Fingerprints Forensics

Fingerprints Forensics - LETS GET LEGAL! ROCKY M OUNTAIN D...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style LET’S GET LEGAL!!! R OCKY M OUNTAIN D IVISION OF THE I NTERNATIONAL A SSOCIATION FOR I DENTIFICATION Breckenridge, Colorado David “Ski” Witzke PC Pros MORE HITS ®
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Making the invisible visible!
Background image of page 2
Making the invisible visible!
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Making the invisible visible!
Background image of page 4
Making the invisible visible!
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A thought to ponder . .. Everyone has a photographic memory. .. Some people just don’t have film!
Background image of page 6
So what do YOU do for image security?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image storage and management n Store both images n Original image n Proprietary file format n Data encryption n Enhanced image n Image n Processing data
Background image of page 8
Image storage and management n Manual processes n Naming conventions n Directory n Subdirectory n File name n Automated processes n Image tracking systems
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image processing guidelines n Develop guidelines for digital image capture, storage and transmission of digital images retained as evidence n Image format n Image size n Physical dimensions n Resolution n Establish procedures to preserve image integrity
Background image of page 10
Image processing guidelines n Develop guidelines for digital image capture, storage and transmission of digital images retained as evidence n Establish procedures to preserve image integrity n Image identity n Image authenticity n Image security n Image privacy
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image processing guidelines n Ensure admissibility of digital images n Who captured the image? n What is captured? n What is deleted? n When/where was the image captured? n Who downloaded the image? n Who had access to the image before it was downloaded? n How many storage cards does each person have?
Background image of page 12
Image processing guidelines n Ensure admissibility of digital images n Who enhanced the image? n
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 25

Fingerprints Forensics - LETS GET LEGAL! ROCKY M OUNTAIN D...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online