Designed for Law Enforcement Agencies, S&S Software's K-9 Software features a K-9 Incident Reporting database to include all K-9 training, expense, medical, evidence records and images of all recovered evidence. Its internal mapping features instantly viewable satellite, terrain and maps related to each report.
K-9 Software Program
From S & S SOFTWARE
- Product From Basis Technology
Autopsy 3.0 is an open source, end-to-end digital forensics platform based on The Sleuth Kit. It's a free user-friendly, windows-based tool that has all of the standard features of a commercial digital forensics tool, including file recovery, keyword searching, hash matching, registry analysis, web analytics, etc.
- Product From Tact-Out Industries
The ability to use light to your advantage in a fight, not just in the dark but even lit environments, has arrived. Tact-Out provides a whole new level of concealment at the speed of light. The dual purpose next generation fighting light system - the "L.E.O." - is one of the most complete fighting light system available.
- Product From TASER INT'L
Recognizing that law enforcement agencies often rely on manual practices to transfer sensitive electronic evidence – including videos, photos and audio recordings – to district attorneys (DAs) and other outside parties,
- Product From Sas R&D Services Inc.
From SAS R & D Services Inc (SASRAD), technology Contraband Enforcement equipment Kits include the new miniature Xpose hand held contraband detector/density meter and the repairable Ultimate fiberscope
- Product From My Property Locker
Due to the daily struggles that street cops endure, two Baltimore County, Maryland police officers decided to create something that would be convenient and easy to use to return lost or stolen property to the rightful owners. Considering the numerous burglary and theft calls officers respond to across the nation, My Property Locker (MPL) strives to reduce the number of open cases and tedious follow-ups for officers. Imagine responding to a residential burglary and the victim is able to provide you with a print-out that includes serial numbers, pictures, and all pertinent information. Now this information can be accurately documented and entered into NCIC without having to conduct multiple follow ups with the victim. MPL offers this!
- Product From Cellebrite
Cellebrite, the leading developer and provider of mobile forensic solutions, today announced the launch of a new training and certification program. The new program delivers a higher quality, standardized mobile forensics training curriculum, culminating in a formal Cellebrite Certified Mobile Examiner (CCME) credential. The program empowers mobile forensic, investigative, and intelligence professionals in law enforcement, military, and corporate environments to employ mobile forensics best practices in their everyday work, and when applicable, to defend their practices with confidence in a court of law.
- Product From AMERICAN GUNSMITHING INSTITUTE (AGI)
American Gunsmithing Institute (AGI), producers of the most authoritative instructional gunsmithing DVD courses, introduce the only DVD-based Law Enforcement Armorer’s Certification course that saves police agencies time and money while providing agency armorers the latest information on LE firearms upkeep.
- Product From FOSTER & FREEMAN USA
Foster + Freeman launched its 2014 training programme, featuring new questioned document examination and crime scene investigation courses alongside a series of product specific training programs providing advanced instruction in the use of the companys industry leading product range.
- Product From Florida State University
A new toolkit developed by Florida State University researchers to prevent domestic violence involving law enforcement officers is now available to all criminal justice agencies in the Southeast in the first phase of a plan to make the toolkit available to agencies across the nation.
- Product From Steganography Analysis and Research Center
StegAlyzerSS is a steganalysis tool designed to extend the scope of traditional computer forensic examinations by allowing the examiner to scan suspect media or forensic images of suspect media for uniquely identifiable byte patterns, or known signatures, left inside files when particular steganography applications are used to embed hidden information within them. Automated extraction algorithms unique to StegAlyzerSS can be used to recover hidden information.