Replaying Crime Scenes With An Advanced Scanner

Canadian Police investigators often need a view of the crime scene long after it was cleared, and photos taken at the initial stages may not show all the details. The Leica Scanstation is a forensic laser scanner able to pick up the tiniest of details and recreate collisions and crime scenes in 3D. 

The technology gives police a panoramic view of a crime long after the scene has been cleared: “You’re actually taking an investigator into the actual scene itself and walking them through,” said Joel Salinas, a retired US police officer and scanner instructor who trains police agencies around the world on the technology. 

The images the scanner picks up allow police to place new kinds of digital markers into the scene. Investigators can click through rooms or go back and look at a bullet hole up close.
 “It’s much tighter and more precise than any other conventional method that we have ever used,” said Sgt. Brian Harder, a Canadian forensic identification specialist investigator with Manitoba RCMP. 

Winnipeg police officers showed how it works using a mock car accident, where it’s believed an impaired driver in a silver car slammed into a family in a black truck. 

Kullman sets up the scanner on a tripod and moves it around the collision every eight minutes to capture different angles. Kullman, who is Winnipeg police’s resident expert on the technology and a collision analyst with the traffic division, said: “It will scan a scene 360 degrees around, 390 degrees overhead, and at each station it takes 274 images”. 

While police originally purchased the scanner to help gather evidence at traffic collisions, it’s being used more and more at scenes where violent crimes have taken place. 

The scanners haven’t stopped police from taking photographs and measurements the more traditional way, but it can replicate a scene within a matter of hours, and fact check witness accounts. Manitoba Justice Dept. says evidence produced from a scanner in one case was presented in court and deemed admissible. “It certainly does and bolster our case in the credibility that we can present to the courts,” said Sgt. Brian Harder, RCMP.

I-HLS

You Might Also Read: 

3D Mapping Can Locate Survivors In Burning Buildings:

 

« Cyber Criminals Stealing Reward Points & Air-Miles
Toyota Is Making Humanoid Workers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.