Digital Forensics

A judge overseeing the federal sentencing of a white former police officer who pleaded guilty in the shooting death of an unarmed black motorist is allowing expert defense testimony about disputed audio and video recordings.
by Meg Kinnard, Associated Press
11:00am
12.6.2017
A new system currently in development by a team of researchers at Georgia Institute of Technology seeks to help with forensic investigations of cyber intrusions by monitoring a system continuously before an attack happens, and making it easy to...
Associate Editor
|
1:21pm
11.10.2017
Advertisement
There’s no question Ronald Johnson was running from Chicago Police in October 2014, before he was shot dead in the back by an officer. But did Johnson, 25, have a gun? Three years later, that’s the question still swirling around his death.
by Brad Edwards, CBS Chicago
11:44am
11.1.2017
It's possible to identify the author of an email by analyzing as little as two words, research by Nottingham Trent University suggests. Dr. David Wright, an expert in forensic linguistics, examined thousands of emails to show it's possible to...
by Nottingham Trent University
11:10am
10.30.2017
A three-stage investigation of keywords on Twitter can turn up illegal sales of opioids—potentially leading to illegal operations. The investigatory method was developed by medical doctors and computer engineers at the University of California–San...
Senior Science Writer
|
1:36pm
10.26.2017
Advertisement
The Supreme Court agreed Monday to take on a major dispute over the government's authority to force American technology companies to hand over emails and other digital information sought in criminal probes but stored outside the U.S.
by Mark Sherman, Associated Press
10:53am
10.17.2017
The image of a woman’s face, and a clip of her saying “you can’t play with this” in Vietnamese, were pulled from a child porn video. Now the hunt is on for “Jane Doe 39”—the latest suspected abuser of children sought in the FBI’s Operation Rescue Me...
Senior Science Writer
|
12:53pm
10.12.2017
The trove of digital evidence in Ahmad Khan Rahimi’s ongoing federal trial is meant to provide airtight proof he was behind a 2016 attack that injured 30 people, but it also dramatically demonstrates the growing omnipresence of security cameras.
by Tom Hays and Colleen Long, Associated Press
12:30pm
10.11.2017
Advertisement
The Joint Research Centre (JRC) has released the software of its SUMO maritime surveillance tool, which is helping to protect oceans by detecting ships engaged in illicit activities. SUMO (Search for Unidentified Marine Objects) automatically scans...
by Community Research and Development Information Service (CORDIS)
10:41am
10.2.2017
When the origin of a document is a mystery or in dispute, there are several ways that forensic document investigators can use information from Microsoft Word to piece together a document’s “life story.”
Associate Editor
|
1:35pm
9.28.2017
Advertisement
Advertisement
As technology becomes more advanced, child pornographers are using smaller, more discreet devices to hide their crimes. That’s why the Internet Crimes Against Children task force in Delaware County, Pennsylvania, is bringing in Charlie, a 2-year-old...
Associate Editor
|
12:17pm
9.27.2017
A teenager suspected of a killing who was named one of Texas' 10 Most Wanted fugitives was caught in Los Angeles on Tuesday after posting a live video on social media, police said.
by Michael Balsamo, Associated Press
12:03pm
9.22.2017
Advertisement
Two new features of the upcoming iOS 11 system update for Apple devices will make it more difficult for law enforcement to unlock seized devices and extract data from devices that are already unlocked.
Associate Editor
|
12:09pm
9.13.2017
Forensic Architecture's Ayotzinapa tool lets anyone investigate the 2014 Iguala massacre, in which 43 students are presumed to have been murdered.
by Eleanor Peake, Wired Magazine
10:46am
9.8.2017
Police found two suicide notes saved on a floppy disk among the possessions of a deceased, previously healthy, 28-year-old man. With some pieces of the puzzle not adding up, they needed a way to confirm the victim was indeed the one who authored the...
12:13pm
8.24.2017
Advertisement
The fatal stabbing of a hairstylist in Chicago was part of a sexual fantasy hatched in an online chatroom between a Northwestern University professor and an Oxford University employee, whose plan included killing someone and then themselves,...
by Michael Tarm, Associated Press
10:29am
8.21.2017
A team of forensic linguistics experts lead by the University of Manchester’s Dr. Andrea Nini believe they have solved a longstanding mystery about a letter Abraham Lincoln may have authored.
8:00am
8.18.2017
The U.S. Department of Justice has issued a search warrant for internet records possessed by web hosting service DreamHost regarding a 2017 Inauguration Day protest website, after about 200 were arrested in relation to the Jan. 20 event. DreamHost...
Associate Editor
|
12:44pm
8.16.2017
Advertisement
When drug users go online for the first time to buy opioids, they aren't looking for the widest selection or the best prices for their illicit purchases, a new study suggests. Researchers found that first-time drug buyers who visited one marketplace...
by Ohio State University
9:21am
8.16.2017
A 26-year-old man is in custody in California in a "sextortion" case, after he was hunted by federal authorities for allegedly making cyber threats to girls, producing child pornography and threatening to use explosive devices at Indiana schools,...
by Will Gretsky and Emily Shapiro, ABC News
12:39pm
8.8.2017
Advertisement
Advertisement
The U.S. Army banned the use of drones made by the Chinese company DJI last week, apparently in response to the load of hackable data the machines collect and store. This morning, a University of New Haven team demonstrates exactly how such common...
Senior Science Writer
|
12:14pm
8.7.2017
Police in New York state may soon have a high-tech way of catching texting drivers: a device known as a textalyzer that allows an officer to quickly check if a cellphone has been in use before a crash.
by David Klepper, Associated Press
8:55am
7.27.2017
Advertisement
Authorities from the U.S. and Europe announced Thursday that they had taken down illegal dark web marketplaces AlphaBay and Hansa, but not before using the latter site as bait to collect information on users attempting to buy and sell drugs, fake...
Associate Editor
|
12:32pm
7.25.2017
The explosion of smartphones and apps, and the growing size of computer hard drives has created a glut of evidence for investigators in recent years. But all of that data is swamping the computer forensic units at the Maryland State Police and other...
by Amanda Iacone, WTOP
11:15am
7.18.2017
Recent reports that the smart home device and voice recognition assistant Alexa called 911 during a domestic abuse incident, whether accurate or not, have generated some interest in the potential for smart devices to intervene in domestic violence...
Associate Editor
|
12:58pm
7.14.2017
Advertisement
The Australian government on Friday proposed a new cybersecurity law to force global technology companies such as Facebook and Google to help police by unscrambling encrypted messages sent by suspected extremists and other criminals.
by Rod McGuirk, Associated Press
9:22am
7.14.2017
A team of international investigators brought to Mexico to unravel one of the nation’s gravest human rights atrocities was targeted with sophisticated surveillance technology sold to the Mexican government to spy on criminals and terrorists,...
by Azam Ahmed, New York Times
10:33am
7.10.2017
A website that hosted an "Abduction 101" forum linked to a 28-year-old suspect in the kidnapping of a Chinese scholar at the University of Illinois bills itself as the most popular sexual fetish networking site on the internet—and it has faced...
by Michael Tarm, Associated Press
10:49am
7.3.2017
Advertisement
Federal agents persuaded a judge to issue a warrant for a Microsoft email account they suspected was used for drug trafficking. Microsoft said the emails were on a server in Ireland and beyond the warrant's reach. A federal appeals court agreed....
by Mark Sherman, Associated Press
9:32am
7.3.2017
The hashtags, pictures and quickly tossed off 140-character missives of Twitter could alert police to breaking crises, like riots, before even 911 can raise the alert, according to a new study. A complex machine-learning algorithm picks up...
Senior Science Writer
|
12:42pm
6.27.2017
Advertisement
Advertisement
The University of New Haven has set up what it envisions to be the major hub to connect cyber forensics teams the world over: the Artifact Genome Project. Artifacts are traces of digital history that could tell investigators a story of crime.
Senior Science Writer
|
12:37pm
6.20.2017
For those selling counterfeit versions of luxury brand name goods, their dream counterfeit domain name is just a few clicks away. A recent research report delves into the prevalence and nature of fraudulent domains and how easy it can be to obtain...
Associate Editor
|
1:34pm
6.16.2017
Advertisement
The grave of an 8-year-old Ohio boy who killed himself in January after his mother said he was bullied at school was opened to remove a computer tablet for prosecutors investigating his suicide, authorities said Wednesday.
by Lisa Cornwell, Associated Press
10:06am
6.8.2017
An international team of researchers has uncovered the mechanism that allowed Volkswagen to circumvent U.S. and European emission tests over at least six years before the Environmental Protection Agency put the company on notice in 2015 for...
by University of California-San Diego
9:29am
5.24.2017
Some archivists are experimenting with a new computer called FRED, or Forensic Evidence Recovery Device. It's similar to what police use when handling digital evidence in suspected crimes. Archivists, like police, must ensure that nothing is altered...
by Blair Sanderson, CBC News
11:26am
5.22.2017
Advertisement
Former U.S. Rep. Anthony Weiner, whose penchant for sexting strangers ended his political career and led to an investigation that upended the presidential race, pleaded guilty Friday to criminal charges in connection with his online communications...
by Larry Neumeister and Tom Hays, Associated Press
12:18pm
5.19.2017
Attorneys squared off in a New Jersey court Friday over access to an ex-Rutgers football player's cellphone, as the judge weighed a motion that could affect more than a dozen other cases connected to the string of alleged armed robberies.
by Craig McCarthy, NJ.com
9:44am
5.17.2017
Using data from personal devices to solve crimes and help protect the public is both an area of great debate and rapid advances. Even if such data can help solve crimes, should it be made available for that purpose? How much of a modern citizen’s “...
by Brian A. Jackson
11:25am
5.11.2017
Advertisement
Advertisement