The December 2022 issue of IEEE Spectrum is here!

Close bar

Cellphone Crime Solvers

Could the murder victim’s BlackBerry lead to her killer? Increasingly, the answer is yes

11 min read
Photo: Dan Saelinger
Photo: Dan Saelinger

It was a dark and stormy night. In a narrow alley on the west side of Chicago, a dead woman is slumped inside her Mercedes, clutching her mobile phone to her head, as if she were still in conversation. Rain pours through the broken car window, blown out by the bullet that went through the woman’s temple. A small crowd is standing around the car as Chicago PD detective Nick Fasano arrives on the scene, responding to a 911 call made by a witness waiting in a restaurant line. Fasano knows he’s looking at a homicide. For one thing, there’s that bullet in her head. He immediately realizes that another sort of witness to this crime might be on the other end of that phone connection.

He reaches through the open car window to grab the phone and thumb through its recent call history. Then he stops himself. He knows better than to disturb a crime scene. And he’s never seen that particular model of phone—he could potentially push the wrong buttons and destroy evidence. He needs to get that device to a forensic lab, where the information can be extracted properly, in a way that preserves not only the contacts, call histories, text messages, e-mail, images, and videos but also their admissibility in court.

Keep reading...Show less

This article is for IEEE members only. Join IEEE to access our full archive.

Join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of Spectrum’s articles, podcasts, and special reports. Learn more →

If you're already an IEEE member, please sign in to continue reading.

Membership includes:

  • Get unlimited access to IEEE Spectrum content
  • Follow your favorite topics to create a personalized feed of IEEE Spectrum content
  • Save Spectrum articles to read later
  • Network with other technology professionals
  • Establish a professional profile
  • Create a group to share and collaborate on projects
  • Discover IEEE events and activities
  • Join and participate in discussions

The EV Transition Explained: Charger Infrastructure

How many, where, and who pays?

8 min read
Illuminated electric vehicle charging stations at night in Monterey Park, California.

Electric vehicle charging stations in Monterey Park, California.

FREDERIC J. BROWN/AFP/Getty Images

The ability to conveniently charge an EV away from home is a top concern for many EV owners. A 2022 survey of EV owners by Forbes indicates that 62 percent of respondents are so anxious about their EV range that travel plans have been affected. While “range anxiety” may be overblown, the need for an extensive and reliable external charging infrastructure is not.

Keep Reading ↓Show less
{"imageShortcodeIds":[]}

Video Friday: Humanoid Soccer

Your weekly selection of awesome robot videos

4 min read
Humans and human-size humanoid robots stand together on an indoor soccer field at the beginning of a game

Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We also post a weekly calendar of upcoming robotics events for the next few months. Please send us your events for inclusion.

CoRL 2022: 14–18 December 2022, AUCKLAND, NEW ZEALAND
ICRA 2023: 29 May–2 June 2023, LONDON

Enjoy today’s videos!

Keep Reading ↓Show less

Learn How Global Configuration Management and IBM CLM Work Together

In this presentation we will build the case for component-based requirements management

2 min read

This is a sponsored article brought to you by 321 Gang.

To fully support Requirements Management (RM) best practices, a tool needs to support traceability, versioning, reuse, and Product Line Engineering (PLE). This is especially true when designing large complex systems or systems that follow standards and regulations. Most modern requirement tools do a decent job of capturing requirements and related metadata. Some tools also support rudimentary mechanisms for baselining and traceability capabilities (“linking” requirements). The earlier versions of IBM DOORS Next supported a rich configurable traceability and even a rudimentary form of reuse. DOORS Next became a complete solution for managing requirements a few years ago when IBM invented and implemented Global Configuration Management (GCM) as part of its Engineering Lifecycle Management (ELM, formerly known as Collaborative Lifecycle Management or simply CLM) suite of integrated tools. On the surface, it seems that GCM just provides versioning capability, but it is so much more than that. GCM arms product/system development organizations with support for advanced requirement reuse, traceability that supports versioning, release management and variant management. It is also possible to manage collections of related Application Lifecycle Management (ALM) and Systems Engineering artifacts in a single configuration.

Keep Reading ↓Show less