1 / 20

Forensic Science Development for Counterterrorism

The CTTSO Investigative and Forensic Science Subgroup aims to develop advanced forensic science capabilities to combat terrorism and assist in criminal investigations. This includes improving interview techniques, enhancing evidence analysis, and developing digital forensics methods.

micaelaa
Download Presentation

Forensic Science Development for Counterterrorism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CTTSOInvestigative and Forensic Science SubgroupFebruary 12, 2018

  2. CTTSO Mission Identify and develop capabilities to combat terrorists and irregular adversaries and to deliver these capabilities to DoD components and interagency partners through applied/advancedresearch and development, advanced studies and technical innovation, and provision of support to U.S. military operations. Objectives: • Provide interagency forum to coordinate R&D requirements for combating terrorism • Sponsor interagency advanced technology development • Promulgate technology & information transfer • Influence policy – identify enablers • Guide basic and applied research

  3. CTTSO Organization

  4. TSWG Organization

  5. Business Cycle BBAAA Industry, Academia, Nat. Labs February- March Quad Chart Review Requirements March-April Requirements Meetings Sponsors White Paper Review SMEs September Operators June- July Prototype and Equipment Deployment Full Proposal Review Project Execution

  6. IFS Subgroup Mission Identify, prioritize, and execute research and development of advanced technology to satisfy forensic and criminal investigative end user requirements in terrorism related supported activities. Develop advanced techniques and processes that provide forensic science analysis linking persons, places, things, and events, for operationally based needs, in both the traditional purviews and in the expeditionary environment. Maximize the forensic science functions – recognize, preserve, collect, analyze, store, and share – as an enabling capability across the interagency and at the national and international levels. Support the full spectrum of classification in terms of users, partners, and sponsors. To IFS, evidence as a term of art is not much different than information and traces; the only difference are the users: white side (i.e. biometric and forensic community) vs. dark side (intelligence community, SPECOPS collectors and exploiters).

  7. Focus Areas Criminalistics Credibility Assessment/ Detection of Deception Digital/Multimedia Forensics Forensic Exploitation

  8. Credibility Assessment/ Detection of Deception and Intent • Develop improved interviewing and interrogation equipment, methods and techniques through behavioral/operational psychology advancements, including psycholinguistics, cognitive methods, and motivational techniques. • Interests: • Interviews and Interrogations • Covert/ Remote Credibility Assessment • Facial Expression Recognition • Forensics Psycholinguistics • Insider Threat

  9. Criminalistics • Improve the recognition, documentation, triage, collection, analysis and preservation of evidence and actionable information for future prosecution or targeting. Create advanced capabilities in the traditional forensic science disciplines to identify individuals and improve the recovery, identification, evaluation, and analysis of material traces. Develop benchtop and handheld instrumentation that decreases throughput time and automates interpretation. • Interests: • Forensic Biology • Forensics Biochemistry • Forensics Chemistry • Forensics Genomics

  10. Digital and Multimedia Forensics Develop computer forensic hardware, software, decryption tool, and digital methods to investigate terrorism. Develop advanced methods to extract, decrypt, analyze and enhance audio recordings, video images, and other forensic information from analog and digital sources. Interests: Crime Scene Search Technology Document and Media Exploitation (DOMEX) Raw data conversion into exploitable formats Decryption Cyberforensics Steganography Automated Adjudication Decisions Automated Data Aggregation

  11. Forensics Exploitation • Develop Lexicon, common operating procedures, and advanced techniques for material and personnel exploitation of sensitive sites, caches, targeted objectives, and incident scenes. Advance the portable and packable expeditionary and “reach back” exploitation analysis capabilities for level I, II, III forensic analysis. Improve law enforcement-related technical surveillance methods. • Interests: • Predictive policing/ analytics to support prosecution and/or targeting. • Weapons Technical Intelligence • Identity Intelligence Activities • Biometric Enabled Intelligence • Pattern Based Examination • Sensitive Site Exploitation

  12. Financials FY2016: Allotted $4,000,000 OGA $ 703,000 FY2017: Allotted$3,500,000 OGA $ 450,000 FY2018: $3,500,000 OGA $

  13. Head Mounted Credibility Assessment Screening System DESCRIPTION: Develop a head mounted system that can assess the credibility of interviewees by analysis of the pupils and measuring respiration. The head mounted device is connected to a central processing unit which has algorithms to analyze the signals and provide a red-yellow-green light response with a numerical index. DELIVERABLE: Five complete sets of the head mounted device and the processing computer. OPERATIONAL IMPACT: Credibility assessments will be faster and more accurate and will be possible in many situations that are not presently possible. The amount of training and experience to operate the system will be significantly less than currently used systems REQUIREMENT Initiators: Defense Intelligence Agency (DIA), National Center for Credibility Assessment (NCCA) PERFORMER: Azimuth, Inc,, Morgantown, WV END USERS: DIA, NCCA, DOD, State and local law enforcement TRANSITION: Systems will be delivered to end users and commercially available from the developer.

  14. DNA Radar DESCRIPTION: Develop a DNA radar system for inference of identifiers from human DNA samples of unknown individuals. Harness a powerful sample preparation technique that enables multiplexing of a large number of genetic regions for high throughput sequencing. The ultimate objective is to positively identify persons from DNA whose samples/profiles are not already in a DNA database. The DNA Radar System will allow for the prediction of surnames from samples as well as ancestry, eye color, hair color, and blood group. DELIVERABLE: Three fully functional DNA Radar systems , One Illumina MiSeq , 150 Reagent kits OPERATIONAL IMPACT: The proposed system will develop new methods for advanced DNA analysis to assist with investigative leads and targeting exploiting Next Generation Sequencing (NGS) . REQUIREMENT Initiators: FBI, Intelligence Community PERFORMER: Kailos Genetics, Huntsville, AL END USERS: FBI, Intelligence Community TRANSITION: Systems will be delivered to end usersfor operator evaluation..

  15. Remote Imaging Card Unit DESCRIPTION: Develop a hardware-software system that persons at checkpoints can use to submit electronic images of suspected standard sized identification documents to a forensic laboratory where a forensic document examiner can determine their authenticity. The system will allow the examiner to analyze a high resolution electronic image and send the results electronically back to the originating site. DELIVERABLE: Five completely functional remote image card unit systems. OPERATIONAL IMPACT: A significant increase will occur in detecting persons using counterfeit identification at screening sites and checkpoints. The use of false identification will be greatly reduced. REQUIREMENT Initiators: United States Secret Service PERFORMER:ID Scientific, Park City, UT END USERS: United States Secret Service; Department of Homeland Security, Department of State; DOD; Intelligence Community TRANSITION: The initial units will be distributed to the US Secret Service for use in their field offices. The product will also be commercially available from the developer. .

  16. Investigative and Forensic Analysis of 3D Printed Polymeric Firearms DESCRIPTION: Research and establish the best investigative and forensic procedures to analyze firearms created by three dimensional (3D) printing using non-metallic substances, such as plastic, nylon, ceramics, carbon fiber, and other polymeric materials. Determine the forensic differences between 3D printed firearms and those which are traditionally made. DELIVERABLE: A set of procedures with accompanying reference databases about the forensic techniques that can accurately analyze firearms produced by 3D printing. OPERATIONAL IMPACT: The forensic community will have accurate and validated techniques to analyze 3D printed firearms which are used on terrorists acts. This capability does not presently exist. . REQUIREMENT Initiators: Bureau of Alcohol, Tobacco, Firearms and Explosives; Defense Forensic Science Center PERFORMER: Applied Research Associates, Boulder, CO and the Colorado State Police END USERS: Bureau of Alcohol, Tobacco, Firearms and Explosives; Defense Forensic Science Center TRANSITION: The final report and the developed procedures will be distributed throughout the forensic science, law enforcement, and intelligence communities.

  17. Vehicle Image Search Tool DESCRIPTION: Design, develop,. produce a software application that automatically scans large volumes of digital photos, images, and videos to detect all types of vehicles in any scenario or environment. The tool will determine the make and model of the vehicle and compare, match, or exclude a vehicle from all other vehicles images in its databases and other files DELIVERABLE: Fivefully vehicle image search tools applications OPERATIONAL IMPACT: Vehicles will be identified and matched in videos and image files that are involved in terrorist incidents and investigations. REQUIREMENT Initiators: Federal Bureau of Investigation, PERFORMER: SRI International, Princeton, NJ END USERS: Federal Bureau of Investigation, Department of Homeland Security; National Media Exploitation Center (NMEC) TRANSITION: The deliverables will be distributed to the FBI, DHS, and NMEC. The product will be commercially available from the developer.

  18. Heroin Origin by High Resolution ICP-MS DESCRIPTION: Design and develop forensically validated procedures using high resolution inductively coupled plasma mass spectrometry (HR-ICP-MS) that measure trace elements and their isotopic ratios of elements to determine the geographic origin of street opium and heroin. Establish an accompanying reference database that can be used to determine the origin of heroin from the regions of Mexico, South America, Southwest Asia, and Southeast Asia. DELIVERABLE: A set of comprehensive and validated forensic procedures using HR-ICP-MS that determines the geographic origin of street samples of heroin and opium with the accompanying reference databases. OPERATIONAL IMPACT: Heroin and opium street samples will traceable to their geographic origin which will provide valuable intelligence to law enforcement and DoD about the biggest source of revenue for terrorists. REQUIREMENT Initiators: Drug Enforcement Administration PERFORMER: Florida International University, Miami, FL END USERS: Drug Enforcement Administration; FBI, Defense Forensic Science Center TRANSITION: The established procedures and techniques will be distributed through the federal government, DoD, and the intelligence community.

  19. New Start Miniature/Body Worn Audio Video Transmitters DESCRIPTION: Design, develop, and produce a miniature radio frequency (RF) standalone transmitter that provides high performance, low power consumption and embedded electronics that will allow for covert video surveillance operations. The transmitter will be 1 inch by 1 inch by 3/8 inch in size. It will transmit live clandestine surveillance video and beremotelyconfigurable to meet the needs of the operation and shall allow for plug-in devices such as antenna, cameras, microphones, batteries and switches. It will operate in the S or C band, have AES-256 encryption, and a range of 500 meters LOS. DELIVERABLE: Ten units of a miniature body worn audio-video transmitters that can be used in multiple settings and scenarios to send clandestine video in real time. OPERATIONAL IMPACT: Clandestine video operations will be accomplished significantly better with more and better evidence and intelligence collected. REQUIREMENT Initiators: Drug Enforcement Administration PERFORMER: To be determined Miami, FL END USERS: Drug Enforcement Administration; Department of Defense TRANSITION: The final deliverable is planned to be commercially available.

  20. IFS Subgroup Points of Contact Program Manager: Terry Hess terence.hess@cttso.gov 571-372-7239 Lead Program Analyst Jeff Huber jeff.huber.ctr@cttso.gov 571-372-7262 Program Analyst Victoria Gonzalez victoria.gonzalez.ctr@cttso.gov 571-372-7293

More Related