Forensics Round-Up

Use AFIS? The NIJ needs your help. The National Institute of Justice (NIJ) needs state and local law enforcement agencies that own an automated fingerprint identification system (AFIS) to respond to a survey assessing the current state of latent...

Available in pistol and rifle form, this new and practical concept allows police and military to remain at a safe distance (up to 30 to 40 meters) from a potential target while deploying the SelectaDNA High Velocity pellet. Both systems offer similar range and accuracy, with the real difference being the size, power source and ammunition capacity.

The pistol is powered by a 12g powerlet offering up to 20 shots per. The powerlets are single use and come ready to use.
SelectaDNA pellets are supplied in packs of 14 pellets to a container. All pellets in a pack contain the same unique DNA code. The pellets can be used in either the pistol or the rifle.

NEVER forget the mobile device—7 uses for data

“It’s rare these days that you’ll encounter a case where a mobile phone, GPS device or tablet isn’t relevant in some way. Therefore, it’s important to think about these seven potential uses for the data they contain:

  • Leads that can move a criminal investigation forward.
  • Proof that a crime was committed, or of criminal intent.
  • Elimination of a suspect as the person who committed the crime.
  • Independent evidence that can corroborate a confession, or affirm or disprove an alibi.
  • Links between crime scene and suspect, suspect and victim, or suspect/victim and witnesses.
  • Establishing the innocence of people not involved in the crime.
  • Reasonable suspicion or probable cause.

“From a legal standpoint, scrolling through a lost phone’s contents cannot be considered a ‘search’ because there is no expectation of privacy attached to abandoned property—at least, until evidence of a crime is located, at which point the search must stop and a search warrant obtained.

Either way, it is important to preserve the evidence. Don’t risk deleting personal data or evidence, or leaving an unshielded device powered on. This leaves it vulnerable to being remote-wiped, or having new data added.”

Sources: “Putting Mobile Device Evidence to Work”“Securing Compromised Mobile Device Evidence”