Professional Documents
Culture Documents
❖ CCTV Cameras :-
Closed-circuit television, or CCTV, is a device used in home and business security
systems for electronic surveillance. CCTV cameras can help keep an eye on many
different parts of a property at the same time, and they can also help keep a record of
activities or incidents. Now a days, whenever there is an incident, whether it is an
accident or a theft, police always ask or search for CCTV footage from any nearby source
that may have recorded the incident in full or in part.
CCTV forensic refers to the use of still and moving images from a CCTV system that has
single or multiple cameras attached to it. The expert will capture all footage within the
period of interest from as many CCTV systems or cameras as possible. Once all
available footage has been reviewed, the expert will put together the relevant footage for
presentation along with a report and statement. They will identify specific information
relating to the investigation, along with times and dates from one or more CCTV
systems. This evidence can help both prosecution and defense in establishing the true
course of events in a case.
❖ Voice Analysis :-
Voice analysis has become fairly common in criminal cases. Many high-profile cases
have memorably featured vocal analyses, demonstrating its use in a variety of
investigations. For example, when journalist James Foley was kidnapped and beheaded
by ISIS in 2012, the terrorist gang released a video of the murder which featured a
masked terrorist who was speaking during the video. Experts from around the world
attempted to identify the terrorist by analyzing their voice.
Voice analysis in forensics can involve several different techniques, the employment of
which is dependent on the case and the type of evidence the investigator has to work
with.
Usually, the process of voice analysis involves one or more of the following techniques:
interpreting noises or verifying a recording’s authenticity, transcribing a dialogue from a
voice recording, profiling a speaker based on factors of their speech such as dialect,
language spoken, or content of the conversation, putting a suspect’s voice in a lineup of
voices.
Fragments of conversations are most often obtained from phone conversations,
including calls making demands for ransom, hoax calls, and calls to the emergency
services. Voicemails are also common sources of vocal information, as well as secretly
recorded conversations and voices captured in videos.