Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

How the Tech Behind Bitcoin Could Stop the Next Snowden

June 4, 2015 12:16 pm | by Klint Finley, Wired | Comments

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

TOPICS:
The growing use of encrypted communications and private messaging by supporters of the Islamic State group is complicating efforts to monitor terror suspects and extremists, U.S. law enforcement officials said Wednesday.

US Officials: Encryption Hinders Monitoring Extremists

June 4, 2015 12:09 pm | by Eric Tucker, Associated Press | Comments

The growing use of encrypted communications and private messaging by supporters of the Islamic State group is complicating efforts to monitor terror suspects and extremists, U.S. law enforcement officials said Wednesday.

TOPICS:
New Jersey recently joined the list of states addressing statewide cyber threat protection through educational and readiness initiatives that aim to protect infrastructure, networks and businesses, as well as state government itself.

States Flex Cyber Leadership Muscle

June 4, 2015 10:02 am | by Amanda Ziadeh, GCN | Comments

New Jersey recently joined the list of states addressing statewide cyber threat protection through educational and readiness initiatives that aim to protect infrastructure, networks and businesses, as well as state government itself.

TOPICS:
Advertisement
If the cryptographic analysis reaches a dead end, the question of the Somerton Man's identity can also be approached by testing his DNA and comparing it to that of millions of other individuals on genealogical databases.

Somerton Man's Identity Still Remains a Mystery: DNA, Isotopes and Autopsy

June 3, 2015 2:53 pm | by Lisa Zyga, Phys.org | Comments

If the cryptographic analysis reaches a dead end, the question of the Somerton Man's identity can also be approached by testing his DNA and comparing it to that of millions of other individuals on genealogical databases.

TOPICS:
Police often use DNA to solve murder mysteries and rapes. But last year, they used it to determine who spit into a customer's soda at a Chili's restaurant in Clay, New York.

Customer Suspects Annoyed Waiter Spit in Soda; Police Use DNA to Prove It

June 3, 2015 2:25 pm | by John O'Brien, syracuse.com | Comments

Police often use DNA to solve murder mysteries and rapes. But last year, they used it to determine who spit into a customer's soda at a Chili's restaurant in Clay, New York.

TOPICS:
Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

More Than $100K Needed for Test to ID Identical Twin Rapist

June 3, 2015 1:19 pm | by Ken Kolker, WWLP.com | Comments

Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

TOPICS:
When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a mes

The Dark Web Drug Lords Who Got Away

June 3, 2015 11:06 am | by Andy Greenberg, Wired | Comments

When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a message to any would-be online drug kingpins who might follow in his footsteps.

TOPICS:
GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

Assume Your GitHub Account is Hacked, Users With Weak Crypto Keys Told

June 3, 2015 10:43 am | by Dan Goodin, Ars Technica | Comments

GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

TOPICS:
Advertisement
President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval

Obama Signs Bill Remaking NSA Phone Records Program

June 3, 2015 10:15 am | by The Associated Press | Comments

President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval.

TOPICS:

No Funding for DA’s Police Misconduct Task Force

June 2, 2015 2:00 pm | by Alex Emslie, KQED | Comments

The district attorney’s office requested funding for several efforts, including $383,315 to pay for a task force investigating misconduct in the San Francisco police and sheriff departments.

TOPICS:

After Years of Forensic Investigation, Somerton Man's Identity Remains a Mystery

June 2, 2015 1:56 pm | by Lisa Zyga, Phys.org | Comments

As one of Australia's most infamous cold case mysteries, the enigma of the Somerton Man deals with a haunting situation: a man is found dead on a beach, and no one steps forward to identify him.

TOPICS:

New Sensing Tech Could Help Detect Chemical Weapons, Fraudulent Art

June 2, 2015 1:45 pm | by Cory Nealon, University at Buffalo | Comments

From airport security detecting explosives to art historians authenticating paintings, society’s thirst for powerful sensors is growing.

TOPICS:
The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with pl

NSA Phone Collection Bill Clears Senate Hurdle

June 2, 2015 12:07 pm | by Ken Dilanian, Associated Press | Comments

The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with planned changes to a House version.

TOPICS:
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

New Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

June 2, 2015 10:48 am | by Dan Goodin, Ars Technica | Comments

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

TOPICS:
Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective wh

Combat Wounded Marine Sees New Horrors in Role As Child Porn Hunter

June 2, 2015 10:31 am | by Howard Altman, Tampa Tribune | Comments

Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective who brought in a phone from a recent homicide case. It will be up to Gaertner, a computer forensics analyst, to sift through the data hidden on the phone to come up with evidence.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading