publicly rebuked for discussing the case and showing photos of victims in a lecture to students.

TOPICS:
One of the most common body fluids encountered at a violent crime scene is blood. The forensic examination of soiled clothing and other textiles such as sheets, towels and upholstery can help forensic scientists to reconstruct a crime, and in some cases m

Bloodstain Patterns on Textile Surfaces: A Fundamental Analysis

April 23, 2015 8:48 am | by Stephen Michielsen, Michael Taylor, Namrata Parekh and Feng Ji, NIJ | Comments

One of the most common body fluids encountered at a violent crime scene is blood. The forensic examination of soiled clothing and other textiles such as sheets, towels and upholstery can help forensic scientists to reconstruct a crime, and in some cases might support or refute details shared by the complainant, suspect, or eyewitness.

TOPICS:
The FBI has issued and alert warning that law enforcement personnel and public officials may be at an increased risk of cyber attacks.

Hacktivists Targeting Law Enforcement

April 22, 2015 12:39 pm | by Ernie Austin, Associate Editor | Comments

The FBI has issued and alert warning that law enforcement personnel and public officials may be at an increased risk of cyber attacks. 

TOPICS:
Advertisement
The House is expected Wednesday to pass a bill, years in the making, that would push private companies to share access to their computer networks and records with federal cybercrime investigators, The New York Times reports.

House Cybersecurity Vote Gets Around Private Concerns

April 22, 2015 11:22 am | by Ernie Austin, Associate Editor | Comments

The House is expected Wednesday to pass a bill, years in the making, that would push private companies to share access to their computer networks and records with federal cybercrime investigators, The New York Times reports.

TOPICS:
Today, soil evidence regularly leads to bodies, overturns alibis and reveals the origins of artifacts. That is in no small part due to Lorna Dawson, who has advanced methods in soil forensics and worked to disseminate the techniques to others.

Forensic Science: The Soil Sleuth

April 22, 2015 8:25 am | by Chelsea Wald, Nature | Comments

Today, soil evidence regularly leads to bodies, overturns alibis and reveals the origins of artifacts. That is in no small part due to Lorna Dawson, who has advanced methods in soil forensics and worked to disseminate the techniques to others.

All states should have laws ensuring that criminal justice systems properly handle, store and retain forensic biological evidence, according to a new report from the National Institute of Standards and Technology (NIST).

New Report Recommends Policies for Improved Preservation of Biological Evidence

April 22, 2015 8:25 am | by NIST | Comments

All states should have laws ensuring that criminal justice systems properly handle, store and retain forensic biological evidence, according to a new report from the National Institute of Standards and Technology (NIST).

TOPICS:
About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research.

1,500 iOS Apps Have HTTPS-Crippling Bug

April 21, 2015 12:42 pm | by Dan Goodin, Ars Technica | Comments

About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research.  

TOPICS:

Deadly Shooting Sparks SWAT Standoff in Baldwin Park

April 21, 2015 12:15 pm | by Marco Cota-Robles, KABC | Comments

The shooting death spawned a SWAT standoff just around the corner at a home in the 13200 block of Earl Avenue. Investigators said they had reason to believe that home and the people inside may have been connected to the Cosbey Street shooting.

TOPICS:

Lawsuit Over Naked Crime Scene Photos Headed for Trial

April 21, 2015 11:44 am | by Gregory Pratt, The Daily Southtown | Comments

The lawsuit, filed in late 2010 by Mejia's mother, Christina Mejia, and other relatives, alleges that responding sheriff's officers removed Mejia's clothes in violation of the department's own rules and took multiple nude photographs of her body. It alleges that the sheriff's office intentionally caused emotional distress to Mejia's family by shooting the photos.

TOPICS:
United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

Researcher Denied Airline Flight After Tweet About Hacking

April 21, 2015 10:24 am | by Jack Gillum, Associated Press | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading