Close

Search Results for "live scan"

  • Microbial 'signature' for sexual crimes

    By: Administrator
    Bacterial communities living on an individual's pubic hairs could be used as a microbial 'signature' to trace their involvement in sexual assault cases, according to a study published in the open access journal Investigative Genetics. Hairs are one of the most common types of trace evidence collected during forensic investigations, but the majority of those recovered from crime scenes lack their roots and contain insufficient amounts of human genetic material to carry out DNA profiling of...
  • We should never be silent

    By: Jocelyne Terilli
    According to the Merriam-Webster Dictionary, “abuse” is defined as the “cruel and violent treatment of a person or animal.” It’s a short definition and a short word that doesn’t truly convey the amount of horror it encompasses. This “cruel and violent treatment” can include domestic abuse, child abuse, sexual abuse, elderly abuse, animal abuse, financial abuse, human trafficking, and more. Any kind of abuse exists when someone wields cruel power over someone, who is often...
  • New Tool for Law Enforcement Executives

    By: Administrator
    Law enforcement executives now have it all in one place: Five critical concepts that are proven to improve policing and save money. Law enforcement executives now have it all in one place: Five critical concepts that are proven to improve policing and save money. NIJ's "Five Things" synthesizes many years of research and distills evidence-based practices that can make a difference into a single list. The list was developed by former NIJ director John Laub and current Police Foundation president...
  • 'Dementia' The Newest Threat to Tracking Cyber Intruders

    By: Administrator
    Forensics increasingly encompasses the analysis of potentially valuable clues and intelligence in the physical memory of an infected machine. By Kelly Jackson Higgins Dark Reading Forensics increasingly encompasses the analysis of potentially valuable clues and intelligence in the physical memory of an infected machine. But like anything in infosec, it's a constant cat-and-mouse game, with attackers finding new ways to hide their tracks in memory from incident response handlers trying to get...
  • RUVIS and The Effects of Ultraviolet Light Exposure on DNA Analysis of Fingerprints

    By: Administrator
    The Sirchie KRIMESITE Imager. is a tool that can be used to detect and document latent fingerprints on various surfaces without the use of chemical enhancement. The Imager takes advantage of the different UV light reflectance properties of the fingerprint and the surface on which it is located. Julie Luby Nicholson*, M.F.S.; Todd W. Bille*, M.S.; Michael J. Malia*, Ph.D; Robert A. Bever*, Ph.D. The Sirchie® KRIMESITE Imager. is a tool that can be used to detect and document latent...
  • NIJ Part 01 Arriving at the Scene

    By: Administrator
    Crime Scene Investigation Officers who arrive at a crime scene must be cautious and methodical. They should strive to preserve the scene with minimal contamination and should not disturb physical evidence. National Institute of Justice A Guide for General Crime Scene Investigation Arriving at the Crime Scene Part 01. Initial responding officers who arrive at a crime scene should: Respond with caution. Officers who arrive at a crime scene must be cautious and methodical. They should strive to...
  • Gunshot Residue Analysis

    By: Administrator
    Scientists in Texas reported the development of an highly dependable, rapid, and inexpensive new method for identifying gunshot residue (GSR). What is Gunshot Residue? Crime scene investigations: Gunshot residue analysis on a single gunpowder particle Monday, April 7, 2008 Reprinted with permission from LabSpaces.net With what could be a shot in the arm for crime scene investigators, chemists have developed a reliable new test for detecting the presence of gun shot residue. Above is a residue...
  • Cyber forensics: tips from a detective’s playbook

    By: Administrator
    By: Jayne Friedland Holland Editor's Note: No entity is immune from cyber-attack... least of all law enforcement agencies. The tips here were originally created for use by corporate IT departments, but this same information may be relevant for internal use by government investigative agencies. You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to...
  • Forensic Science and Art World Mysteries

    By: Administrator
    The Case Of The Purported Pollock And The Polar Bear Hair By Roxanne Palmer on November 26 2013   Jackson Pollock The estate of Ruth Kligman, mistress of artist Jackson Pollock (left), has long tried to authenticate what Kligman maintained was his last painting, "Red, Black & Silver" (right, on cover of Kligman's memoir). L: Reuters; R: Cooper Square Press It sounds like the set-up for a cracking good mystery novel: a love affair, a long-lost painting, and a telltale polar bear hair....
  • Forensic Technique Offers Hope in Homicides

    By: Administrator
    ANTHONY M DESTEFANO SOURCE:  NEWSDAY CREATED: MARCH 1, 2013 Experts say isotopes can eliminate 90 percent of the world in an attempt to identify a homicide victim and have been used to solve European criminal cases. Canadian police are using an advanced forensic technique to help determine the identity of a homicide victim who may have traveled or lived in the area around New York City in the months before he died in the late 1990s. The forensic tool, known as stable isotope analysis,...
  • Digital Evidence and Forensics

    By: Administrator
    Computers are used for committing crime, and, thanks to the burgeoning science of digital evidence forensics, law enforcement now uses computers to fight crime. National Institute of Justice (NIJ) Electronic Crime Scene Investigation ... Download PDF Computers are used for committing crime, and, thanks to the burgeoning science of digital evidence forensics, law enforcement now uses computers to fight crime. Digital evidence is information stored or transmitted in binary form that may be...
  • Vehicles Pulled From Oklahoma Lake Contain Human Remains

    By: Administrator
    From Fox News/Associated Press Stories Custer Co., Oklahoma Sheriff Bruce Peoples confirmed that six bodies of people who were reported missing over 40 years ago have been recovered  from the county’s Foss lake. Peoples says that the families of the skeletal remains should get some amount of closure with this discovery. "Now the family will know, and that's what we look at as an important part of our job," Peoples said. "It's going to close a very unhappy chapter in their lives, but nothing...
  • Social Media and Law Enforcement

    By: Administrator
    The power of the Internet—social media in particular—has brought danger home to officers and their families. Potential Risks By Gwendolyn Waters, FBI Law Enforcement Bulletin Law enforcement always has been a dangerous profession because officers risk their lives to form a barrier between criminals and society. In the past, police could to some extent protect themselves and their loved ones from threats. Today these risks have changed. The power of the Internet—social media in...
  • Behavioral analysis in the interrogation room

    By: Administrator
    From Police One (By: John Bowden) "If you fall into the mindless routine of following the 'enumerated process' you will miss the subtle hints that take you to the confession." Interrogation   Encarta Dictionary defines behavior as, “The way something behaves.”  Analysis is defined as, “The examination of something in detail in order to understand it better or draw conclusions from it.” Behavioral analysis is simply the observation of behavior and then analyzing that...
  • Microbes and Dead Mice

    By: Administrator
    establishing time of death is a crucial piece of information for investigators… but existing techniques are not always reliable. Microbes and Dead Mice--The Basic Ingredients of a Microbial Clock By: Don Penven Jessica Metcalf, a Colorado University postdoctoral researcher puts forth the interesting hypothesis that the estimated 100 trillion (give or take a few billion) microbes that live on every human being are similar to microbial clocks on human corpses. Metcalf says that establishing...