Share
Every day there are news stories about the latest victims of data breaches and identity theft and of information technology systems crippled by cyber attacks. Private citizens, businesses, and governm...
Share
The cyberthreat is a top national security priority for the United States. Terrorists, nation-state sponsored actors, and criminal groups have expanded their operations into the digital realm to probe...
Share
Two men pull into the fitness center parking lot. Unlike most people there, they are not looking to improve their physical health and well-being, but to prey upon trusting individuals who are trying t...
Share
Surprisingly, there are many different responses to the question “What is a crime analyst?” The answers provided by law enforcement members will vary based on the different levels of need within t...
Share
A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects
Researchers at Michigan State University simulate the identification scenario presented by the investigati...
Share
Why do forensic service providers need a quality assurance program? What is a quality assurance program? If an agency does not have a crime laboratory, why worry about it?
First and foremost, law e...
Share
Advances in DNA technology over the last decade require police departments to take a new approach to how potentially critical evidence at a crime scene is located and identified. Cellular DNA, or “t...
Share
Rethinking the Ownership of Crime Labs: No Matter Who Is in Charge, Jurisdictional Commitment Is Key
It is doubtful that any police chief would agree to run a hospital or an engineering firm. Hospitals and engineering firms are not police business, and they require skill sets and value systems unique...


