Replaying Crime Scenes With An Advanced Scanner

Canadian Police investigators often need a view of the crime scene long after it was cleared, and photos taken at the initial stages may not show all the details. The Leica Scanstation is a forensic laser scanner able to pick up the tiniest of details and recreate collisions and crime scenes in 3D. 

The technology gives police a panoramic view of a crime long after the scene has been cleared: “You’re actually taking an investigator into the actual scene itself and walking them through,” said Joel Salinas, a retired US police officer and scanner instructor who trains police agencies around the world on the technology. 

The images the scanner picks up allow police to place new kinds of digital markers into the scene. Investigators can click through rooms or go back and look at a bullet hole up close.
 “It’s much tighter and more precise than any other conventional method that we have ever used,” said Sgt. Brian Harder, a Canadian forensic identification specialist investigator with Manitoba RCMP. 

Winnipeg police officers showed how it works using a mock car accident, where it’s believed an impaired driver in a silver car slammed into a family in a black truck. 

Kullman sets up the scanner on a tripod and moves it around the collision every eight minutes to capture different angles. Kullman, who is Winnipeg police’s resident expert on the technology and a collision analyst with the traffic division, said: “It will scan a scene 360 degrees around, 390 degrees overhead, and at each station it takes 274 images”. 

While police originally purchased the scanner to help gather evidence at traffic collisions, it’s being used more and more at scenes where violent crimes have taken place. 

The scanners haven’t stopped police from taking photographs and measurements the more traditional way, but it can replicate a scene within a matter of hours, and fact check witness accounts. Manitoba Justice Dept. says evidence produced from a scanner in one case was presented in court and deemed admissible. “It certainly does and bolster our case in the credibility that we can present to the courts,” said Sgt. Brian Harder, RCMP.

I-HLS

You Might Also Read: 

3D Mapping Can Locate Survivors In Burning Buildings:

 

« Cyber Criminals Stealing Reward Points & Air-Miles
Toyota Is Making Humanoid Workers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

PT Netmarks Indonesia

PT Netmarks Indonesia

PT Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.