The 2020 Law Academy will run from Monday, June 29 through Thursday, July 2 at the University of Maryland Francis King Carey School of Law.
Tuition, which includes lunch, materials, and all field trip costs, is $300/pp. Partial scholarships are available. Please call or email Shelley at 667-210-2518 or email@example.com for more information.
This program will expand your knowledge of Forensics and the Law during four days packed with field trips, guest speakers and investigative activities. We will visit the Maryland State Office of the Forensic Medical Examiner's simulated crime scene, CitiWatch, and more. Experts from the Baltimore City Police Forensic Unit and experienced criminal trial attorneys will teach about different aspects of crime scene investigation and forensic evidence.
FUN FACTS ABOUT FORENSICS:
The word “forensic” is derived from the Latin word “forensis” which means forum, a public place where, in Roman times, senators and others debated and held judicial proceedings...?
While maggots on a corpse may be disgusting to some, these critters are a welcome sight to forensic scientists. Insects have proven to be a reliable indicator of an individual's time of death. There is an entire field of forensic science dedicated to the study of insects in the crime scene – it's called forensic entomology.
To date, DNA testing has exonerated more than 242 wrongfully-convicted individuals. Thanks to advances in DNA technology, questionable convictions are sometimes re-investigated using DNA testing. Should the evidence show that the defendant could not have committed the crime, he or she can successfully be exonerated.
Because of this, there are several organizations pushing for the requirement of DNA testing on all convicts. No one knows exactly how many innocent citizens are wrongfully convicted, so many individuals strive to right this wrong. Read more at The Innocence Project.
Savvy forensic scientists may be able to find evidence that’s been deleted from a computer. Every time you “delete” a file from a computer, the file is simply set aside, hidden, and marked as data waiting to be rewritten. Computer analysts use this fact to their advantage and have developed programs that detect these hidden files, allowing them to copy and open the data.