Cyber Security: Sharing is Good

Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. Not only does it alert the other members of your community to a potential attack, it can provide critical actionable information to speed and bolster your own defenses. Participating in a formal information sharing group can greatly enhance an organization’s cybersecurity capabilities.

FBI's NGI Now Fully Operational

The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division announced on September 15, 2014 the achievement of full operational capability of the Next Generation Identification (NGI) System. The FBI’s NGI System was developed to expand the Bureau’s biometric identification capabilities, ultimately replacing the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) in addition to adding new services and capabilities.

6th Cybersecurity Framework Workshop

The agenda for the 6th Cybersecurity Framework Workshop, October 29-30, 2014 in Tampa, Fla., has been released. The workshop aims to gather input to help NIST understand stakeholder awareness of, and initial experiences with, the framework and related activities to support its use.

Tool Gathers Video and Photo Evidence from the Public

Amateur photographers and videographers — a.k.a. everyday smartphone users - are everywhere. Whenever a major criminal event occurs, such as the Boston Marathon bombing or the Vancouver hockey riots, a treasure trove of potential evidence awaits the eyes of investigators in the form of smartphone photos and videos. But how can an agency make it easy and even feasible to collect all of that data?

Digital Evidence Added to OSAC

A new forensic subcommittee on digital evidence was recently added to Organization of Scientific Area Committees (OSAC).

Accessing a Suspect’s Computer in its Natural State

To access a suspect's computer, traditional procedure involves removing the hard drive, creating a forensic image (a duplicate copy), and then analyzing that copy using sophisticated industry-specific software. Although effective, this process takes many hours and allows investigators to view and present information only in a raw state—one that non-computer experts such as attorneys and juries can find difficult to understand. 

<< Start < Prev 1 2 3 4 5 6 7 8 9 Next > End >>

Results 11 - 20 of 88

New Books

Bloodstain Pattern Analysis

Most forensic disciplines attempt to determine the “who” of a crime. But bloodstain pattern analysis focuses on the “what happened” part of a crime. This book is the third edition of Blood-stain Pattern Analysis. The authors explore the topic in depth, explaining what it is, how it is used, and the practical methodologies that are employed to achieve defensible results. It offers practical, common-sense advice and tips for both novices and professionals.