Mali is an investigator who wants to identify a potential suspect using the CODIS database. What type of data is Mali needing to access?

A.
trace evidence information
B.
information about crime statistics
C.
DNA profiles of criminals
D.
fingerprint samples from crime scenes

C. DNA profiles of criminals

Ethan is forensic expert who has been assigned a homicide case. The crime occurred at a crowded party, so Ethan wants to locate potential witnesses by looking at the victim’s Facebook account. His goal is to analyze the images of the victim’s friends and develop a list of possible witnesses to interview. Which is a potential ethical problem with this approach?

A.
The victim may not have invited the perpetrator to the party.
B.
The search may infringe on the privacy rights of the victim’s friends.
C.
The possible witnesses might not have Facebook accounts.
D.
Ethan may need a search warrant to access this information.

B. The search may infringe on the privacy rights of the victim’s friends.

After she witnessed an armed robbery in broad daylight, Desiree was asked to help the police produce a composite image of the suspect using FACES. Which phrase BEST describes the process Desiree will be following?

A.
recording a “snapshot” from her memory
B.
adding layers to a virtualized face
C.
analyzing security camera images for guidance
D.
adjusting elements to refine an image

A. Recording a "snapshot" from her memory.

In addition to criminal tampering, which is another way that evidence can be contaminated?

A.
by intentional damage
B.
through human error
C.
by new testing techniques
D.
through willful inaction

B. Through human error.