The Defense POW/MIA Accounting Agency (DPAA) recently announced that U.S. Army Air Forces 2nd Lt. Fred L. Brewer Jr., 23, of Charlotte, North Carolina, killed during World War II, was accounted for in August.
read more
The Sexual Assault Forensic Examination Telehealth System (SAFE-T System) was recognized for its forensic care for victims of sexual assault.
read more
Nearly everyone on the street has a phone capable of high-quality film capture, in addition to CCTV footage, home security cameras, body-worn cameras and more.
read more
The Office moved jointly with the Innocence Project to vacate the conviction and dismiss the indictment of Walker based on newly discovered evidence and ineffective assistance of counsel. The Office further agreed not to re-prosecute Walker in the interest of justice.
read more
After 49 years, a suspected victim of the "Scorecard Killer" whose remains were discovered in Orange County, Calif., has been identified as 17-year-old Michael Ray Schlicht of Cedar Rapids, Iowa.
read more
A woman whose remains were found in 1987 in Roane County has been identified as a result of a partnership between the Roane County Sheriff’s Office and the Tennessee Bureau of Investigation Unidentified Human Remains DNA Initiative.
read more
Research into the letters of Morton Allport reveals how he built a scientific reputation by exchanging the remains of Tasmanian Aboriginal people and Tasmanian tigers for honors from elite societies.
read more
Morgan designed a study to examine the specific types of errors associated with forensic evidence — research that is essential to identify past problems, mitigate future errors, and support the development of targeted, systems-based reforms by forensic practitioners.
read more
An unidentified man, whose remains were found in an abandoned Illinois house in 2020, has been identified as Todd Alan Kenny.
read more
Because of their critical role and long life, Industrial Control Systems are increasingly frequent targets for cyberattacks ranging from industrial espionage to attacks for financial gain, such as ransomware, as well as sabotage and terrorism.
read more