Replaying Crime Scenes With An Advanced Scanner

Canadian Police investigators often need a view of the crime scene long after it was cleared, and photos taken at the initial stages may not show all the details. The Leica Scanstation is a forensic laser scanner able to pick up the tiniest of details and recreate collisions and crime scenes in 3D. 

The technology gives police a panoramic view of a crime long after the scene has been cleared: “You’re actually taking an investigator into the actual scene itself and walking them through,” said Joel Salinas, a retired US police officer and scanner instructor who trains police agencies around the world on the technology. 

The images the scanner picks up allow police to place new kinds of digital markers into the scene. Investigators can click through rooms or go back and look at a bullet hole up close.
 “It’s much tighter and more precise than any other conventional method that we have ever used,” said Sgt. Brian Harder, a Canadian forensic identification specialist investigator with Manitoba RCMP. 

Winnipeg police officers showed how it works using a mock car accident, where it’s believed an impaired driver in a silver car slammed into a family in a black truck. 

Kullman sets up the scanner on a tripod and moves it around the collision every eight minutes to capture different angles. Kullman, who is Winnipeg police’s resident expert on the technology and a collision analyst with the traffic division, said: “It will scan a scene 360 degrees around, 390 degrees overhead, and at each station it takes 274 images”. 

While police originally purchased the scanner to help gather evidence at traffic collisions, it’s being used more and more at scenes where violent crimes have taken place. 

The scanners haven’t stopped police from taking photographs and measurements the more traditional way, but it can replicate a scene within a matter of hours, and fact check witness accounts. Manitoba Justice Dept. says evidence produced from a scanner in one case was presented in court and deemed admissible. “It certainly does and bolster our case in the credibility that we can present to the courts,” said Sgt. Brian Harder, RCMP.

I-HLS

You Might Also Read: 

3D Mapping Can Locate Survivors In Burning Buildings:

 

« Cyber Criminals Stealing Reward Points & Air-Miles
Toyota Is Making Humanoid Workers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.