DIGITAL NEWS
Cyber Security: Sharing is Good

Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. Not only does it alert the other members of your community to a potential attack, it can provide critical actionable information to speed and bolster your own defenses. Participating in a formal information sharing group can greatly enhance an organization’s cybersecurity capabilities.

Read more...
 
FBI's NGI Now Fully Operational

The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division announced on September 15, 2014 the achievement of full operational capability of the Next Generation Identification (NGI) System. The FBI’s NGI System was developed to expand the Bureau’s biometric identification capabilities, ultimately replacing the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) in addition to adding new services and capabilities.

Read more...
 
6th Cybersecurity Framework Workshop

The agenda for the 6th Cybersecurity Framework Workshop, October 29-30, 2014 in Tampa, Fla., has been released. The workshop aims to gather input to help NIST understand stakeholder awareness of, and initial experiences with, the framework and related activities to support its use.

Read more...
 
Tool Gathers Video and Photo Evidence from the Public

Amateur photographers and videographers — a.k.a. everyday smartphone users - are everywhere. Whenever a major criminal event occurs, such as the Boston Marathon bombing or the Vancouver hockey riots, a treasure trove of potential evidence awaits the eyes of investigators in the form of smartphone photos and videos. But how can an agency make it easy and even feasible to collect all of that data?

Read more...
 
Digital Evidence Added to OSAC

A new forensic subcommittee on digital evidence was recently added to Organization of Scientific Area Committees (OSAC).

Read more...
 
Accessing a Suspect’s Computer in its Natural State

To access a suspect's computer, traditional procedure involves removing the hard drive, creating a forensic image (a duplicate copy), and then analyzing that copy using sophisticated industry-specific software. Although effective, this process takes many hours and allows investigators to view and present information only in a raw state—one that non-computer experts such as attorneys and juries can find difficult to understand. 

Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 Next > End >>

Results 11 - 20 of 88






Digital-Image Management at Mass Gravesites

SKELETONIZED REMAINS that were carefully unearthed from the desert sands of Iraq tell their own story: the bones of an adult, still dressed in a woman’s apparel, lie supine. The skull is perforated by a bullet hole. Tucked in the space between the ribs and the left humerus is a much smaller skeleton, bones in the skull un-fused, and the fully clothed body partially swaddled in a blanket.

Read more...