By: Capt. S B Tyagi, FISM, CSC
What makes a serial killer tick? How do forensic experts solve crimes using cutting-edge technology? Who are the men and women that risk their lives to put criminals behind bars?
These questions and more are related to the subject of Crime Investigation. Real crime, real people, real drama - Crime Investigation is the hard work by the true professionals who work meticulously and methodically to solve the mystery behind the crime – motive, the modus-operendai and men involved in crime! Crime Investigation opens the door to crime labs, police archives and courtrooms, providing a behind-the-scenes look at criminal investigations and probing unexplained mysteries.
Physical Evidence at a Crime Scene
Evidence used to resolve an issue can be split into 2 areas - testimonial evidence and physical evidence. The testimonial evidence would be any witnessed accounts of an incident. The physical evidence would refer to any material items that would be present on the crime scene. These items would be presented in an issue or incident to prove or disprove the facts of the issue. What will evidence collected at a scene do for the investigation -
• May prove that a crime has been committed.
• Establish any key elements of a crime.
• Link a suspect with a scene or a victim.
• Establish the identity of a victim or suspect.
• Corroborate verbal witness testimony.
• Exonerate the innocent.
The evidence that is located and recovered at a scene will give the detectives responsible for the investigation leads to work with in the case.
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
A complete review of Forensic Science and its various branches.Hamza Mohammad
This is a complete review of Forensic Science and its various branches and the various methodology and techniques used for forensic analysis of various evidences and examination of crime scene.
A complete review of Forensic Science and its various branches.Hamza Mohammad
This is a complete review of Forensic Science and its various branches and the various methodology and techniques used for forensic analysis of various evidences and examination of crime scene.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This Workshop is a perfect opportunity for someone who wants to get hands on experience with real forensic techniques. Learn how real investigators examine and process crime scenes, as well as analyze evidence and use to try to solve a crim
e.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Managing serious incidents and fatal accidents, Exeter - June 2016Browne Jacobson LLP
This seminar aims to give practical advice to those being investigated and prosecuted for regulatory offences. We also look at the new powers of the Magistrates and the sentencing guidelines for regulatory offences to assist you in assessing your approach to any prosecution.
https://www.brownejacobson.com/sectors-and-services/services/regulatory
Forensic Psychology view on eyewitness identification. Includes vision and memory, legal concepts and recommendations. This powerpoint is a review of the NAS report titled Identifying the Culprit
Investigating Misconduct: Reaching a Decision and Determining Root CausesCase IQ
So you’ve completed your workplace investigation and it’s time to pull all the information and evidence together to draw a conclusion and make a decision about what happened. But that’s not all; you will also want to find out why the misconduct occurred so that you can put into place measures to ensure it doesn’t happen again. Do you know where to start?
It is still missing! Could the search for the missing Malaysia Airlines plane have gone much faster? I think this will become the "Natalee Holloway" (http://en.wikipedia.org/wiki/Disappearance_of_Natalee_Holloway) of air disasters - lots of breathless reports, ‘breaking news’ of no consequence coupled with gobs of bad science & bizarre theories - and no jet found!
It will be quite by accident that a pieces of debris wash-up that can once & for all confirm that it did indeed crashed -- but the bulk of the wreckage is probably entombed in 15000 feet of Indian Ocean water--never to be found. As a growing number of airplanes scoured the southern Indian Ocean in the search for Malaysia Airlines Flight 370, authorities released new details that paint a different picture of what may have happened in the plane's cockpit.
Military radar tracking shows that the aircraft changed altitude after making a sharp turn over the South China Sea as it headed toward the Strait of Malacca, a source close to the investigation into the missing flight told CNN. The plane flew as low as 12,000 feet at some point before it disappeared from radar, according to the source. And imagine that each neighboring country very aggressively monitors not only its own air-space but that of all the countries it shares boundaries of its air-space and not a bird should ideally fly without their coming to know of it. The mystery deepens on each passing days and yet there is no trace of ill-fated flight!
Back home, there were two noteworthy events for which ICISS was the event partner. In Mumbai two days seminar called Secutech India Security & Safety Conclave 2014 held from 6-7 March 2014. There were four tracks of seminars. Alongside the seminar there was well planned exhibition having latest security and safety related gadgets and systems on display from highly reputed companies. First day's seminar was inaugurated by Shri Maninderjit Singh Bitta and second day's seminar was opened by Shri Satej D Patil, the Minister of State for Home in Govt. of Maharashtra. On 21st March 2014 at Delhi, there was release of India Risk Survey 2014 which was conducted jointly by FICCI & Pinkerton. The survey report is enclosed for our esteemed members and readers.
Capt S B Tyagi
For ICISS
This month, there are two important events taking place – one in Mumbai (India) and other one in Abu Dhabi (UAE) and ICISS is Event Partner for both of them! While the seminar in Mumbai, “Secutech India Safety & Security Conclave 2014” is focusing on Security Solutions for Vertical Markets, the “Global Energy Security Conference 2014” in Abu Dhabi will have in-depth discussions on Corporate Security Integration with the Business, Security Mitigation Measures for International Companies and Ensuring Security at Oil & Gas Infrastructure in High Risk Areas against Terrorism.
The Pinkerton initiatives in India have been very useful in identifying the real threats faced by various sectors and strategies to mitigate them. The past survey results have been found very useful by the Corporates operating in India and for those wishing to set-up their operations in India in formulating their Security & Risk Policies and the measures to counter the treats. Like last year, the ICISS has partnered in this survey and we request all our readers to positively respond to this survey.
Capt S B Tyagi
For ICISS
Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry.
Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers.
Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004).
Capt S B Tyagi
For ICISS
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. Capt S B Tyagi
sbtyagi@gail.co.in
Why investigations….Why investigations….
• What makes a serial killer tick?What makes a serial killer tick?
• How do forensic experts solve crimesHow do forensic experts solve crimes
using cutting-edge technology?using cutting-edge technology?
• Who are the men andWho are the men and
women that risk their lives towomen that risk their lives to
put criminals behind bars?put criminals behind bars?
3. Capt S B Tyagi
sbtyagi@gail.co.in
• Crime Investigation is the hard workCrime Investigation is the hard work
by the true professionals who workby the true professionals who work
meticulously and methodically tometiculously and methodically to
solve the mystery behind the crime –solve the mystery behind the crime –
Why investigations….Why investigations….
•The motive,The motive,
•The modus-operendai,The modus-operendai,
andand
•The men involved inThe men involved in
crime!crime!
4. Capt S B Tyagi
sbtyagi@gail.co.in
Types of evidenceTypes of evidence
– The testimonial evidence wouldThe testimonial evidence would
be any witnessed accounts of anbe any witnessed accounts of an
incident.incident.
– The physical evidence wouldThe physical evidence would
refer to any material items thatrefer to any material items that
would be present on the crimewould be present on the crime
scene.scene.
Evidence used to resolve an issue canEvidence used to resolve an issue can
be split into 2 areas - testimonialbe split into 2 areas - testimonial
evidence and physical evidence.evidence and physical evidence.
5. Capt S B Tyagi
sbtyagi@gail.co.in
Physical Evidence at a CrimePhysical Evidence at a Crime
SceneScene
• May prove that a crime has beenMay prove that a crime has been
committed.committed.
• Establish any key elements of a crime.Establish any key elements of a crime.
• Link a suspect with a scene or victim.Link a suspect with a scene or victim.
• Establish the identity of a victimEstablish the identity of a victim
or suspect.or suspect.
• Corroborate verbal witnessCorroborate verbal witness
testimony.testimony.
• Exonerate the innocent.Exonerate the innocent.
6. Capt S B Tyagi
sbtyagi@gail.co.in
Varieties of EvidenceVarieties of Evidence
• Impressions include fingerprints, toolImpressions include fingerprints, tool
marks, footwear, fabric impressions, tiremarks, footwear, fabric impressions, tire
marks and bite marks.marks and bite marks.
• Forensic Biology includes blood, semen,Forensic Biology includes blood, semen,
body fluids, hair, nail scrapings, blood stainbody fluids, hair, nail scrapings, blood stain
patterns.patterns.
• Trace Evidence includes gun shotTrace Evidence includes gun shot
residues, arson accelerant, paint,residues, arson accelerant, paint,
glass and fibers.glass and fibers.
• Firearms - includes weapons, gunFirearms - includes weapons, gun
powder patterns, casings,powder patterns, casings,
projectiles, fragments, pellets,projectiles, fragments, pellets,
7. Capt S B Tyagi
sbtyagi@gail.co.in
Processing the Crime SceneProcessing the Crime Scene
• In an Organized approach toIn an Organized approach to
Crime Scene InvestigationsCrime Scene Investigations
there are three (3) basic andthere are three (3) basic and
simple stages in properlysimple stages in properly
processing the crime scene.processing the crime scene.
Those stages consist of –Those stages consist of –
– Scene Recognition,Scene Recognition,
– Scene Documentation andScene Documentation and
– Evidence Collection.Evidence Collection.
8. Capt S B Tyagi
sbtyagi@gail.co.in
An organized approach assures:An organized approach assures:
• A thorough and legalA thorough and legal
search is conducted.search is conducted.
• Expeditious processingExpeditious processing
without compromise.without compromise.
• Proper sceneProper scene
documentation.documentation.
• Proper methods andProper methods and
techniques for evidencetechniques for evidence
recovery.recovery.
9. Capt S B Tyagi
sbtyagi@gail.co.in
• Proper use and knowledge ofProper use and knowledge of
resources and equipment.resources and equipment.
• All pertinent evidenceAll pertinent evidence
recovery.recovery.
• Proper handling and packagingProper handling and packaging
of evidence.of evidence.
• Proper distribution points forProper distribution points for
evidence analysis.evidence analysis.
• Proper safety precautions areProper safety precautions are
followed.followed.
An organized approach assures:An organized approach assures:
10. Capt S B Tyagi
sbtyagi@gail.co.in
Do what is right…Do what is right…
For that reason alone!For that reason alone!
Lodging FIR.pptLodging FIR.ppt
11. Capt S B Tyagi
sbtyagi@gail.co.in
Capt SB Tyagi, COAS’CC, FISM, CSC, CSPCapt SB Tyagi, COAS’CC, FISM, CSC, CSP
At : sbtyagi@gail.co.in
Alternate E-mail : captsbtyagi@indiatimes.com ;
: sbtyagi1958@gmail.com
My Blog: : http://captsbtyagi.blogspot.com
My web-site : http://sbtyagi.wix.com/iciss
ICISS at LinkedIn : http://www.linkedin.com/groups?
gid=4413505&trk=hb_side_g
For more such presentations, pleaseFor more such presentations, please
contact –contact –