WorldWideScience

Sample records for forensic methods based

  1. Application of DNA-based methods in forensic entomology.

    Science.gov (United States)

    Wells, Jeffrey D; Stevens, Jamie R

    2008-01-01

    A forensic entomological investigation can benefit from a variety of widely practiced molecular genotyping methods. The most commonly used is DNA-based specimen identification. Other applications include the identification of insect gut contents and the characterization of the population genetic structure of a forensically important insect species. The proper application of these procedures demands that the analyst be technically expert. However, one must also be aware of the extensive list of standards and expectations that many legal systems have developed for forensic DNA analysis. We summarize the DNA techniques that are currently used in, or have been proposed for, forensic entomology and review established genetic analyses from other scientific fields that address questions similar to those in forensic entomology. We describe how accepted standards for forensic DNA practice and method validation are likely to apply to insect evidence used in a death or other forensic entomological investigation.

  2. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2016-11-01

    Full Text Available As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.

  3. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  4. An automatic image-based modelling method applied to forensic infography.

    Directory of Open Access Journals (Sweden)

    Sandra Zancajo-Blazquez

    Full Text Available This paper presents a new method based on 3D reconstruction from images that demonstrates the utility and integration of close-range photogrammetry and computer vision as an efficient alternative to modelling complex objects and scenarios of forensic infography. The results obtained confirm the validity of the method compared to other existing alternatives as it guarantees the following: (i flexibility, permitting work with any type of camera (calibrated and non-calibrated, smartphone or tablet and image (visible, infrared, thermal, etc.; (ii automation, allowing the reconstruction of three-dimensional scenarios in the absence of manual intervention, and (iii high quality results, sometimes providing higher resolution than modern laser scanning systems. As a result, each ocular inspection of a crime scene with any camera performed by the scientific police can be transformed into a scaled 3d model.

  5. An automatic image-based modelling method applied to forensic infography.

    Science.gov (United States)

    Zancajo-Blazquez, Sandra; Gonzalez-Aguilera, Diego; Gonzalez-Jorge, Higinio; Hernandez-Lopez, David

    2015-01-01

    This paper presents a new method based on 3D reconstruction from images that demonstrates the utility and integration of close-range photogrammetry and computer vision as an efficient alternative to modelling complex objects and scenarios of forensic infography. The results obtained confirm the validity of the method compared to other existing alternatives as it guarantees the following: (i) flexibility, permitting work with any type of camera (calibrated and non-calibrated, smartphone or tablet) and image (visible, infrared, thermal, etc.); (ii) automation, allowing the reconstruction of three-dimensional scenarios in the absence of manual intervention, and (iii) high quality results, sometimes providing higher resolution than modern laser scanning systems. As a result, each ocular inspection of a crime scene with any camera performed by the scientific police can be transformed into a scaled 3d model.

  6. An enzyme-based DNA preparation method for application to forensic biological samples and degraded stains.

    Science.gov (United States)

    Lounsbury, Jenny A; Coult, Natalie; Miranian, Daniel C; Cronk, Stephen M; Haverstick, Doris M; Kinnon, Paul; Saul, David J; Landers, James P

    2012-09-01

    Extraction of DNA from forensic samples typically uses either an organic extraction protocol or solid phase extraction (SPE) and these methods generally involve numerous sample transfer, wash and centrifugation steps. Although SPE has been successfully adapted to the microdevice, it can be problematic because of lengthy load times and uneven packing of the solid phase. A closed-tube enzyme-based DNA preparation method has recently been developed which uses a neutral proteinase to lyse cells and degrade proteins and nucleases [14]. Following a 20 min incubation of the buccal or whole blood sample with this proteinase, DNA is polymerase chain reaction (PCR)-ready. This paper describes the optimization and quantitation of DNA yield using this method, and application to forensic biological samples, including UV- and heat-degraded whole blood samples on cotton or blue denim substrates. Results demonstrate that DNA yield can be increased from 1.42 (±0.21)ng/μL to 7.78 (±1.40)ng/μL by increasing the quantity of enzyme per reaction by 3-fold. Additionally, there is a linear relationship between the amount of starting cellular material added and the concentration of DNA in the solution, thereby allowing DNA yield estimations to be made. In addition, short tandem repeat (STR) profile results obtained using DNA prepared with the enzyme method were comparable to those obtained with a conventional SPE method, resulting in full STR profiles (16 of 16 loci) from liquid samples (buccal swab eluate and whole blood), dried buccal swabs and bloodstains and partial profiles from UV or heat-degraded bloodstains on cotton or blue denim substrates. Finally, the DNA preparation method is shown to be adaptable to glass or poly(methyl methacrylate) (PMMA) microdevices with little impact on STR peak height but providing a 20-fold reduction in incubation time (as little as 60 s), leading to a ≥1 h reduction in DNA preparation time.

  7. A validation framework for microbial forensic methods based on statistical pattern recognition

    Energy Technology Data Exchange (ETDEWEB)

    Velsko, S P

    2007-11-12

    This report discusses a general approach to validating microbial forensic methods that attempt to simultaneously distinguish among many hypotheses concerning the manufacture of a questioned biological agent sample. It focuses on the concrete example of determining growth medium from chemical or molecular properties of a bacterial agent to illustrate the concepts involved.

  8. SSL based Webmail Forensic Engine

    Directory of Open Access Journals (Sweden)

    Manesh T

    2017-01-01

    Full Text Available In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secured data communications using SSL or TLS security for their data exchanged. Cyber criminals and terrorists have started by means of this mode for exchanging their malicious information in their transactions. Forensic experts have to face greater difficulty and multiple challenges in tracing crucial forensic information from network packets as the communication is secured. These challenges might affect the digital forensic experts in procuring substantial evidences against such criminals from their working environments. This research work revels working background of SSL based webmail forensic engine, which decrypt respective communication or network session and also reconstruct the actual message contents of webmail applications. This digital forensic engine is compatible to work with in proxy servers and other computing environments and enables forensic reconstruction followed by analysis of webmail clients. Proposed forensic engine employs is a high-speed packet capturing hardware module, a sophisticated packet reformation algorithm; restores email header and messages from encrypted stream of SMTP and POP3 network sessions. Proposed forensic engine also support cyber investigation team with generated forensic report and prosecution of culprits by judiciary system of the specific country.

  9. Forensic research methods and means based on automated hardware-software complexes

    OpenAIRE

    Agalidi, Yu. S.; Lievyi, S. V.

    2010-01-01

    This paper presents a retrospective review of the methods and hardware-software means for forensic examinations developed during the two decades in the applied research laboratory at the chair of radio engineering devices and systems (RTUS) of the radio engineering department. The research results were reviewed covering studies in four expert directions: analysis of the materials and means of audio- and video-recording; ballistic tests; technical expertise of documents; and vehicle identifica...

  10. Nuclear Forensic Materials and Methods

    Science.gov (United States)

    Hutcheon, I. D.; Grant, P. M.; Moody, K. J.

    A short history and treatment of the various aspects of nuclear forensic analysis is followed by a discussion of the most common chemical procedures, including applications of tracers, radioisotopic generators, and sample chronometry. Analytic methodology discussed includes sample preparation, radiation detection, various forms of microscopy, and mass-spectrometric techniques. The chapter concludes with methods for the production and treatment of special nuclear materials and with a description of several actual case studies conducted at Livermore.

  11. [Forensic evidence-based medicine in computer communication networks].

    Science.gov (United States)

    Qiu, Yun-Liang; Peng, Ming-Qi

    2013-12-01

    As an important component of judicial expertise, forensic science is broad and highly specialized. With development of network technology, increasement of information resources, and improvement of people's legal consciousness, forensic scientists encounter many new problems, and have been required to meet higher evidentiary standards in litigation. In view of this, evidence-based concept should be established in forensic medicine. We should find the most suitable method in forensic science field and other related area to solve specific problems in the evidence-based mode. Evidence-based practice can solve the problems in legal medical field, and it will play a great role in promoting the progress and development of forensic science. This article reviews the basic theory of evidence-based medicine and its effect, way, method, and evaluation in the forensic medicine in order to discuss the application value of forensic evidence-based medicine in computer communication networks.

  12. Establishing a novel automated magnetic bead-based method for the extraction of DNA from a variety of forensic samples.

    Science.gov (United States)

    Witt, Sebastian; Neumann, Jan; Zierdt, Holger; Gébel, Gabriella; Röscheisen, Christiane

    2012-09-01

    Automated systems have been increasingly utilized for DNA extraction by many forensic laboratories to handle growing numbers of forensic casework samples while minimizing the risk of human errors and assuring high reproducibility. The step towards automation however is not easy: The automated extraction method has to be very versatile to reliably prepare high yields of pure genomic DNA from a broad variety of sample types on different carrier materials. To prevent possible cross-contamination of samples or the loss of DNA, the components of the kit have to be designed in a way that allows for the automated handling of the samples with no manual intervention necessary. DNA extraction using paramagnetic particles coated with a DNA-binding surface is predestined for an automated approach. For this study, we tested different DNA extraction kits using DNA-binding paramagnetic particles with regard to DNA yield and handling by a Freedom EVO(®)150 extraction robot (Tecan) equipped with a Te-MagS magnetic separator. Among others, the extraction kits tested were the ChargeSwitch(®)Forensic DNA Purification Kit (Invitrogen), the PrepFiler™Automated Forensic DNA Extraction Kit (Applied Biosystems) and NucleoMag™96 Trace (Macherey-Nagel). After an extensive test phase, we established a novel magnetic bead extraction method based upon the NucleoMag™ extraction kit (Macherey-Nagel). The new method is readily automatable and produces high yields of DNA from different sample types (blood, saliva, sperm, contact stains) on various substrates (filter paper, swabs, cigarette butts) with no evidence of a loss of magnetic beads or sample cross-contamination. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  13. An Efficient Forensic Method for Copy–move Forgery Detection based on DWT-FWHT

    Directory of Open Access Journals (Sweden)

    B. Yang

    2013-12-01

    Full Text Available As the increased availability of sophisticated image processing software and the widespread use of Internet, digital images are easy to acquire and manipulate. The authenticity of the received images is becoming more and more important. Copy-move forgery is one of the most common forgery methods. When creating a Copy-move forgery, it is often necessary to add or remove important features from an image. To carry out such forensic analysis, various technological instruments have been developed in the literatures. However, most of them are time-consuming. In this paper, a more efficient method is proposed. First, the image size is reduced by Discrete Wavelet Transform (DWT. Second, the image is divided into overlapping blocks of equal size and, feature of each block is extracted by fast Walsh-Hadamard Transform (FWHT. Duplicated regions are then detected by lexicographically sorting all features of the image blocks. To make the range matching more efficient, multi-hop jump (MHJ algorithm is using to jump over some the “unnecessary testing blocks” (UTB. Experimental results demonstrated that the proposed method not only is able to detect the copy-move forgery accurately but also can reduce the processing time greatly compared with other methods.

  14. Age Estimation Methods in Forensic Odontology

    Directory of Open Access Journals (Sweden)

    Phuwadon Duangto

    2016-12-01

    Full Text Available Forensically, age estimation is a crucial step for biological identification. Currently, there are many methods with variable accuracy to predict the age for dead or living persons such as a physical examination, radiographs of the left hand, and dental assessment. Age estimation using radiographic tooth development has been found to be an accurate method because it is mainly genetically influenced and less affected by nutritional and environmental factors. The Demirjian et al. method has long been the most commonly used for dental age estimation using radiological technique in many populations. This method, based on tooth developmental changes, is an easy-to-apply method since different stages of tooth development is clearly defined. The aim of this article is to elaborate age estimation by using tooth development with a focus on the Demirjian et al. method.

  15. Course constructions: A case-base of forensic toxicology.

    Science.gov (United States)

    Zhou, Nan; Wu, Yeda; Su, Terry; Zhang, Liyong; Yin, Kun; Zheng, Da; Zheng, Jingjing; Huang, Lei; Wu, Qiuping; Cheng, Jianding

    2017-08-01

    Forensic toxicology education in China is limited by insufficient teaching methods and resources, resulting in students with adequate theoretical principles but lacking practice experience. Typical cases used as teaching materials vividly represent intoxication and provide students with an opportunity to practice and hone resolving skills. In 2013, the Department of Forensic Pathology at Zhongshan School of Medicine began to construct top-quality courses in forensic toxicology, with its first step, creating a base containing typical cases of intoxication. This essay reviews the construction process of said cases-base, which is intended to set an example of forensic toxicology education. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  16. Passive forensics for copy-move image forgery using a method based on DCT and SVD.

    Science.gov (United States)

    Zhao, Jie; Guo, Jichang

    2013-12-10

    As powerful image editing tools are widely used, the demand for identifying the authenticity of an image is much increased. Copy-move forgery is one of the tampering techniques which are frequently used. Most existing techniques to expose this forgery need to improve the robustness for common post-processing operations and fail to precisely locate the tampering region especially when there are large similar or flat regions in the image. In this paper, a robust method based on DCT and SVD is proposed to detect this specific artifact. Firstly, the suspicious image is divided into fixed-size overlapping blocks and 2D-DCT is applied to each block, then the DCT coefficients are quantized by a quantization matrix to obtain a more robust representation of each block. Secondly, each quantized block is divided non-overlapping sub-blocks and SVD is applied to each sub-block, then features are extracted to reduce the dimension of each block using its largest singular value. Finally, the feature vectors are lexicographically sorted, and duplicated image blocks will be matched by predefined shift frequency threshold. Experiment results demonstrate that our proposed method can effectively detect multiple copy-move forgery and precisely locate the duplicated regions, even when an image was distorted by Gaussian blurring, AWGN, JPEG compression and their mixed operations. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Computer–based method of bite mark analysis: A benchmark in forensic dentistry?

    OpenAIRE

    Nandita Kottieth Pallam; Karen Boaz; Srikant Natrajan; Minu Raj; Nidhi Manaktala; Lewis, Amitha J

    2016-01-01

    Aim: The study aimed to determine the technique with maximum accuracy in production of bite mark overlay. Materials and Methods: Thirty subjects (10 males and 20 females; all aged 20–30 years) with complete set of natural upper and lower anterior teeth were selected for this study after obtaining approval from the Institutional Ethical Committee. The upper and lower alginate impressions were taken and die stone models were obtained from each impression; overlays were produced from the biting ...

  18. Steganography forensics method for detecting least significant bit replacement attack

    Science.gov (United States)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  19. Use of different investigation methods of soil for forensic purpose

    Directory of Open Access Journals (Sweden)

    Kristina Štibelj

    2012-06-01

    Full Text Available With its specific background and methods, geology may help forensic scientists considerably when doingresearches and analyses. Based on the procedures used in the National Forensic Laboratory, we have beenresearching and comparing 15 soil samples from different locations. We divided them into 3 groups, of which eachcomprised one pair of samples of the same location. By comparing colour, density and mineral composition in thesoil samples, we tried to determine which two samples originated from the same location. We were comparingthe results of individually used research methods and tried to evaluate which provide the best sample matches.Furthermore, we were comparing how the mineral composition of the samples and their bedrock match. The bestmatch was achieved by applying the method of X-ray powder diffraction, which clearly showed identical samplescollected from the same location. When measuring density, the values varied according to the location site, fromwhich the comparative and conflicting samples were taken. The change of density was observed in the distanceof less than one meter. For the field of forensic science the exact location of sample collection is of crucial importance.The proximity of sample collecting has considerable impact on density, as longer distances do not providecomparative results, whereas a short distance may present us with highly matching samples, the method which iswidely considered applicable in forensic science. By applying the method of X-ray powder it is possible to acquirecomparative results at the distance of several meters; in forensic science, however, this does not provide acceptableresults for defining the identity of the location.

  20. Research onTort Forensics Method Based on Asymmetric Watermarking%基于非对称水印的侵权取证方法研究

    Institute of Scientific and Technical Information of China (English)

    何一辉

    2012-01-01

    在数字图像的侵权优化取证的研究中,数字图像的加密预处理的加密方法直接关系到后续侵权取证的成功率.对称水印机制需要暴露密钥而易受攻击,传统的对称水印的侵权取证方法因易受攻击,存在取证成功率不高的问题.为了解决上述问题,提出了基于非对称水印的侵权取证方法.对图像加密预处理加密时采用非对称水印嵌入对数字图像进行版权保护,因其在水印提取时密钥不需暴露出来,能够有效抗攻击保护侵权证据,避免了传统方法易受攻击影响的不足,通过完整地提取出侵权图像中的数字水印特征信息,并利用LSH聚类算法最终完成侵权证据的提取,保证了侵权取证的成功率.仿真结果表明,改进方法能够将侵权证据有效提取出来,具有较高的取证成功率,取得了满意的结果.%In the study of digital image tort forensics optimization, the encryption method of digital image encryption pretreatment is directly related to the success rate of follow - up tort forensics. Symmetric watermarking mechanism needs to expose the key and vulnerable, the traditional method of the symmetric watermarking tort forensics is vulnerable, and so the success rate of tort forensics is not high. In order to solve this problem, a method of the tort forensics based on asymmetric watermark was presented. It made use of asymmetric watermarking embedding for digital image copyright protection in image encryption pretreatment, because of keys without exposed in the extraction of watermark. It can effectively resist the attacks to protect evidence of infringement and to avoid the insufficient of the traditional method vulnerable effects, by integrally extracting the digital watermark characteristic information in tort images and making use the clustering algorithm of LSH. Finally, it completed the tort evidence extraction to ensure the success rate of infringement evidence. The simulation results show

  1. Research of the Method Live Forensics Based on Windows%基于Windows系统的开机取证方法研究

    Institute of Scientific and Technical Information of China (English)

    黄文汉

    2012-01-01

      为了方便实现windows系统现场证据的收集。通过根据计算机犯罪现场情况的不同,对在执行开机取证操作时,获取系统数据流程和方法会发生变化情况的研究,给出了基于Windows系统的几种常用的开机取证方法。该方法为有效实施打击计算机犯罪,保障计算机系统信息安全提供有力工具及手段,促进计算机取证技术的实际应用。%  In order to facilitate the implementation of windows system field evidence collection. According to the different situa⁃tion of computer crime scene, in the implementation of the boot forensics operations, access to system data flow and method will change a case study is given based on Windows system, several commonly used starting method of obtaining evidence. The meth⁃od for the effective implementation of safeguard against computer crime, information security of computer system provides pow⁃erful tools and means, promote the practical application of computer forensics technology.

  2. [Prospects for using immunohistochemical methods in forensic medical thanatology].

    Science.gov (United States)

    Bogomolov, D V; Bogomolova, I N; Karavaeva, I E

    2009-01-01

    This review of Russian and foreign literature is focused on the use of immunohistochemical methods in forensic medical practice. It shows that forensic medical specialists not infrequently underestimate the value of these techniques. Recommendations are proposed for a more extensive application of immunohistochemical methods in practical and fundamental medico-legal thanatology.

  3. Novel Selectivity-Based Forensic Toxicological Validation of a Paper Spray Mass Spectrometry Method for the Quantitative Determination of Eight Amphetamines in Whole Blood

    Science.gov (United States)

    Teunissen, Sebastiaan F.; Fedick, Patrick W.; Berendsen, Bjorn J. A.; Nielen, Michel W. F.; Eberlin, Marcos N.; Graham Cooks, R.; van Asten, Arian C.

    2017-09-01

    Paper spray tandem mass spectrometry is used to identify and quantify eight individual amphetamines in whole blood in 1.3 min. The method has been optimized and fully validated according to forensic toxicology guidelines, for the quantification of amphetamine, methamphetamine, 3,4-methylenedioxyamphetamine (MDA), 3,4-methylenedioxy-N-methylamphetamine (MDMA), 3,4-methylenedioxy-N-ethylamphetamine (MDEA), para-methoxyamphetamine (PMA), para-methoxymethamphetamine (PMMA), and 4-fluoroamphetamine (4-FA). Additionally, a new concept of intrinsic and application-based selectivity is discussed, featuring increased confidence in the power to discriminate the amphetamines from other chemically similar compounds when applying an ambient mass spectrometric method without chromatographic separation. Accuracy was within ±15% and average precision was better than 15%, and better than 20% at the LLOQ. Detection limits between 15 and 50 ng/mL were obtained using only 12 μL of whole blood. [Figure not available: see fulltext.

  4. Statistical methods for the forensic analysis of striated tool marks

    Energy Technology Data Exchange (ETDEWEB)

    Hoeksema, Amy Beth [Iowa State Univ., Ames, IA (United States)

    2013-01-01

    In forensics, fingerprints can be used to uniquely identify suspects in a crime. Similarly, a tool mark left at a crime scene can be used to identify the tool that was used. However, the current practice of identifying matching tool marks involves visual inspection of marks by forensic experts which can be a very subjective process. As a result, declared matches are often successfully challenged in court, so law enforcement agencies are particularly interested in encouraging research in more objective approaches. Our analysis is based on comparisons of profilometry data, essentially depth contours of a tool mark surface taken along a linear path. In current practice, for stronger support of a match or non-match, multiple marks are made in the lab under the same conditions by the suspect tool. We propose the use of a likelihood ratio test to analyze the difference between a sample of comparisons of lab tool marks to a field tool mark, against a sample of comparisons of two lab tool marks. Chumbley et al. (2010) point out that the angle of incidence between the tool and the marked surface can have a substantial impact on the tool mark and on the effectiveness of both manual and algorithmic matching procedures. To better address this problem, we describe how the analysis can be enhanced to model the effect of tool angle and allow for angle estimation for a tool mark left at a crime scene. With sufficient development, such methods may lead to more defensible forensic analyses.

  5. Modern instrumental methods in forensic toxicology.

    Science.gov (United States)

    Smith, Michael L; Vorce, Shawn P; Holler, Justin M; Shimomura, Eric; Magluilo, Joe; Jacobs, Aaron J; Huestis, Marilyn A

    2007-06-01

    This article reviews modern analytical instrumentation in forensic toxicology for identification and quantification of drugs and toxins in biological fluids and tissues. A brief description of the theory and inherent strengths and limitations of each methodology is included. The focus is on new technologies that address current analytical limitations. A goal of this review is to encourage innovations to improve our technological capabilities and to encourage use of these analytical techniques in forensic toxicology practice.

  6. Modern Instrumental Methods in Forensic Toxicology*

    Science.gov (United States)

    Smith, Michael L.; Vorce, Shawn P.; Holler, Justin M.; Shimomura, Eric; Magluilo, Joe; Jacobs, Aaron J.; Huestis, Marilyn A.

    2009-01-01

    This article reviews modern analytical instrumentation in forensic toxicology for identification and quantification of drugs and toxins in biological fluids and tissues. A brief description of the theory and inherent strengths and limitations of each methodology is included. The focus is on new technologies that address current analytical limitations. A goal of this review is to encourage innovations to improve our technological capabilities and to encourage use of these analytical techniques in forensic toxicology practice. PMID:17579968

  7. Scenario-Based Digital Forensics Challenges in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Erik Miranda Lopez

    2016-10-01

    Full Text Available The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing create new technical, legal and architectural challenges when conducting a forensic investigation. We propose a hypothetical scenario to uncover and explain the challenges forensic practitioners face during cloud investigations. Additionally, we also provide solutions to address the challenges. Our hypothetical case scenario has shown that, in the long run, better live forensic tools, development of new methods tailored for cloud investigations and new procedures and standards are indeed needed. Furthermore, we have come to the conclusion that forensic investigations biggest challenge is not technical but legal.

  8. Windows Volatile Memory Forensics Based on Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Xiaolu Zhang

    2014-03-01

    Full Text Available In this paper, we present an integrated memory forensic solution for multiple Windows memory images. By calculation, the method can find out the correlation degree among the processes of volatile memory images and the hidden clues behind the events of computers, which is usually difficult to be obtained and easily ignored by analyzing one single memory image and forensic investigators. In order to test the validity, we performed an experiment based on two hosts' memory image which contains criminal incidents. According to the experimental result, we find that the event chains reconstructed by our method are similar to the actual actions in the criminal scene. Investigators can review the digital crime scenario which is contained in the data set by analyzing the experimental results. This paper is aimed at finding the valid actions with illegal attempt and making the memory analysis not to be utterly dependent on the operating system and relevant experts.

  9. [The application of cybernetic modeling methods for the forensic medical personality identification based on the voice and sounding speech characteristics].

    Science.gov (United States)

    Kaganov, A Sh; Kir'yanov, P A

    2015-01-01

    The objective of the present publication was to discuss the possibility of application of cybernetic modeling methods to overcome the apparent discrepancy between two kinds of the speech records, viz. initial ones (e.g. obtained in the course of special investigation activities) and the voice prints obtained from the persons subjected to the criminalistic examination. The paper is based on the literature sources and the materials of original criminalistics expertises performed by the authors.

  10. 基于KNN的Android智能手机微信取证方法%A KNN based forensic method of Android smartphone WeChat

    Institute of Scientific and Technical Information of China (English)

    吴熙曦; 李炳龙; 张天琪

    2014-01-01

    To solve the problem that data of WeChat is so much that data related to the case can’t be found quickly,a Android smart phone WeChat forensic method based KNN algorithm was presented.Word similarity was introduced to calculate the distance of conversations.The conversations would be represented as a vector of feature words and catego-rized with KNN algorithm to quickly find the crime-related data.The experiments verify the feasibility and accuracy of the method.%针对微信数据多,无法从中快速找到与案件相关数据的问题,提出了一种基于KNN(k-nearest neighbor)算法的Android智能手机微信取证方法。引入词语相似度计算会话间的距离,将微信会话表示成特征词的向量,用KNN算法对会话进行分类,迅速找到与犯罪有关的聊天内容,并通过实验验证了该方法的可行性与准确性。

  11. Modern Instrumental Methods in Forensic Toxicology*

    OpenAIRE

    2007-01-01

    This article reviews modern analytical instrumentation in forensic toxicology for identification and quantification of drugs and toxins in biological fluids and tissues. A brief description of the theory and inherent strengths and limitations of each methodology is included. The focus is on new technologies that address current analytical limitations. A goal of this review is to encourage innovations to improve our technological capabilities and to encourage use of these analytical techniques...

  12. 基于人工神经网络方法的钢筋混凝土梁式桥损伤鉴识研究%Reinforced Concrete Beam Bridge's Damage Forensic Research Based on Artificial Neural Network Method

    Institute of Scientific and Technical Information of China (English)

    林立

    2012-01-01

    越来越多的桥梁需要进行损伤维护,面对的首要问题即是如何快速高效地进行损伤鉴定。本文探讨了人工神经网络方法在损伤鉴识方面的可行性,通过对68座钢筋混凝土梁式桥破坏信息的收集整理,建立仿真样本库,训练网络。经过比较选择泛化能力优越的RBF网络,开发了“桥梁工程鉴识专家系统”。利用该系统对一座损伤桥梁进行鉴识分析,良好的效果说明了该系统的有效性以及人工神经网络方法在解决工程鉴识问题方面的卓越能力。%More and more damaged bridges need maintenance. The quick and efficient damage forensic became the most important issue. In this paper, the feasibility of artificial neural network method applicated to the damage forensics was investigated. 68 reinforced concrete girder bridges' damage information was collected for establishment the simulation sample library and training multiple networks. Basing on the compare, the RBF network, because of its generalization, was selected for developing Bridge Engineering Forensic Expert System. The network was used for a damage bridges' forensic. The excellent results demonstrate the effectiveness of the network, and the outstanding ability of artificial neural network method in solving engineering forensic problems.

  13. Routine Outcome Monitoring and Clinical Decision-Making in Forensic Psychiatry Based on the Instrument for Forensic Treatment Evaluation

    Science.gov (United States)

    van der Veeken, Frida C. A.

    2016-01-01

    Background Rehabilitation in forensic psychiatry is achieved gradually with different leave modules, in line with the Risk Need Responsivity model. A forensic routine outcome monitoring tool should measure treatment progress based on the rehabilitation theory, and it should be predictive of important treatment outcomes in order to be usable in decision-making. Therefore, this study assesses the predictive validity for both positive (i.e., leave) and negative (i.e., inpatient incidents) treatment outcomes with the Instrument for Forensic Treatment Evaluation (IFTE). Methods Two-hundred and twenty-four patients were included in this study. ROC analyses were conducted with the IFTE factors and items for three leave modules: guided, unguided and transmural leave for the whole group of patients. Predictive validity of the IFTE for aggression in general, physical aggression specifically, and urine drug screening (UDS) violations was assessed for patients with the main diagnoses in Dutch forensic psychiatry, patients with personality disorders and the most frequently occurring co-morbid disorders: those with combined personality and substance use disorders. Results and Conclusions Results tentatively imply that the IFTE has a reasonable to good predictive validity for inpatient aggression and a marginal to reasonable predictive value for leave approvals and UDS violations. The IFTE can be used for information purposes in treatment decision-making, but reports should be interpreted with care and acknowledge patients’ personal risk factors, strengths and other information sources. PMID:27517721

  14. Internet Forensics Framework Based-on Clustering

    Directory of Open Access Journals (Sweden)

    Imam Riadi

    2013-01-01

    Full Text Available Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS. DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation process to reveal DoS attacks. The framework in this study consists of several steps, among others : logging into the text file and database as well as identifying an attack based on the packet header length. After the identification process, logs are grouped using k-means clustering algorithm into three levels of attack (dangerous, rather dangerous and not dangerous based on port numbers and tcpflags of the package. Based on the test results the proposed framework can be grouped into three level attacks and found the attacker with a success rate of 89,02%, so, it can be concluded that the proposed framework can meet the goals set in this research.

  15. Pattern-based approach for logical traffic isolation forensic modelling

    CSIR Research Space (South Africa)

    Dlamini, I

    2009-08-01

    Full Text Available The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logical Traffic Isolation (LTI) based on Differentiated Services (Diff...

  16. Density-Based LLE Algorithm for Network Forensics Data

    Directory of Open Access Journals (Sweden)

    Peng Tao

    2011-02-01

    Full Text Available In a network forensic system, there are huge amounts of data that should be processed, and the data contains redundant and noisy features causing slow training and testing processes, high resource consumption as well as poor detection rate. In this paper, a schema is proposed to reduce the data of the forensics using manifold learning. Manifold learning is a popular recent approach to nonlinear dimensionality reduction. Algorithms for this task are based on the idea that the dimensionality of many data sets is only artificially high. In this paper, we reduce the forensic data with manifold learning, and test the result of the reduced data.

  17. Evaluating score- and feature-based likelihood ratio models for multivariate continuous data: applied to forensic MDMA comparison

    NARCIS (Netherlands)

    A. Bolck; H. Ni; M. Lopatka

    2015-01-01

    Likelihood ratio (LR) models are moving into the forefront of forensic evidence evaluation as these methods are adopted by a diverse range of application areas in forensic science. We examine the fundamentally different results that can be achieved when feature- and score-based methodologies are emp

  18. Computer Crime Forensics Based on Improved Decision Tree Algorithm

    Directory of Open Access Journals (Sweden)

    Ying Wang

    2014-04-01

    Full Text Available To find out the evidence of crime-related evidence and association rules among massive data, the classic decision tree algorithms such as ID3 for classification analysis have appeared in related prototype systems. So how to make it more suitable for computer forensics in variable environments becomes a hot issue. When selecting classification attributes, ID3 relies on computation of information entropy. Then the attributes owning more value are selected as classification nodes of the decision tress. Such classification is unrealistic under many cases. During the process of ID3 algorithm there are too many logarithms, so it is complicated to handle with the dataset which has various classification attributes. Therefore, contraposing the special demand for computer crime forensics, ID3 algorithm is improved and a novel classification attribute selection method based on Maclaurin-Priority Value First method is proposed. It adopts the foot changing formula and infinitesimal substitution to simplify the logarithms in ID3. For the errors generated in this process, an apposite constant is introduced to be multiplied by the simplified formulas for compensation. The idea of Priority Value First is introduced to solve the problems of value deviation. The performance of improved method is strictly proved in theory. Finally, the experiments verify that our scheme has advantage in computation time and classification accuracy, compared to ID3 and two existing algorithms

  19. Management of inpatient aggression in forensic mental health nursing : the application of the Early Recognition Method

    NARCIS (Netherlands)

    Fluttert, F.A.J.

    2011-01-01

    Management of Inpatient Aggression in Forensic Mental Health Nursing. The application of the Early Recognition Method. Forensic mental health nurses take care of forensic patients convicted for an offense for which they were assessed not to be fully accountable due to their psychiatric disorder. For

  20. Advanced Digital Forensic and Steganalysis Methods

    Science.gov (United States)

    2009-02-01

    M., Kurosawa , K., Kuroki, K., and Saitoh, N.: "Methods for Identification of Images Acquired with Digital Cameras", Proc. of SPIE, Enabling...San Jose, CA, pp. 1J-1K, 2007. 43 [31 ] Kurosawa , K., Kuroki, K., and Saitoh, N.: "CCD Fingerprint Method - Identification of a Video Camera from

  1. Digital Forensics Analysis of Spectral Estimation Methods

    CERN Document Server

    Mataracioglu, Tolga

    2011-01-01

    Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. In today's world, it is widely used in order to secure the information. In this paper, the traditional spectral estimation methods are introduced. The performance analysis of each method is examined by comparing all of the spectral estimation methods. Finally, from utilizing those performance analyses, a brief pros and cons of the spectral estimation methods are given. Also we give a steganography demo by hiding information into a sound signal and manage to pull out the information (i.e, the true frequency of the information signal) from the sound by means of the spectral estimation methods.

  2. A Feature-Based Forensic Procedure for Splicing Forgeries Detection

    Directory of Open Access Journals (Sweden)

    Irene Amerini

    2015-01-01

    Full Text Available Nowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in detecting forgeries in which a portion of an image is cloned somewhere else onto the same image. Anyway such techniques cannot be adopted to deal with splicing attack, that is, when the image portion comes from another picture that then, usually, is not available anymore for an operation of feature match. In this paper, a procedure in which these techniques could also be employed will be shown to get rid of splicing attack by resorting to the use of some repositories of images available on the Internet like Google Images or TinEye Reverse Image Search. Experimental results are presented on some real case images retrieved on the Internet to demonstrate the capacity of the proposed procedure.

  3. MRNA-based skin identification for forensic applications

    NARCIS (Netherlands)

    M. Visser (Mijke); D. Zubakov (Dmitry); K. Ballantyne (Kaye); M.H. Kayser (Manfred)

    2011-01-01

    textabstractAlthough the identification of human skin cells is of important relevance in many forensic cases, there is currently no reliable method available. Here, we present a highly specific and sensitive messenger RNA (mRNA) approach for skin identification, meeting the key requirements in

  4. Content-Based Information Retrieval from Forensic Databases

    NARCIS (Netherlands)

    Geradts, Z.J.M.H.

    2002-01-01

    In forensic science, the number of image databases is growing rapidly. For this reason, it is necessary to have a proper procedure for searching in these images databases based on content. The use of image databases results in more solved crimes; furthermore, statistical information can be obtained

  5. The impact of chimerism in DNA-based forensic sex determination analysis.

    Science.gov (United States)

    George, Renjith; Donald, Preethy Mary; Nagraj, Sumanth Kumbargere; Idiculla, Jose Joy; Hj Ismail, Rashid

    2013-01-01

    Sex determination is the most important step in personal identification in forensic investigations. DNA-based sex determination analysis is comparatively more reliable than the other conventional methods of sex determination analysis. Advanced technology like real-time polymerase chain reaction (PCR) offers accurate and reproducible results and is at the level of legal acceptance. But still there are situations like chimerism where an individual possess both male and female specific factors together in their body. Sex determination analysis in such cases can give erroneous results. This paper discusses the phenomenon of chimerism and its impact on sex determination analysis in forensic investigations.

  6. Quantitative Phase Analysis by the Rietveld Method for Forensic Science.

    Science.gov (United States)

    Deng, Fei; Lin, Xiaodong; He, Yonghong; Li, Shu; Zi, Run; Lai, Shijun

    2015-07-01

    Quantitative phase analysis (QPA) is helpful to determine the type attribute of the object because it could present the content of the constituents. QPA by Rietveld method requires neither measurement of calibration data nor the use of an internal standard; however, the approximate crystal structure of each phase in a mixture is necessary. In this study, 8 synthetic mixtures composed of potassium nitrate and sulfur were analyzed by Rietveld QPA method. The Rietveld refinement was accomplished with a material analysis using diffraction program and evaluated by three agreement indices. Results showed that Rietveld QPA yielded precise results, with errors generally less than 2.0% absolute. In addition, a criminal case which was broken successfully with the help of Rietveld QPA method was also introduced. This method will allow forensic investigators to acquire detailed information of the material evidence, which could point out the direction for case detection and court proceedings.

  7. A new mathematical modelling based shape extraction technique for Forensic Odontology.

    Science.gov (United States)

    G, Jaffino; A, Banumathi; Gurunathan, Ulaganathan; B, Vijayakumari; J, Prabin Jose

    2017-02-28

    Forensic Odontology is a specific means for identifying a person in which deceased, and particularly in fatality incidents. The algorithm can be proposed to identify a person by comparing both postmortem (PM) and antemortem (AM) dental radiographs and photographs. This work aims to introduce a new mathematical algorithm for photographs in addition with radiographs. Isoperimetric graph partitioning method is used to extract the shape of dental images in forensic identification. Shape matching is done by comparing AM and PM dental images using both similarity and distance measures. Experimental results prove that the higher matching distance is observed by distance metric rather than similarity measures. The results of this algorithm show that a high hit rate is observed for distance based performance measures and it is well suited for forensic odontologist to identify a person.

  8. Present and Future of Forensics in the Research Based Communication Department.

    Science.gov (United States)

    Scott, Craig R.; Birkholt, Marty J.

    The social scientific research focus of major United States universities places the forensics programs at these institutions in a unique position. Three areas of tension between forensics and research based communication departments are as follows: research quality/utility, applicability of forensic training, and resource conflicts. Solutions to…

  9. Content based Image Retrieval from Forensic Image Databases

    Directory of Open Access Journals (Sweden)

    Swati A. Gulhane

    2015-03-01

    Full Text Available Due to the proliferation of video and image data in digital form, Content based Image Retrieval has become a prominent research topic. In forensic sciences, digital data have been widely used such as criminal images, fingerprints, scene images and so on. Therefore, the arrangement of such large image data becomes a big issue such as how to get an interested image fast. There is a great need for developing an efficient technique for finding the images. In order to find an image, image has to be represented with certain features. Color, texture and shape are three important visual features of an image. Searching for images using color, texture and shape features has attracted much attention. There are many content based image retrieval techniques in the literature. This paper gives the overview of different existing methods used for content based image retrieval and also suggests an efficient image retrieval method for digital image database of criminal photos, using dynamic dominant color, texture and shape features of an image which will give an effective retrieval result.

  10. Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics.

    Science.gov (United States)

    Ruffell, Alastair

    2010-10-10

    We now have a confusing set of five commonly used terms for the application of Earth evidence in forensic science. This confusion is resulting in Earth scientists who use these methods mentioning different terms, sometimes for the same type of study. Likewise, forensic scientists, police/law enforcement officers and those employed by courts of law are becoming confused as to what each term means. A nomenclatural framework (based on the first use of each term) is proposed to encourage consistency in the use of terminology. Generally, the number of Earth science applications has grown through time, from soil and sediment analysis to remote sensing and GIS. The issue of where forensic biology and microbiology sits with these uses of Earth evidence is considered.

  11. EFFECTS OF RADIATION ON ESTABLISHED FORENSIC EVIDENCE CONTAINMENT METHODS

    Energy Technology Data Exchange (ETDEWEB)

    Ferguson, C.; Duff, M.; Clark, E.; Chapman, G.

    2010-11-29

    The Federal Bureau of Investigation (FBI) Laboratory is currently exploring needs and protocols for the storage of evidentiary items contaminated with radioactive material. While a large body of knowledge on the behavior of storage polymers in radiation fields exists, this knowledge has not been applied to the field of forensics and maintaining evidentiary integrity. The focus of this research was to evaluate the behavior of several traditional evidentiary containment polymers when exposed to significant alpha, beta, gamma, neutron and mixed radiation sources. Doses were designed to simulate exposures possible during storage of materials. Several products were found to be poorly suited for use in this specific application based on standardized mechanical testing results. Remaining products were determined to warrant further investigation for the storage of radiologically contaminated evidence.

  12. Identification of forensic samples by using an infrared-based automatic DNA sequencer.

    Science.gov (United States)

    Ricci, Ugo; Sani, Ilaria; Klintschar, Michael; Cerri, Nicoletta; De Ferrari, Francesco; Giovannucci Uzielli, Maria Luisa

    2003-06-01

    We have recently introduced a new protocol for analyzing all core loci of the Federal Bureau of Investigation's (FBI) Combined DNA Index System (CODIS) with an infrared (IR) automatic DNA sequencer (LI-COR 4200). The amplicons were labeled with forward oligonucleotide primers, covalently linked to a new infrared fluorescent molecule (IRDye 800). The alleles were displayed as familiar autoradiogram-like images with real-time detection. This protocol was employed for paternity testing, population studies, and identification of degraded forensic samples. We extensively analyzed some simulated forensic samples and mixed stains (blood, semen, saliva, bones, and fixed archival embedded tissues), comparing the results with donor samples. Sensitivity studies were also performed for the four multiplex systems. Our results show the efficiency, reliability, and accuracy of the IR system for the analysis of forensic samples. We also compared the efficiency of the multiplex protocol with ultraviolet (UV) technology. Paternity tests, undegraded DNA samples, and real forensic samples were analyzed with this approach based on IR technology and with UV-based automatic sequencers in combination with commercially-available kits. The comparability of the results with the widespread UV methods suggests that it is possible to exchange data between laboratories using the same core group of markers but different primer sets and detection methods.

  13. Practical aspects of DNA-based forensic studies in dentistry.

    Science.gov (United States)

    Muruganandhan, J; Sivakumar, G

    2011-01-01

    Forensic dentistry as a science has evolved from simple methods of age estimation and bite-mark analysis, to a new era of genetic and serological investigations. DNA analysis in forensic science requires a sample or source from either an individual (living or dead) or a crime/incident site. The orofacial region is a good source of such material, due to the fact that certain oral tissues are relatively resistant to environmental degradation and destruction by thermal, electrical, and mechanical insult. Dentists may be called upon to provide samples and expert analysis in many such situations. Sources include soft and hard tissues of teeth and jaws, saliva, biopsy material, and mucosal swabs. Tissue samples should be handled with care, and correct protocol in collection and preparation has to be followed. This ensures a high yield of the required DNA. Hard tissues like teeth require specialized procedures to extract the genetic material. Research has shown that there is a wide variation in the quality and quantity of DNA extracted from different individuals from the same site even under similar conditions. This necessitates calibration of the various methods to achieve best results. DNA analysis can provide highly accurate identification if used correctly. Here a description of the various sources in the oral region has been provided from which samples could be forwarded to the forensic laboratory. Most commonly employed techniques of collection and handling for laboratory procedures have been outlined.

  14. Practical aspects of DNA-based forensic studies in dentistry

    Science.gov (United States)

    Muruganandhan, J; Sivakumar, G

    2011-01-01

    Forensic dentistry as a science has evolved from simple methods of age estimation and bite-mark analysis, to a new era of genetic and serological investigations. DNA analysis in forensic science requires a sample or source from either an individual (living or dead) or a crime/incident site. The orofacial region is a good source of such material, due to the fact that certain oral tissues are relatively resistant to environmental degradation and destruction by thermal, electrical, and mechanical insult. Dentists may be called upon to provide samples and expert analysis in many such situations. Sources include soft and hard tissues of teeth and jaws, saliva, biopsy material, and mucosal swabs. Tissue samples should be handled with care, and correct protocol in collection and preparation has to be followed. This ensures a high yield of the required DNA. Hard tissues like teeth require specialized procedures to extract the genetic material. Research has shown that there is a wide variation in the quality and quantity of DNA extracted from different individuals from the same site even under similar conditions. This necessitates calibration of the various methods to achieve best results. DNA analysis can provide highly accurate identification if used correctly. Here a description of the various sources in the oral region has been provided from which samples could be forwarded to the forensic laboratory. Most commonly employed techniques of collection and handling for laboratory procedures have been outlined. PMID:22022138

  15. Ascertaining year of birth/age at death in forensic cases: A review of conventional methods and methods allowing for absolute chronology

    DEFF Research Database (Denmark)

    Lynnerup, Niels; Kjeldsen, H; Zweihoff, R;

    2010-01-01

    of birth) is often a fundamental piece of data in connection with forensic identification of unidentified bodies. The methods most often used are based on determining various morphological, age-related, changes on the skeleton (or teeth, although odontological methods are not reviewed in this paper......Based on an actual case, where we were able to ascertain the year of birth of three dead babies found in a deep-freezer to within 1–2 years (1986, 1988 and 2004, respectively), we review the current state of forensic age determination/year of birth determination. The age of an individual (year...

  16. Signature Based Detection of User Events for Post-mortem Forensic Analysis

    Science.gov (United States)

    James, Joshua Isaac; Gladyshev, Pavel; Zhu, Yuandong

    This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a system. Traditional forensic analysis and the inferences an investigator normally makes when given digital evidence, are examined. It is then demonstrated that this natural process of inferring high-level events from low-level traces may be encoded using signature-matching techniques. Simple signatures using the defined method are created and applied for three popular Windows-based programs as a proof of concept.

  17. The impact of chimerism in DNA-based forensic sex determination analysis

    OpenAIRE

    George, Renjith; Donald, Preethy Mary; Nagraj, Sumanth Kumbargere; Idiculla, Jose Joy; Hj Ismail, Rashid

    2013-01-01

    Sex determination is the most important step in personal identification in forensic investigations. DNA-based sex determination analysis is comparatively more reliable than the other conventional methods of sex determination analysis. Advanced technology like real-time polymerase chain reaction (PCR) offers accurate and reproducible results and is at the level of legal acceptance. But still there are situations like chimerism where an individual possess both male and female specific factors t...

  18. Analyzing forensic evidence based on density with magnetic levitation.

    Science.gov (United States)

    Lockett, Matthew R; Mirica, Katherine A; Mace, Charles R; Blackledge, Robert D; Whitesides, George M

    2013-01-01

    This paper describes a method for determining the density of contact trace objects with magnetic levitation (MagLev). MagLev measurements accurately determine the density (± 0.0002 g/cm(3) ) of a diamagnetic object and are compatible with objects that are nonuniform in shape and size. The MagLev device (composed of two permanent magnets with like poles facing) and the method described provide a means of accurately determining the density of trace objects. This method is inexpensive, rapid, and verifiable and provides numerical values--independent of the specific apparatus or analyst--that correspond to the absolute density of the sample that may be entered into a searchable database. We discuss the feasibility of MagLev as a possible means of characterizing forensic-related evidence and demonstrate the ability of MagLev to (i) determine the density of samples of glitter and gunpowder, (ii) separate glitter particles of different densities, and (iii) determine the density of a glitter sample that was removed from a complex sample matrix. © 2012 American Academy of Forensic Sciences.

  19. An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps.

    Science.gov (United States)

    Cahyani, Niken Dwi Wahyu; Martini, Ben; Choo, Kim-Kwang Raymond; Ab Rahman, Nurul Hidayah; Ashman, Helen

    2017-08-17

    Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence-based forensic taxonomy of Windows Phone communication apps, using an existing two-dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps. © 2017 American Academy of Forensic Sciences.

  20. Accuracy of age estimation methods from orthopantomograph in forensic odontology: a comparative study.

    Science.gov (United States)

    Khorate, Manisha M; Dinkar, A D; Ahmed, Junaid

    2014-01-01

    Changes related to chronological age are seen in both hard and soft tissue. A number of methods for age estimation have been proposed which can be classified in four categories, namely, clinical, radiological, histological and chemical analysis. In forensic odontology, age estimation based on tooth development is universally accepted method. The panoramic radiographs of 500 healthy Goan, Indian children (250 boys and 250 girls) aged between 4 and 22.1 years were selected. Modified Demirjian's method (1973/2004), Acharya AB formula (2011), Dr Ajit D. Dinkar (1984) regression equation, Foti and coworkers (2003) formula (clinical and radiological) were applied for estimation of age. The result of our study has shown that Dr Ajit D. Dinkar method is more accurate followed by Acharya Indian-specific formula. Furthermore, in this study by applying all these methods to one regional population, we have attempted to present dental age estimation methodology best suited for the Goan Indian population.

  1. A method of detecting re-sampling based on expectation maximization applied in audio blind forensics%音频盲取证中一种基于EM的重采样检测方法

    Institute of Scientific and Technical Information of China (English)

    陈雁翔; 吴玺

    2012-01-01

    盲取证指针对篡改信号无需添加任何附加信息就可鉴别出信号的真伪,而音频篡改中篡改者经常利用重采样以达到更好的篡改效果,因此重采样检测作为音频盲取证的重要组成部分得到了高度的重视.对信号的重采样会引入相关性,这种相关性是周期出现的,本文通过基于期望最大化的检测方法揭示这种相关性,并通过判断这种相关性是否呈现周期性达到检测目的.在检测流程中采取了奇异防止、低频段去除、归一化三阶原点矩等措施,达到了更好的检测效果.实验验证了该方法对于各种插值函数的鲁棒性,以及不同重采样率下和音频拼接篡改时检测的有效性.%Blind forensics can discriminate such tampered signal without any additional information. During the audio tampering tampers often use re-sampling to achieve better results, thus re-sampling detection obtained the high value as an important aspect of blind forensics. Re-sampling will introduce correlation and this relationship is often periodic. We use method based on Expectation Maximization to reveal the correlation and reach the purpose of detection by checking whether the correlation is periodic. To achieve better effect, we also take the steps of singularity prevention, low-band elimination and normalized 3-order origin moment. The experiment results show the robustness of interpolating functions, and the validity of detection under different re-sampling rates as well as during splice tampering.

  2. Considerations for Ship Design and Forensics Based Upon Modern Advances in Nonlinear Waves

    Science.gov (United States)

    Osborne, Alfred

    2013-04-01

    My recent activities for Nonlinear Waves Research Corporation have lead to a number of new advances in ocean surface waves that have been applied to the reanalysis and forensics of sunken ships. The methods are based upon progress in the physical understanding of ocean waves and have required a number of breakthroughs requiring applications of algebraic geometry, topology and differential geometry. This work has provided a number of new tools for the forecasting/hindcasting of wind waves (including the prediction of rogue waves), for the deterministic simulation of ocean waves (including both the Type I and Type II instabilities) and for the statistical behavior of ocean waves. These approaches have lead to procedures for the determination of the design wave for ships and for the forensics of sunken ships in past storms. I give examples of how these approaches have been applied.

  3. DNA-based identification of forensically important Australian Sarcophagidae (Diptera).

    Science.gov (United States)

    Meiklejohn, Kelly A; Wallman, James F; Dowton, Mark

    2011-01-01

    The utility of the forensically important Sarcophagidae (Diptera) for time since death estimates has been severely limited, as morphological identification is difficult and thermobiological histories are inadequately documented. A molecular identification method involving the sequencing of a 658-bp 'barcode' fragment of the mitochondrial cytochrome oxidase subunit I (COI) gene from 85 specimens, representing 16 Australian species from varying populations, was evaluated. Nucleotide sequence divergences were calculated using the Kimura-two-parameter distance model and a neighbour-joining phylogenetic tree generated. All species were resolved as reciprocally monophyletic, except Sarcophaga dux. Intraspecific and interspecific variation ranged from 0.000% to 1.499% (SE = 0.044%) and 6.658% to 8.983% (SE = 0.653%), respectively. The COI 'barcode' sequence was found to be suitable for the molecular identification of the studied Australian Sarcophagidae: 96.5% of the examined specimens were assigned to the correct species. Given that the sarcophagid fauna is poorly described, it is feasible that the few incorrectly assigned specimens represent cryptic species. The results of this research will be instrumental for implementation of the Australian Sarcophagidae in forensic entomology.

  4. Introducing the Forensic Research/Reference on Genetics knowledge base, FROG-kb

    Directory of Open Access Journals (Sweden)

    Rajeevan Haseena

    2012-09-01

    Full Text Available Abstract Background Online tools and databases based on multi-allelic short tandem repeat polymorphisms (STRPs are actively used in forensic teaching, research, and investigations. The Fst value of each CODIS marker tends to be low across the populations of the world and most populations typically have all the common STRP alleles present diminishing the ability of these systems to discriminate ethnicity. Recently, considerable research is being conducted on single nucleotide polymorphisms (SNPs to be considered for human identification and description. However, online tools and databases that can be used for forensic research and investigation are limited. Methods The back end DBMS (Database Management System for FROG-kb is Oracle version 10. The front end is implemented with specific code using technologies such as Java, Java Servlet, JSP, JQuery, and GoogleCharts. Results We present an open access web application, FROG-kb (Forensic Research/Reference on Genetics-knowledge base, http://frog.med.yale.edu, that is useful for teaching and research relevant to forensics and can serve as a tool facilitating forensic practice. The underlying data for FROG-kb are provided by the already extensively used and referenced ALlele FREquency Database, ALFRED (http://alfred.med.yale.edu. In addition to displaying data in an organized manner, computational tools that use the underlying allele frequencies with user-provided data are implemented in FROG-kb. These tools are organized by the different published SNP/marker panels available. This web tool currently has implemented general functions possible for two types of SNP panels, individual identification and ancestry inference, and a prediction function specific to a phenotype informative panel for eye color. Conclusion The current online version of FROG-kb already provides new and useful functionality. We expect FROG-kb to grow and expand in capabilities and welcome input from the forensic community in

  5. Introducing the Forensic Research/Reference on Genetics knowledge base, FROG-kb

    Science.gov (United States)

    2012-01-01

    Background Online tools and databases based on multi-allelic short tandem repeat polymorphisms (STRPs) are actively used in forensic teaching, research, and investigations. The Fst value of each CODIS marker tends to be low across the populations of the world and most populations typically have all the common STRP alleles present diminishing the ability of these systems to discriminate ethnicity. Recently, considerable research is being conducted on single nucleotide polymorphisms (SNPs) to be considered for human identification and description. However, online tools and databases that can be used for forensic research and investigation are limited. Methods The back end DBMS (Database Management System) for FROG-kb is Oracle version 10. The front end is implemented with specific code using technologies such as Java, Java Servlet, JSP, JQuery, and GoogleCharts. Results We present an open access web application, FROG-kb (Forensic Research/Reference on Genetics-knowledge base, http://frog.med.yale.edu), that is useful for teaching and research relevant to forensics and can serve as a tool facilitating forensic practice. The underlying data for FROG-kb are provided by the already extensively used and referenced ALlele FREquency Database, ALFRED (http://alfred.med.yale.edu). In addition to displaying data in an organized manner, computational tools that use the underlying allele frequencies with user-provided data are implemented in FROG-kb. These tools are organized by the different published SNP/marker panels available. This web tool currently has implemented general functions possible for two types of SNP panels, individual identification and ancestry inference, and a prediction function specific to a phenotype informative panel for eye color. Conclusion The current online version of FROG-kb already provides new and useful functionality. We expect FROG-kb to grow and expand in capabilities and welcome input from the forensic community in identifying datasets and

  6. Forensic Science--Where Scientific Methods Are Utilized to Fight the Crime.

    Science.gov (United States)

    Lee, Henry C.

    1980-01-01

    Describes various scientific techniques used to analyze physical evidence, ten areas of specialization in forensic science, courses needed by forensic scientists, and the future of forensic science. (DS)

  7. Forensic Science--Where Scientific Methods Are Utilized to Fight the Crime.

    Science.gov (United States)

    Lee, Henry C.

    1980-01-01

    Describes various scientific techniques used to analyze physical evidence, ten areas of specialization in forensic science, courses needed by forensic scientists, and the future of forensic science. (DS)

  8. Testing photogrammetry-based techniques for three-dimensional surface documentation in forensic pathology.

    Science.gov (United States)

    Urbanová, Petra; Hejna, Petr; Jurda, Mikoláš

    2015-05-01

    Three-dimensional surface technologies particularly close range photogrammetry and optical surface scanning have recently advanced into affordable, flexible and accurate techniques. Forensic postmortem investigation as performed on a daily basis, however, has not yet fully benefited from their potentials. In the present paper, we tested two approaches to 3D external body documentation - digital camera-based photogrammetry combined with commercial Agisoft PhotoScan(®) software and stereophotogrammetry-based Vectra H1(®), a portable handheld surface scanner. In order to conduct the study three human subjects were selected, a living person, a 25-year-old female, and two forensic cases admitted for postmortem examination at the Department of Forensic Medicine, Hradec Králové, Czech Republic (both 63-year-old males), one dead to traumatic, self-inflicted, injuries (suicide by hanging), the other diagnosed with the heart failure. All three cases were photographed in 360° manner with a Nikon 7000 digital camera and simultaneously documented with the handheld scanner. In addition to having recorded the pre-autopsy phase of the forensic cases, both techniques were employed in various stages of autopsy. The sets of collected digital images (approximately 100 per case) were further processed to generate point clouds and 3D meshes. Final 3D models (a pair per individual) were counted for numbers of points and polygons, then assessed visually and compared quantitatively using ICP alignment algorithm and a cloud point comparison technique based on closest point to point distances. Both techniques were proven to be easy to handle and equally laborious. While collecting the images at autopsy took around 20min, the post-processing was much more time-demanding and required up to 10h of computation time. Moreover, for the full-body scanning the post-processing of the handheld scanner required rather time-consuming manual image alignment. In all instances the applied approaches

  9. The Development of Interactive World Wide Web Based Teaching Material in Forensic Science.

    Science.gov (United States)

    Daeid, Niamh Nic

    2001-01-01

    Describes the development of a Web-based tutorial in the forensic science teaching program at the University of Strathclyde (Scotland). Highlights include the theoretical basis for course development; objectives; Web site design; student feedback; and staff feedback. (LRW)

  10. The Development of Interactive World Wide Web Based Teaching Material in Forensic Science.

    Science.gov (United States)

    Daeid, Niamh Nic

    2001-01-01

    Describes the development of a Web-based tutorial in the forensic science teaching program at the University of Strathclyde (Scotland). Highlights include the theoretical basis for course development; objectives; Web site design; student feedback; and staff feedback. (LRW)

  11. Likelihood ratio data to report the validation of a forensic fingerprint evaluation method.

    Science.gov (United States)

    Ramos, Daniel; Haraksim, Rudolf; Meuwly, Didier

    2017-02-01

    Data to which the authors refer to throughout this article are likelihood ratios (LR) computed from the comparison of 5-12 minutiae fingermarks with fingerprints. These LRs data are used for the validation of a likelihood ratio (LR) method in forensic evidence evaluation. These data present a necessary asset for conducting validation experiments when validating LR methods used in forensic evidence evaluation and set up validation reports. These data can be also used as a baseline for comparing the fingermark evidence in the same minutiae configuration as presented in (D. Meuwly, D. Ramos, R. Haraksim,) [1], although the reader should keep in mind that different feature extraction algorithms and different AFIS systems used may produce different LRs values. Moreover, these data may serve as a reproducibility exercise, in order to train the generation of validation reports of forensic methods, according to [1]. Alongside the data, a justification and motivation for the use of methods is given. These methods calculate LRs from the fingerprint/mark data and are subject to a validation procedure. The choice of using real forensic fingerprint in the validation and simulated data in the development is described and justified. Validation criteria are set for the purpose of validation of the LR methods, which are used to calculate the LR values from the data and the validation report. For privacy and data protection reasons, the original fingerprint/mark images cannot be shared. But these images do not constitute the core data for the validation, contrarily to the LRs that are shared.

  12. Autopsy practice in forensic pathology - Evidence-based or experience-based?

    DEFF Research Database (Denmark)

    Colville-Ebeling, Bonnie; Freeman, Michael; Banner, Jytte

    2014-01-01

    -gathering and the use of check lists specific to certain injury causes are likely to result in less deviation from evidence-based practices in forensic pathology. Pre-autopsy data-gathering and check lists will help ensure a higher degree of standardization in autopsy reports thus enhancing the quality and accuracy...

  13. Application of Fuzzy C-Means Clustering Algorithm Based on Particle Swarm Optimization in Computer Forensics

    Science.gov (United States)

    Wang, Deguang; Han, Baochang; Huang, Ming

    Computer forensics is the technology of applying computer technology to access, investigate and analysis the evidence of computer crime. It mainly include the process of determine and obtain digital evidence, analyze and take data, file and submit result. And the data analysis is the key link of computer forensics. As the complexity of real data and the characteristics of fuzzy, evidence analysis has been difficult to obtain the desired results. This paper applies fuzzy c-means clustering algorithm based on particle swarm optimization (FCMP) in computer forensics, and it can be more satisfactory results.

  14. Microchip-based forensic short tandem repeat genotyping.

    Science.gov (United States)

    Kim, Yong Tae; Heo, Hyun Young; Oh, Shin Hye; Lee, Seung Hwan; Kim, Do Hyun; Seo, Tae Seok

    2015-08-01

    Micro total analysis system (μTAS) or lab-on-a-chip (LOC) technology has advanced over decades, and the high performance for chemical and biological analysis has been well demonstrated with advantages of low sample consumption, rapid analysis time, high-throughput screening, and portability. In particular, μTAS or LOC based genetic applications have been extensively explored, and the short tandem repeat (STR) typing on a chip has garnered attention in the forensic community due to its special use for human identification in the field of mass disaster and missing person investigation, paternity testing, and perpetrator identification. The STR typing process consists of sample collection, DNA extraction, DNA quantitation, STR loci amplification, capillary electrophoretic separation, and STR profiling. Recent progress of microtechnology shows its ability to substitute the conventional analytical tools, and furthermore demonstrates total integration of the whole STR processes on a single wafer for on-site STR typing. In this review article, we highlighted some representative results for fluorescence labeling techniques, microchip-based DNA purification, on-chip polymerase chain reaction (PCR), a capillary electrophoretic microdevice, and a fully integrated microdevice for STR typing.

  15. The transferability of diatoms to clothing and the methods appropriate for their collection and analysis in forensic geoscience.

    Science.gov (United States)

    Scott, Kirstie R; Morgan, Ruth M; Jones, Vivienne J; Cameron, Nigel G

    2014-08-01

    Forensic geoscience is concerned with the analysis of geological materials in order to compare and exclude environmental samples from a common source, or to identify an unknown provenance in a criminal investigation. Diatom analysis is currently an underused technique within the forensic geoscience approach, which has the potential to provide an independent ecological assessment of trace evidence. This study presents empirical data to provide a preliminary evidence base in order to be able to understand the nature of diatom transfers to items of clothing, and the collection of transferred diatom trace evidence from a range of environments under experimental conditions. Three diatom extraction methods were tested on clothing that had been in contact with soil and water sites: rinsing in water (RW), rinsing in ethanol (RE), and submersion in H2O2 solution (H). Scanning electron microscopy (S.E.M.) analysis was undertaken in order to examine the degree of diatom retention on treated clothing samples. The total diatom yield and species richness data was recorded from each experimental sample in order to compare the efficacy of each method in collecting a representative sample for analysis. Similarity was explored using correspondence analysis. The results highlight the efficiency of H2O2 submersion in consistently extracting high diatom counts with representative species from clothing exposed to both aquatic and terrestrial sites. This is corroborated by S.E.M. analysis. This paper provides an important empirical evidence base for both establishing that diatoms do indeed transfer to clothing under forensic conditions in a range of environments, and in identifying that H2O2 extraction is the most efficient technique for the optimal collection of comparative samples. There is therefore potentially great value in collecting and analysing diatom components of geoforensic samples in order to aid in forensic investigation.

  16. A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation

    NARCIS (Netherlands)

    Meuwly, Didier; Ramos, Daniel; Haraksim, Rudolf

    2016-01-01

    This Guideline proposes a protocol for the validation of forensic evaluation methods at the source level, using the Likelihood Ratio framework as defined within the Bayes’ inference model. In the context of the inference of identity of source, the Likelihood Ratio is used to evaluate the strength of

  17. Limitations in forensic odontology

    Directory of Open Access Journals (Sweden)

    B Kavitha

    2009-01-01

    Full Text Available The concept of using dental evidence in forensic investigation has kindled so much interest in the recent past that forensic odontology is even suggested as the single positive identification method to solve certain forensic cases. In this process, the shortcomings in forensic odontology though few are overlooked. These discrepancies associated with various methods are to be weighed cautiously to make forensic odontology a more accurate, reliable, and reproducible investigatory science. In this paper, we present our understanding of the limitations in various methods employed in forensic odontology.

  18. Mass spectrometric base composition profiling: Implications for forensic mtDNA databasing☆

    Science.gov (United States)

    Eduardoff, Mayra; Huber, Gabriela; Bayer, Birgit; Schmid, Dagmar; Anslinger, Katja; Göbel, Tanja; Zimmermann, Bettina; Schneider, Peter M.; Röck, Alexander W.; Parson, Walther

    2013-01-01

    In forensic genetics mitochondrial DNA (mtDNA) is usually analyzed by direct Sanger-type sequencing (STS). This method is known to be laborious and sometimes prone to human error. Alternative methods have been proposed that lead to faster results. Among these are methods that involve mass-spectrometry resulting in base composition profiles that are, by definition, less informative than the full nucleotide sequence. Here, we applied a highly automated electrospray ionization mass spectrometry (ESI-MS) system (PLEX-ID) to an mtDNA population study to compare its performance with respect to throughput and concordance to STS. We found that the loss of information power was relatively low compared to the gain in speed and analytical standardization. The detection of point and length heteroplasmy turned out to be roughly comparable between the technologies with some individual differences related to the processes. We confirm that ESI-MS provides a valuable platform for analyzing mtDNA variation that can also be applied in the forensic context. PMID:24054029

  19. A novel method for detecting light source for digital images forensic

    Science.gov (United States)

    Roy, A. K.; Mitra, S. K.; Agrawal, R.

    2011-06-01

    Manipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.

  20. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2009-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  1. Nonlethal method for forensic evaluation of aldicarb exposure in wildlife.

    Science.gov (United States)

    Cobb, G P; Harper, F D; Weisskopf, C P

    2001-01-01

    Forensic evaluation of aldicarb exposure is difficult due to the rapid hydrolysis and oxidation of the parent compound. Oxidation products-aldicarb sulfoxide and aldicarb sulfone-are commonly analyzed, but hydrolytic products-aldicarb nitrile, aldicarb nitrile sulfoxide, aldicarb nitrile sulfone-are infrequently analyzed even though they are the primary stable products of aldicarb degradation. Nitrile analyses provide an important avenue to verify aldicarb exposure or aldicarb-induced mortality. Our aproach allows lethal and sublethal exposure assessment. Extraction of samples with acetonitrile:water is followed by chromatographic determination. Sublethal exposure assessment utilizes excreta samples, which is nonlethal and requires holding animals in captivity for 12 h or less. Sublethal exposures of northern bobwhite Colinus virginianus to aldicarb can be identified with greater than 80% confidence for 6 h after dosing. By analyzing GI tracts, lethal exposures of bobwhite to aldicarb can be identified with greater than 90% confidence for 4 days post mortem and with 75% confidence for 8 days post mortem. Sublethal exposures to aldicarb was identified in greater than 80% of Peromyscus maniculatis for 6 h after dosing. Aldicarb and its transformation products were detected for 8 days post mortem in all mice that received aldicarb doses at or above the LD50.

  2. Introducing a semi-automatic method to simulate large numbers of forensic fingermarks for research on fingerprint identification.

    Science.gov (United States)

    Rodriguez, Crystal M; de Jongh, Arent; Meuwly, Didier

    2012-03-01

    Statistical research on fingerprint identification and the testing of automated fingerprint identification system (AFIS) performances require large numbers of forensic fingermarks. These fingermarks are rarely available. This study presents a semi-automatic method to create simulated fingermarks in large quantities that model minutiae features or images of forensic fingermarks. This method takes into account several aspects contributing to the variability of forensic fingermarks such as the number of minutiae, the finger region, and the elastic deformation of the skin. To investigate the applicability of the simulated fingermarks, fingermarks have been simulated with 5-12 minutiae originating from different finger regions for six fingers. An AFIS matching algorithm was used to obtain similarity scores for comparisons between the minutiae configurations of fingerprints and the minutiae configurations of simulated and forensic fingermarks. The results showed similar scores for both types of fingermarks suggesting that the simulated fingermarks are good substitutes for forensic fingermarks.

  3. Evidence based practice: laboratory feedback informs forensic specimen collection in NSW.

    Science.gov (United States)

    Nittis, Maria; Stark, Margaret

    2014-07-01

    The importance of having clear, evidence-based guidelines for the taking of forensic samples from suspects detained in police custody (persons of interest) and complainants of crime is essential for forensic practitioners. The need for such guidelines was seen as desirable in New South Wales (NSW) and a working group was set up comprising scientists, practitioners and police. Feedback from the laboratory regarding the results of the specimens taken by forensic practitioners throughout the State was received and analysed. This has resulted in changes to current practice and highlighted the need for further research in this area. It has also highlighted areas that have not changed in response to evidence A quality service demands transparency, process review, relevant research and feedback in order to progress. Examiners need to obtain the results for their cases in order to reinforce the value of the service they provide as well as to monitor and, where necessary, improve their forensic collection skills.

  4. An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2008-09-01

    Full Text Available The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two most commonly used Windows-based computer forensics applications on a Macintosh running Windows XP in native mode and in two virtual environments relative to a similarly configured Dell personal computer. The research results are directly beneficial to practitioners, and the process illustrates affective pedagogy whereby students were engaged in applied research.

  5. [Advancement in methods of evaluation on bone fracture healing and its application in forensic medicine].

    Science.gov (United States)

    Li, Yu-fei

    2011-02-01

    It is frequently encountered to identify the time of bone fracture in forensic medicine. Hence it is important to develop the methods for evaluating the time of bone fracture. This article reviews the applications and values of the methods such as ultrasonic evaluation, impulse measurement, digital imaging technology and bone mineral density testing technology, etc. It is proposed that to use these methods jointly may provide more scientific evidence in determine the time of bone fracture.

  6. Mass-Spectrometry-Based Proteomics Reveals Organ-Specific Expression Patterns To Be Used as Forensic Evidence.

    Science.gov (United States)

    Dammeier, Sascha; Nahnsen, Sven; Veit, Johannes; Wehner, Frank; Ueffing, Marius; Kohlbacher, Oliver

    2016-01-04

    Standard forensic procedures to examine bullets after an exchange of fire include a mechanical or ballistic reconstruction of the event. While this is routine to identify which projectile hit a subject by DNA analysis of biological material on the surface of the projectile, it is rather difficult to determine which projectile caused the lethal injury--often the crucial point with regard to legal proceedings. With respect to fundamental law it is the duty of the public authority to make every endeavor to solve every homicide case. To improve forensic examinations, we present a forensic proteomic method to investigate biological material from a projectile's surface and determine the tissues traversed by it. To obtain a range of relevant samples, different major bovine organs were penetrated with projectiles experimentally. After tryptic "on-surface" digestion, mass-spectrometry-based proteome analysis, and statistical data analysis, we were able to achieve a cross-validated organ classification accuracy of >99%. Different types of anticipated external variables exhibited no prominent influence on the findings. In addition, shooting experiments were performed to validate the results. Finally, we show that these concepts could be applied to a real case of murder to substantially improve the forensic reconstruction.

  7. Forensic DNA and bioinformatics

    National Research Council Canada - National Science Library

    Bianchi, Lucia; Liò, Pietro

    The field of forensic science is increasingly based on biomolecular data and many European countries are establishing forensic databases to store DNA profiles of crime scenes of known offenders and apply DNA testing...

  8. Teaching and learning based on peer review: a realistic approach in forensic sciences.

    Science.gov (United States)

    Dinis-Oliveira, Ricardo Jorge; Magalhães, Teresa

    2016-01-01

    Teaching and learning methods need a continuous upgrade in higher education. However it is also true that some of the modern methodologies do not reduce or prevent school failure. Perhaps the real limitation is the inability to identify the true reasons that may explain it or ignore/undervalue the problem. In our opinion, one of the current constraints of the teaching/learning process is the excess of and inadequate bibliography recommended by the teacher, which results in continuous student difficulties and waste of time in searching and selecting useful information. The need to change the paradigm of the teaching/learning process comes also from employers. They claim forensic experts armed with useful knowledge to face professional life. It is therefore mandatory to identify the new needs and opportunities regarding pedagogical methodologies. This article reflects on the recent importance of peer review in teaching/learning forensic sciences based on the last 10 years of pedagogical experience inseparably from the scientific activity.

  9. Teaching and learning based on peer review: a realistic approach in forensic sciences

    Science.gov (United States)

    Dinis-Oliveira, Ricardo Jorge; Magalhães, Teresa

    2016-01-01

    Teaching and learning methods need a continuous upgrade in higher education. However it is also true that some of the modern methodologies do not reduce or prevent school failure. Perhaps the real limitation is the inability to identify the true reasons that may explain it or ignore/undervalue the problem. In our opinion, one of the current constraints of the teaching/learning process is the excess of and inadequate bibliography recommended by the teacher, which results in continuous student difficulties and waste of time in searching and selecting useful information. The need to change the paradigm of the teaching/learning process comes also from employers. They claim forensic experts armed with useful knowledge to face professional life. It is therefore mandatory to identify the new needs and opportunities regarding pedagogical methodologies. This article reflects on the recent importance of peer review in teaching/learning forensic sciences based on the last 10 years of pedagogical experience inseparably from the scientific activity. PMID:27547377

  10. The role of geological forensic methods for disaster assessment in Cigintung, West Java

    Science.gov (United States)

    Zakaria, Zufialdi; Mulyo, Agung; Muslim, Dicky; Jihadi, Luthfan H.

    2017-07-01

    Geological forensic is a branch of geology which study focused on deciphering facts by using geological science method mainly for legal purposes. The use of geological forensic may be applied to fulfill legal purposes of insurance agency, compensation decisions, and also criminal cases. In this study case, geotechnical and geological engineering are used beforehand in order to identify the cause of geological phenomenon by using quantitative assessment. Soil movement disaster can be caused by several aspects. The assessment of the disaster which is rapid creeping movement of soil is conducted in a disaster case of Cigintung, West Java. The impact of disaster is significant enough to affect up to 700 families, which have to be evacuated from the disaster site, due to massive infrastructural damage. The soil of the area is categorized into clay with high plasticity and silt with high plasticity, which liquid limit (LL) is vary between 77.77% - 98.41%. Activity number (A) of each soils are is vary between 0.964 - 2.192. Based on Skempton Chart is indicating montmorillonitic and illitic soils, and also the cause of their characteristic which is swelling if it is wet and shrinking if it is dry. Therefore, by using Seed method and William & Donovan Chart, we can conclude that soil in the area is categorized into expansive soil due to its high tendency of swelling-shrinking characteristic. Chronologically, the soil movement in Cigintung is initiated with first landslide which caused surface water to infiltrate easier into porous soil and reach the expansive soil below it. The second soil movement occurred rapidly and affected almost all infrastructures in the area in 12 hours timespan, due to the change of soil bearing capacity which caused by water infiltration. The accepted soil bearing capacity (qa) with factor of stability (FS) = 3 for square-shaped shallow foundation is between 3.66 T/m2 - 9.52 T/m2, while for circle-shaped foundation is between 3.67 T/m2 - 7.53 T/m2

  11. Demonstration of DSI-semen--A novel DNA methylation-based forensic semen identification assay.

    Science.gov (United States)

    Wasserstrom, Adam; Frumkin, Dan; Davidson, Ariane; Shpitzen, Moshe; Herman, Yael; Gafny, Ron

    2013-01-01

    Determining whether the source tissue of biological material is semen is important in confirming sexual assaults, which account for a considerable percentage of crime cases. The gold standard for confirming the presence of semen is microscopic identification of sperm cells, however, this method is labor intensive and operator-dependent. Protein-based immunologic assays, such as PSA, are highly sensitive and relatively fast, but suffer from low specificity in some situations. In addition, proteins are less stable than DNA under most environmental insults. Recently, forensic tissue identification advanced with the development of several approaches based on mRNA and miRNA for identification of various body fluids. Herein is described DNA source identifier (DSI)-semen, a DNA-based assay that determines whether the source tissue of a sample is semen based on detection of semen-specific methylation patterns in five genomic loci. The assay is comprised of a simple single tube biochemical procedure, similar to DNA profiling, followed by automatic software analysis, yielding the identification (semen/non-semen) accompanied by a statistical confidence level. Three additional internal control loci are used to ascertain the reliability of the results. The assay, which aims to replace microscopic examination, can easily be integrated by forensic laboratories and is automatable. The kit was tested on 135 samples of semen, saliva, venous blood, menstrual blood, urine, and vaginal swabs and the identification of semen vs. non-semen was correct in all cases. In order to test the assay's applicability in "real-life" situations, 33 actual casework samples from the forensic biological lab of the Israeli police were analyzed, and the results were compared with microscopic examination performed by Israeli police personnel. There was complete concordance between both analyses except for one sample, in which the assay identified semen whereas no sperm was seen in the microscope. This

  12. XIRAF: Ultimate Forensic Querying

    NARCIS (Netherlands)

    Alink, W.; Bhoedjang, R.; Vries, A.P. de; Boncz, P.A.

    2006-01-01

    This paper describes a novel, XML-based approach towards managing and querying forensic traces extracted from digital evidence. This approach has been implemented in XIRAF, a prototype system for forensic analysis. XIRAF systematically applies forensic analysis tools to evidence files (e.g., hard di

  13. Virtopsia: Aplicaciones de un nuevo método de inspección corporal no invasiva en ciencias forenses Virtopsy: Applications of a new method of non-invasive body inspection in forensic sciences

    Directory of Open Access Journals (Sweden)

    J. Aso

    2005-04-01

    Full Text Available Los modernos métodos de imagen, como la CT y la RNM proporcionan datos reales y tridimensionales de la superficie y las estructuras internas corporales. Esta información se almacena en ficheros DICOM (un protocolo estándar en adquisición de imagen radiológica. Sobre esos ficheros pueden realizarse muchos procedimientos de análisis de imagen, tales como visualización interactiva, morfometría, reconstrucciones tridimensionales, etc. Estas tareas son realizadas de una manera no invasiva y no destructiva, pudiéndose almacenar los resultados para documentación del caso. El presente trabajo describe las bases de los procedimientos de análisis de imagen sobre ficheros DICOM dirigidos a propósitos forenses (la llamada "virtopsia", enfatizando la utilidad del método en Patología, Traumatología Forense y otros campos. La "virtopsia" debe ser considerada no sólo como un procedimientos post-mortem (complementando pero no sustituyendo a la autopsia tradicional, sino como un modo de examinar partes corporales de una manera interactiva, sea en el fallecido o en el sujeto vivo. Ello amplia su utilidad y hace apropiado el procedimiento siempre que se requiera un examen anatómico forense reproducible, preciso, interactivo y en tiempo real.Modern imaging methods, such as radiological CT/MRI scanning provides real, full 3D data of the body surface and internal structures. This information is stored in DICOM files (a standard protocol in radiology image acquisition. Many image-analysis procedures, such as interactive visualization, morphometry, densitometry, three dimensional reconstruction, etc., can be carried-out on these files. These tasks are performed in a non-invasive and non-destructive manner, and the results can be stored in order to document the case. The present paper describes the basis of image-analysis procedures on DICOM files directed to forensic purposes (socalled "virtopsy", emphasizing the utility of the method in Pathology

  14. Genetic diversity of Bacillus anthracis in Europe: genotyping methods in forensic and epidemiologic investigations.

    Science.gov (United States)

    Derzelle, Sylviane; Thierry, Simon

    2013-09-01

    Bacillus anthracis, the etiological agent of anthrax, a zoonosis relatively common throughout the world, can be used as an agent of bioterrorism. In naturally occurring outbreaks and in criminal release of this pathogen, a fast and accurate diagnosis is crucial to an effective response. Microbiological forensics and epidemiologic investigations increasingly rely on molecular markers, such as polymorphisms in DNA sequence, to obtain reliable information regarding the identification or source of a suspicious strain. Over the past decade, significant research efforts have been undertaken to develop genotyping methods with increased power to differentiate B. anthracis strains. A growing number of DNA signatures have been identified and used to survey B. anthracis diversity in nature, leading to rapid advances in our understanding of the global population of this pathogen. This article provides an overview of the different phylogenetic subgroups distributed across the world, with a particular focus on Europe. Updated information on the anthrax situation in Europe is reported. A brief description of some of the work in progress in the work package 5.1 of the AniBioThreat project is also presented, including (1) the development of a robust typing tool based on a suspension array technology and multiplexed single nucleotide polymorphisms scoring and (2) the typing of a collection of DNA from European isolates exchanged between the partners of the project. The know-how acquired will contribute to improving the EU's ability to react rapidly when the identity and real origin of a strain need to be established.

  15. An illustration of the advantages of efficient statistical methods for RFLP analysis in forensic science.

    Science.gov (United States)

    Evett, I W; Scranage, J; Pinchin, R

    1993-01-01

    The debate about the statistics of DNA profiling in forensic science casework has been carried out mainly from the perspective which is generally known as "match/binning." This approach has an initial appeal because of its apparent conceptual simplicity. However, the simplicity is illusory because it encourages misconceptions which obscure the essential forensic issues. This is exemplified in a recent report of the National Research Council, which places great emphasis on the need for conservative estimation of relative frequencies while missing the point that the power of RFLP technology cannot be realized if the matching stage is inefficient. Our approach to the problem is a one-stage rather than a two-stage process, by means of one function--the likelihood ratio--which determines the evidential strength. This paper describes experiments which have been carried out to assess the power of the method in forensic science and compares it with match/binning methodology. Tests for gauging the effects of between-probe dependence are included, with the results complementing those of Risch and Devlin. PMID:8095367

  16. Limitations of Extending Juvenile Psychopathy Research Assessment Tools and Methods to Forensic Settings

    Directory of Open Access Journals (Sweden)

    Robert Semel

    2015-10-01

    Full Text Available Numerous studies have demonstrated significant associations between psychopathic-like characteristics in youths, which include affective, interpersonal, and behavioral dimensions, and severe and persisting conduct problems, violence, aggression, and antisocial behavior. The results of such studies have had practical considerations in the area of assessment with respect to the added specifier, “with limited prosocial emotions”, for the diagnosis of conduct disorder, and to the inclusion of features that have been described as callous-unemotional (CU traits on empirically supported juvenile risk assessment instruments. However, it is questionable whether findings obtained through research which provides anonymity and/or confidentiality to research participants are comparable across research and applied settings, and whether self-report youth psychopathy or CU questionnaire measures, which are vulnerable to deception, can effectively measure the same latent constructs in applied contexts. Forensic mental health evaluators attempt to obtain optimally consistent and reliable information through the use of multiple sources of information and through multiple assessment methods. Current practices of forensic mental health evaluators with regard to risk assessment and assessment of juvenile psychopathy are referenced. Some observations and suggestions are made to help meet the challenge of bridging the gap between research that utilizes self-report measures and applied forensic contexts.

  17. The relationship of forensic odontology with various dental specialties in the articles published in the Journal of Forensic odonto-stomatology from 2005 to 2012

    OpenAIRE

    SHAMIM, Thorakkal

    2015-01-01

    Background: There is a paucity of information about the relationship of forensic odontology with various dental specialties in the articles published in the Journal of Forensic Odonto-Stomatology. This study aimed to find the relationship of forensic odontology with various dental specialties in the articles published in the Journal of Forensic Odonto-Stomatology from 2005 to 2012 over an 8-year period. Methods: Bibliometric analysis was performed using web-based search during December 2013. ...

  18. [Forensic medical diagnostics of intra-vitality of the strangulation mark by morphological methods].

    Science.gov (United States)

    Bogomolov, D V; Zbrueva, Yu V; Putintsev, V A; Denisova, O P

    2016-01-01

    The objective of the present study WaS to overview the current domestic and foreign literature concerning the up-to-date methods employed for the expert evaluation of intra-vitality of the strangulation mark. The secondary objective was to propose the new approaches for addressing this problem. The methods of expert diagnostics with a view to determining the time of infliction of injuries as exemplified by mechanical asphyxia are discussed. It is concluded that immunohistochemical and morphometric studies provide the most promising tools for the evaluation of intra-vitality of the strangulation mark for the purpose of forensic medical expertise.

  19. Inquiry-Based Learning Case Studies for Computing and Computing Forensic Students

    Science.gov (United States)

    Campbell, Jackie

    2012-01-01

    Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…

  20. Application possibilities of several modern methods of microscopy and microanalysis in forensic science field

    Science.gov (United States)

    Kotrly, Marek; Turkova, Ivana

    2011-06-01

    The methods of optical and electron microscopy and microanalysis are the linchpin of forensic inorganic analysis. However, their capacity is limited as for the exact identification of pigments and colour layers, and therefore it is essential that they be complemented by other methods of phase microanalysis - powder X-ray microdiffraction (micro pXRD) and FTIR in transmission mode. The classic way of sample division for different methods is not suitable with regard to the inhomogeneity of the sequence of strata. That is why a method was tested that would allow performance of optical microscopy, SEM/EDS(WDS), micro pXRD and FTIR in a nondestructive manner, from an identical spot of a single fragment. The solution can be polished sections - embedded samples and microtome sections. Conductive zerobackground single-crystal silicon plates were developed and tested for sample fixation in SEM, micro pXRD and transmission FTIR. Methods using a focused ion beam - FIB have recently gained importance in the field of electron microscopy. In the forensic sphere they can be employed in examinations of metal materials, technical analyses of documents, post-blast and gunshot residues.

  1. Counter-forensics in machine learning based forgery detection

    Science.gov (United States)

    Marra, Francesco; Poggi, Giovanni; Roli, Fabio; Sansone, Carlo; Verdoliva, Luisa

    2015-03-01

    With the powerful image editing tools available today, it is very easy to create forgeries without leaving visible traces. Boundaries between host image and forgery can be concealed, illumination changed, and so on, in a naive form of counter-forensics. For this reason, most modern techniques for forgery detection rely on the statistical distribution of micro-patterns, enhanced through high-level filtering, and summarized in some image descriptor used for the final classification. In this work we propose a strategy to modify the forged image at the level of micro-patterns to fool a state-of-the-art forgery detector. Then, we investigate on the effectiveness of the proposed strategy as a function of the level of knowledge on the forgery detection algorithm. Experiments show this approach to be quite effective especially if a good prior knowledge on the detector is available.

  2. A comparison of Demirjian's four dental development methods for forensic age estimation in South Australian sub-adults.

    Science.gov (United States)

    Flood, Sara J; Franklin, Daniel; Turlach, Berwin A; McGeachie, John

    2013-10-01

    The aim of this study was to compare the accuracy of Demirjian's four dental development methods for forensic age assessment in a South Australian population. The sample comprised orthopantomograms (OPGs) of 408 sub-adult individuals (211 male; 197 female) with an age range of 4.9-14.5 years. The OPGs were obtained from various dental schools and clinics in urban Adelaide. The following Demirjian methods were evaluated: the original 7-tooth technique; the revised 7-tooth system; the 4-tooth method; and the alternate 4-tooth approach. The left mandibular teeth in each OPG were assessed and rated according to the eight stages (A-H) defined and illustrated in Demirjian et al.(5) Differences between chronological and estimated ages were calculated for males and females separately; 95% confidence intervals of mean age differences were calculated and ANOVA used to assess the significance of mean differences. When comparing all four methods there were significant differences overall (and in individual age groups) between mean chronological and estimated age in both sexes. In addition, each method consistently overestimated chronological age. We also demonstrate that the accuracy of the dental age methods evaluated varies in different subsets of an Australian population, a finding that parallels previous research in other global populations. Based on our analyses we conclude that population-specific standards based on dental maturity curves, as opposed to estimated ages, would provide more accurate and statistically robust age estimations. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  3. Cytochrome c oxidase subunit 1-based human RNA quantification to enhance mRNA profiling in forensic biology

    Directory of Open Access Journals (Sweden)

    Dong Zhao

    2017-01-01

    Full Text Available RNA analysis offers many potential applications in forensic science, and molecular identification of body fluids by analysis of cell-specific RNA markers represents a new technique for use in forensic cases. However, due to the nature of forensic materials that often admixed with nonhuman cellular components, human-specific RNA quantification is required for the forensic RNA assays. Quantification assay for human RNA has been developed in the present study with respect to body fluid samples in forensic biology. The quantitative assay is based on real-time reverse transcription-polymerase chain reaction of mitochondrial RNA cytochrome c oxidase subunit I and capable of RNA quantification with high reproducibility and a wide dynamic range. The human RNA quantification improves the quality of mRNA profiling in the identification of body fluids of saliva and semen because the quantification assay can exclude the influence of nonhuman components and reduce the adverse affection from degraded RNA fragments.

  4. Difficulties of sex determination from forensic bone degraded DNA: A comparison of three methods.

    Science.gov (United States)

    Quincey, Danielle; Carle, Georges; Alunni, Véronique; Quatrehomme, Gérald

    2013-09-01

    Sex determination is of paramount importance in forensic anthropology. Numerous anthropological methods have been described, including visual assessments and various measurements of bones. Nevertheless, whatever the method used, the percentage of correct classification of a single bone usually varies between 80% and 95%, due to significant intra- and inter-population variations, and sometimes variations coming from secular trends. DNA is increasingly used in a forensic context. But forensic DNA extraction from bone raises several issues, because the samples are very often badly altered and/or in very small quantity. Nuclear DNA is difficult to get from degraded samples, according to low copy number, at least in comparison with mitochondrial DNA. In a forensic context (as in a paeleoanthropological context) DNA sex determination is usually complicated by the weak amount of DNA, the degraded nature of nucleic acids, the presence of enzymatic inhibitors in DNA extracts, the possible faint amplification of Y band and the risk of contamination during either excavation or manipulation of samples. The aim of this work was to compare three methods of DNA sex determination from bones: procedure #1 using a single PCR amplification, procedure #2 using a double PCR amplification, and procedure #3 adding bleaching for decontamination of the bone, instead of simply rubbing the bone. These processes were applied to samples of bones (49 samples coming from 39 individuals) that were in various states of post mortem alteration. The main results are the following. (i) No DNA could be extracted from three skulls (parietal bones, mastoid process), the compact bone of one rib, and the diaphysis of one femur; (ii) there was a contamination in three skulls; and (iii) the Y band did not appear in two male cases, with one of the three procedures (male tibia, procedure #2) and with procedures #2 and #3 (male femur). This study emphasises the main issue while working with altered bones: the

  5. An unusual method of forensic human identification: use of selfie photographs.

    Science.gov (United States)

    Miranda, Geraldo Elias; Freitas, Sílvia Guzella de; Maia, Luiza Valéria de Abreu; Melani, Rodolfo Francisco Haltenhoff

    2016-06-01

    As with other methods of identification, in forensic odontology, antemortem data are compared with postmortem findings. In the absence of dental documentation, photographs of the smile play an important role in this comparison. As yet, there are no reports of the use of the selfie photograph for identification purposes. Owing to advancements in technology, electronic devices, and social networks, this type of photograph has become increasingly common. This paper describes a case in which selfie photographs were used to identify a carbonized body, by using the smile line and image superimposition. This low-cost, rapid, and easy to analyze technique provides highly reliable results. Nevertheless, there are disadvantages, such as the limited number of teeth that are visible in a photograph, low image quality, possibility of morphological changes in the teeth after the antemortem image was taken, and difficulty of making comparisons depending on the orientation of the photo. In forensic odontology, new methods of identification must be sought to accompany technological evolution, particularly when no traditional methods of comparison, such as clinical record charts or radiographs, are available.

  6. Forensic age estimation by the Schmeling method: computed tomography analysis of the medial clavicular epiphysis.

    Science.gov (United States)

    Ekizoglu, Oguzhan; Hocaoglu, Elif; Inci, Ercan; Sayin, Ibrahim; Solmaz, Dilek; Bilgili, Mustafa Gokhan; Can, Ismail Ozgur

    2015-01-01

    The variability of anthropometric measures, such as the degree of ossification, among societies should be taken into account when estimating age. The degree of ossification of the medial clavicle can be determined with thin-section computed tomography (CT), which is one of the methods recommended by the Study Group on Forensic Age Diagnostics of the German Association of Forensic Medicine. The purpose of this retrospective study was to investigate the applicability of thin-section CT analysis of the degree of ossification of the medial clavicle in a Turkish population. We evaluated the CT images (1-mm slice thickness) of 503 patients (362 male, 141 female; age, 10-35 years) using the Schmeling five-stage method. The Spearman's correlation analysis revealed a positive correlation between age and ossification stage in both male and female patients (total group: rho = 0.838, p < 0.001; male: rho = 0.831, p < 0.001; female: rho = 0.856, p < 0.001). The linear regression analysis results indicated that the ossification stage of the medial clavicle is a good predictor when estimating age (r (2) = 0.735 for all patients, 0.734 for male patients, 0.741 for female patients). Sex differences in ossification stages were observed only for stage 1 and 4 ossification. We believe that future research could expand the database on this topic and contribute to improvements in this measurement method.

  7. PHOTOREALISTIC COMPUTER GRAPHICS FORENSICS BASED ON LEADING DIGIT LAW

    Institute of Scientific and Technical Information of China (English)

    Xu Bo; Wang Junwen; Liu Guangjie; Dai Yuewei

    2011-01-01

    As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it may lead to potential social,legal or private consequences.To this end,it is very necessary and also challenging to find effective methods to differentiate between them.In this paper,a novel leading digit law,also called Benford's law,based method to identify computer graphics is proposed.More specifically,statistics of the most significant digits are extracted from image's Discrete Cosine Transform (DCT) coefficients and magnitudes of image's gradient,and then the Support Vector Machine (SVM) based classifiers are built.Results of experiments on the image datasets indicate that the proposed method is comparable to prior works.Besides,it possesses low dimensional features and low computational complexity.

  8. Comparison between magnetic bead and qPCR library normalisation methods for forensic MPS genotyping.

    Science.gov (United States)

    Mehta, Bhavik; Venables, Samantha; Roffey, Paul

    2017-04-18

    Massively parallel sequencing (MPS) is fast approaching operational use in forensic science, with the capability to analyse hundreds of DNA identity and DNA intelligence markers in multiple samples simultaneously. The ForenSeq™ DNA Signature Kit on MiSeq FGx™ (Illumina) workflow can provide profiles for autosomal short tandem repeats (STRs), X chromosome and Y chromosome STRs, identity single nucleotide polymorphisms (SNPs), biogeographical ancestry SNPs and phenotype (eye and hair colour) SNPs from a sample. The library preparation procedure involves a series of steps including target amplification, library purification and library normalisation. This study highlights the comparison between the manufacturer recommended magnetic bead normalisation and quantitative polymerase chain reaction (qPCR) methods. Furthermore, two qPCR chemistries, KAPA® (KAPA Biosystems) and NEBNext® (New England Bio Inc.), have also been compared. The qPCR outperformed the bead normalisation method, while the NEBNext® kit obtained higher genotype concordance than KAPA®. The study also established an MPS workflow that can be utilised in any operational forensic laboratory.

  9. Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.

    Science.gov (United States)

    Chen, Chenglong; Ni, Jiangqun; Shen, Zhaoyi; Shi, Yun Qing

    2017-06-01

    Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image forgeries. In recent years, researchers have developed many digital forensic techniques to identify these operations. Most previous works in this area focus on the analysis of images that have undergone single geometric transformations, e.g., resizing or rotation. In several recent works, researchers have addressed yet another practical and realistic situation: successive geometric transformations, e.g., repeated resizing, resizing-rotation, rotation-resizing, and repeated rotation. We will also concentrate on this topic in this paper. Specifically, we present an in-depth analysis in the frequency domain of the second-order statistics of the geometrically transformed images. We give an exact formulation of how the parameters of the first and second geometric transformations influence the appearance of periodic artifacts. The expected positions of characteristic resampling peaks are analytically derived. The theory developed here helps to address the gap left by previous works on this topic and is useful for image security and authentication, in particular, the forensics of geometric transformations in digital images. As an application of the developed theory, we present an effective method that allows one to distinguish between the aforementioned four different processing chains. The proposed method can further estimate all the geometric transformation parameters. This may provide useful clues for image forgery detection.

  10. Forensic entomology in Germany.

    Science.gov (United States)

    Amendt, J; Krettek, R; Niess, C; Zehner, R; Bratzke, H

    2000-09-11

    Forensic entomology (FE) is increasingly gaining international recognition. In Germany, however, the development of FE has been stagnating, mainly because of the lack of cooperation between police, forensic medicine and entomology. In 1997 a co-operative research project 'Forensic Entomology' was started in Frankfurt/Main at the Center of Legal Medicine and the Research Institute Senckenberg. The aim of this project is to establish FE in Germany as a firmly integrated component of the securing of evidence from human cadavers in cases of suspected homicide. For this purpose we developed a forensic insect collecting kit, and policemen are educated for greater acceptance and better application of FE. The scientific programme focuses on the investigation of the insect succession on cadavers in urban and rural habitats. This also includes new indicator groups (e.g. parasitic wasps) for a more precise calculation of the late post mortem interval. Recently a DNA-based reliable and fast identification method especially for the immature stages of necrophagous insects became part of the project. Preliminary results are reported and two case studies presented.

  11. Forensic importance of jealousy.

    Science.gov (United States)

    Muzinić, Lana; Goreta, Miroslav; Jukić, Vlado; Dordević, Veljko; Koić, Elvira; Herceg, Miroslav

    2003-06-01

    The aim of the investigation is to define as clearly as possible specific forensic psychiatric characteristics of persons who committed homicide and or attempted due to jealousy (the nature and severity of psychopathology, the level of responsibility, danger for the community, intensity and nature of aggression, the victimologic dimension, the relation of alcohol and jealousy). A retrospective method based on forensic psychiatric expertises in the period 1975-1999 was used. They encompassed 200 examinees that committed murder or attempted it. The results show the connection of psychotic jealousy with the highest degree of danger in diagnostic categories of paranoid psychosis and paranoid schizophrenia. The time span from the first manifestations of jealousy until the actual commitment of a crime is the longest in personality disorders and the shortest in schizophrenia. Exogenous provoking situations were dominant for committing homicide due to jealousy in personality disorders. Acute alcohol intoxication has a specific significance in crime due to jealousy in the same diagnostic category. Clear criteria were designed for forensic psychiatric evaluation of murder and attempts of homicide caused by jealousy, which will be of help in everyday practice in the field forensic work and treatment.

  12. Forensic Science.

    Science.gov (United States)

    Brettell, T. A.; Saferstein, R.

    1989-01-01

    Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)

  13. Forensic Science.

    Science.gov (United States)

    Brettell, T. A.; Saferstein, R.

    1989-01-01

    Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)

  14. Mass spectrometry-based proteomics as a tool to identify biological matrices in forensic science.

    Science.gov (United States)

    Van Steendam, Katleen; De Ceuleneer, Marlies; Dhaenens, Maarten; Van Hoofstat, David; Deforce, Dieter

    2013-03-01

    In forensic casework analysis, identification of the biological matrix and the species of a forensic trace, preferably without loss of DNA, is of major importance. The biological matrices that can be encountered in a forensic context are blood (human or non-human), saliva, semen, vaginal fluid, and to a lesser extent nasal secretions, feces, and urine. All these matrices were applied on swabs and digested with trypsin in order to obtain peptides. These peptides were injected on a mass spectrometer (ESI Q-TOF) resulting in the detection of several biomarkers that were used to build a decision tree for matrix identification. Saliva and blood were characterized by the presence of alpha-amylase 1 and hemoglobin, respectively. In vaginal fluid, cornulin, cornifin, and/or involucrin were found as biomarkers while semenogelin, prostate-specific antigen, and/or acid phosphatase were characteristic proteins for semen. Uromodulin or AMBP protein imply the presence of urine, while plunc protein is present in nasal secretions. Feces could be determined by the presence of immunoglobulins without hemoglobin. The biomarkers for the most frequently encountered biological matrices (saliva, blood, vaginal fluid, and semen) were validated in blind experiments and on real forensic samples. Additionally, by means of this proteomic approach, species identification was possible. This approach has the advantage that the analysis is performed on the first "washing" step of the chelex DNA extraction, a solution which is normally discarded, and that one single test is sufficient to determine the identity and the species of the biological matrix, while the conventional methods require cascade testing. This technique can be considered as a useful additional tool for biological matrix identification in forensic science and holds the promise of further automation.

  15. Forensic microbiology.

    Science.gov (United States)

    Lehman, Donald C

    2012-01-01

    The field of forensic microbiology is fairly new and still evolving. With a threat of bioterror and biocrime, the rapid identification and subtyping of infectious agents is of upmost importance. Microbial genetic analysis is a valuable tool in this arena. The cost to sequence a microbial genome has fallen dramatically in recent years making this method more widely available. Surveillance and vigilance are important as is further research. The United States Department of Homeland Security established the Bioforensics Analysis Center to become the foremost U.S. biodefense research institution involved with bioforensics. Many countries are better prepared for biologic events than ever before, but more work is needed. Most medical laboratory scientists are not familiar with forensic principles or testifying in court. Demonstrating chain of custody and quality assurance are critical so that test results will be admissible in a court of law. The Scientific Working Group on Microbial Genetics and Forensics has published guidelines for forensic microbiology laboratories. Incorporating these guidelines help to provide test results that are useful in legal proceedings. If a laboratory scientist suspects bioterror or biocrime, or other legal case, law enforcement agents must be notified and diagnostic samples preserved. Additional sample testing might be necessary in court cases.

  16. [Forensic entomology].

    Science.gov (United States)

    Açikgöz, Halide Nihal

    2010-01-01

    Odour of the animal or human corpses immediately after death is very attractive for insects and other invertebrates. Blue and green bottle flies from the Calliphoridae family are the first colonizers of cadaver and immediately later necrophagous Diptera from the Sarcophagidae family settle on the same corpse. It is essential to determine the time past after death for elucidating the event in case of the homicide or suspicious death, and it is directly proportional to the post mortem interval expected time, which is based upon the speed of the larval growth. In this article, we purposed to stress the special interest of forensic entomology for the scientists who will apply this science in their forensic researches and case studies, and also to provide information to our judges, prosecutors and law enforcement agents in order to consider the entomological samples to be reliable and applicable evidences as biological stains and hairs. We are of the opinion that if any forensic entomologist is called to the crime scene or if the evidences are collected and then delivered to an entomologist, the forensic cases will be elucidated faster and more accurately.

  17. Forensic Automatic Speaker Recognition Based on Likelihood Ratio Using Acoustic-phonetic Features Measured Automatically

    Directory of Open Access Journals (Sweden)

    Huapeng Wang

    2015-01-01

    Full Text Available Forensic speaker recognition is experiencing a remarkable paradigm shift in terms of the evaluation framework and presentation of voice evidence. This paper proposes a new method of forensic automatic speaker recognition using the likelihood ratio framework to quantify the strength of voice evidence. The proposed method uses a reference database to calculate the within- and between-speaker variability. Some acoustic-phonetic features are extracted automatically using the software VoiceSauce. The effectiveness of the approach was tested using two Mandarin databases: A mobile telephone database and a landline database. The experiment's results indicate that these acoustic-phonetic features do have some discriminating potential and are worth trying in discrimination. The automatic acoustic-phonetic features have acceptable discriminative performance and can provide more reliable results in evidence analysis when fused with other kind of voice features.

  18. New radiological material detection technologies for nuclear forensics: Remote optical imaging and graphene-based sensors.

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, Richard Karl [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Jeffrey B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wiemann, Dora K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Choi, Junoh [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    We developed new detector technologies to identify the presence of radioactive materials for nuclear forensics applications. First, we investigated an optical radiation detection technique based on imaging nitrogen fluorescence excited by ionizing radiation. We demonstrated optical detection in air under indoor and outdoor conditions for alpha particles and gamma radiation at distances up to 75 meters. We also contributed to the development of next generation systems and concepts that could enable remote detection at distances greater than 1 km, and originated a concept that could enable daytime operation of the technique. A second area of research was the development of room-temperature graphene-based sensors for radiation detection and measurement. In this project, we observed tunable optical and charged particle detection, and developed improved devices. With further development, the advancements described in this report could enable new capabilities for nuclear forensics applications.

  19. Microbial forensics: the next forensic challenge.

    Science.gov (United States)

    Budowle, Bruce; Murch, Randall; Chakraborty, Ranajit

    2005-11-01

    Pathogens and toxins can be converted to bioweapons and used to commit bioterrorism and biocrime. Because of the potential and relative ease of an attack using a bioweapon, forensic science needs to be prepared to assist in the investigation to bring perpetrators to justice and to deter future attacks. A new subfield of forensics--microbial forensics--has been created, which is focused on characterization of evidence from a bioterrorism act, biocrime, hoax, or an inadvertent release. Forensic microbiological investigations are essentially the same as any other forensic investigation regarding processing. They involve crime scene(s) investigation, chain of custody practices, evidence collection, handling and preservation, evidence shipping, analysis of evidence, interpretation of results, and court presentation. In addition to collecting and analyzing traditional forensic evidence, the forensic investigation will attempt to determine the etiology and identity of the causal agent, often in a similar fashion as in an epidemiologic investigation. However, for attribution, higher-resolution characterization is needed. The tools for attribution include genetic- and nongenetic-based assays and informatics to attempt to determine the unique source of a sample or at least eliminate some sources. In addition, chemical and physical assays may help determine the process used to prepare, store, or disseminate the bioweapon. An effective microbial forensics program will require development and/or validation of all aspects of the forensic investigative process, from sample collection to interpretation of results. Quality assurance (QA) and QC practices, comparable to those used by the forensic DNA science community, are being implemented. Lastly, partnerships with other laboratories will be requisite, because many of the necessary capabilities for analysis will not reside in the traditional forensic laboratory.

  20. Epicurus: a platform for the visualisation of forensic documents based on a linguistic approach

    OpenAIRE

    2016-01-01

    This paper presents a tool to visualize a cognitive model of human discourse processing known as Text World Theory (TWT) which is used to facilitate forensic discourse analysis. XML files are designed based on a linguistic annotation scheme. It encompasses the range of descriptive categories defined in TWT. Epicurus is a tool that can parse and visualize those XML files into HTML. The tool is designed for ease of language data annotation and to facilitate evidential analysis by i) visualizing...

  1. Development of an Ontology Based Forensic Search Mechanism: Proof of Concept

    Directory of Open Access Journals (Sweden)

    Jill Slay

    2006-03-01

    Full Text Available This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.

  2. Methodical approach to brain hypoxia/ischemia as a fundamental problem in forensic neuropathology.

    Science.gov (United States)

    Oehmichen, Manfred; Meissner, Christoph; von Wurmb-Schwark, Nicole; Schwark, Thorsten

    2003-12-01

    A review is given summarizing different methods that have been applied to the specific forensic neuropathological question of brain hypoxia/ischemia. On the microscopic level the authors applied routine stains and immunohistochemistry (MAP2, ALZ 50, GFAP, CD68, beta-APP) for characterization of the functional activity of neurons as well as of different cell types in various brain areas. Moreover, using molecular techniques for evaluation of the mitochondrial 4977-bp deletion in correlation to hypoxia and to age brain tissue and single cell analyses are described. The demonstrated scope of methods and results give evidence of the wide spectrum of possibilities to visualize hypoxic brain injuries for determining the cause (and matter) of death and for reconstructing the time-dependent process.

  3. Forensic Chemistry Training

    Directory of Open Access Journals (Sweden)

    Zuhal GERÇEK

    2012-01-01

    Full Text Available Increasing the types of terrorism and crime nowadays, the importance of the forensic sciences can be bett er understood. Forensic science is the application of the wide spectrum of science to answer the question of legal system. It contains the application of the principles, techniques and methods of basic sciences and its main aim is the determination of the physical facts which are important in legal situations. Forensic chemistry is the branch of chemistry which performs the chemical analysis of evidences that used in the courts. Forensic chemist is the professional chemist who analyzes the evidences from crime scene and reaches a result by application of tests. Th us, they have to have a special education. In forensic laboratories candidates who have chemistry/biochemistry undergraduate degree and took biology and forensic chemistry lectures are preferred. It is necessary to design graduate and undergraduate education to train a forensic chemist. Science education should be at the core of the undergraduate education. In addition to this strong laboratory education on both science and forensic science should be given. Th e graduate program of forensic science example should contain forensic science subjects, strong academic lectures on special subjects and research and laboratory components.

  4. Parallel digital forensics infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Liebrock, Lorie M. (New Mexico Tech, Socorro, NM); Duggan, David Patrick

    2009-10-01

    This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

  5. Forensic Chemistry Training

    OpenAIRE

    GERÇEK, Zuhal

    2012-01-01

    Increasing the types of terrorism and crime nowadays, the importance of the forensic sciences can be bett er understood. Forensic science is the application of the wide spectrum of science to answer the question of legal system. It contains the application of the principles, techniques and methods of basic sciences and its main aim is the determination of the physical facts which are important in legal situations. Forensic chemistry is the branch of chemistry which performs the chemical analy...

  6. Fast nuclear staining of head hair roots as a screening method for successful STR analysis in forensics.

    Science.gov (United States)

    Lepez, Trees; Vandewoestyne, Mado; Van Hoofstat, David; Deforce, Dieter

    2014-11-01

    The success rate of STR profiling of hairs found at a crime scene is quite low and negative results of hair analysis are frequently reported. To increase the success rate of DNA analysis of hairs in forensics, nuclei in hair roots can be counted after staining the hair root with DAPI. Two staining methods were tested: a longer method with two 1h incubations in respectively a DAPI- and a wash-solution, and a fast, direct staining of the hair root on microscope slides. The two staining methods were not significantly different. The results of the STR analysis for both procedures showed that 20 nuclei are necessary to obtain at least partial STR profiles. When more than 50 nuclei were counted, full STR profiles were always obtained. In 96% of the cases where no nuclei were detected, no STR profile could be obtained. However, 4% of the DAPI-negative hair roots resulted in at least partial STR profiles. Therefore, each forensic case has to be evaluated separately in function of the importance of the evidential value of the found hair. The fast staining method was applied in 36 forensic cases on 279 hairs in total. A fast screening method using DAPI can be used to increase the success rate of hair analysis in forensics.

  7. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  8. Efficacy of DNA typing as an accurate method in forensic medicine

    Directory of Open Access Journals (Sweden)

    Namazi H

    2000-08-01

    Full Text Available DNA typing is a new method with important applications in forensic medicine. In the present study, we evaluated application of DNA typing in Iran. Loci Hum LPL, Hum Tpox, Hum F13, Hum vw 31A, Hum TH01 and Hum FES/FPS of DNA short tandem repeats were studied. To determine sensitivity of the test, 85 mother-child couples (1020 chromosomes that were referred to DNA section of legal medicine organization of Iran were included and for determination of it's specificity 42 brother-sister couples (1200 chromosomes and 58 non-relative couples were examined. The results show lack of mutations in the studied loci and acceptable sensitivity of the test. Of 12 alleles of siblings, there were 2-6 differences, in contrast with 3-9 differences in non-relatives, so the test has 100% specificity in these loci. Considering polymorphism, power of exclusion of these 6 sites was 99%.

  9. The evaluation stage of the Hoeven Outcome Monitor (HOM): Towards an evidence based groundwork in forensic mental health.

    Science.gov (United States)

    Keune, Lobke H; de Vogel, Vivienne; van Marle, Hjalmar J C

    2017-02-27

    This study examined if a macro-, meso-, and micro outcome measurement instrument that constitutes the evaluation stage of a Dutch forensic psychiatric outcome monitor, the Hoeven Outcome Monitor (HOM), can provide a first step towards a more evidence based groundwork in forensic mental health. General, serious, very serious, special, and tbs meriting recidivism during treatment, after treatment, and overall were charted for forensic psychiatric patients discharged from a Dutch forensic psychiatric centre between 1999 and 2008 (N=164). Re-conviction data were obtained from the official Criminal Records System, and the mean follow-up time was 116.2months. First, the results showed that the macro-measurements provide comparative outcome measures to generate insight into the overall effectiveness of forensic psychiatric treatment. Second, the meso-measurements yielded clinically relevant treatment outcome data for all discharged patients to generate a complete view of treatment effectiveness. Finally, the micro-measurements allowed access to detailed patient and treatment effectiveness assessments that provides the empirical foundation to conduct aetiological research into the prediction and control of high-risk behaviour. Thus, an outcome measurement instrument in line with Evidence Based Medicine and best practice guidelines was designed that provides an empirically sound evaluation framework for treatment effectiveness, and an impetus for the development of effective interventions to generate an evidence based groundwork in forensic mental health.

  10. Forensic psychotherapy.

    Science.gov (United States)

    Riordan, Daniel

    2017-06-01

    This paper describes the role forensic psychotherapy has in the assessment and treatment of mentally disordered offender patients, and its role in the supervision of individual therapists, staff groups or whole organisations which contain and manage this patient population. Forensic psychotherapy has a valuable role to play in the management of mentally disordered forensic patients. As forensic services continue to develop in Australia and New Zealand and interest in this field continues to grow, then the future of forensic psychotherapy looks bright.

  11. STRait Razor: a length-based forensic STR allele-calling tool for use with second generation sequencing data.

    Science.gov (United States)

    Warshauer, David H; Lin, David; Hari, Kumar; Jain, Ravi; Davis, Carey; Larue, Bobby; King, Jonathan L; Budowle, Bruce

    2013-07-01

    Recent studies have demonstrated the capability of second generation sequencing (SGS) to provide coverage of short tandem repeats (STRs) found within the human genome. However, there are relatively few bioinformatic software packages capable of detecting these markers in the raw sequence data. The extant STR-calling tools are sophisticated, but are not always applicable to the analysis of the STR loci commonly used in forensic analyses. STRait Razor is a newly developed Perl-based software tool that runs on the Linux/Unix operating system and is designed to detect forensically-relevant STR alleles in FASTQ sequence data, based on allelic length. It is capable of analyzing STR loci with repeat motifs ranging from simple to complex without the need for extensive allelic sequence data. STRait Razor is designed to interpret both single-end and paired-end data and relies on intelligent parallel processing to reduce analysis time. Users are presented with a number of customization options, including variable mismatch detection parameters, as well as the ability to easily allow for the detection of alleles at new loci. In its current state, the software detects alleles for 44 autosomal and Y-chromosome STR loci. The study described herein demonstrates that STRait Razor is capable of detecting STR alleles in data generated by multiple library preparation methods and two Illumina(®) sequencing instruments, with 100% concordance. The data also reveal noteworthy concepts related to the effect of different preparation chemistries and sequencing parameters on the bioinformatic detection of STR alleles.

  12. Hair-based rapid analyses for multiple drugs in forensics and doping: application of dynamic multiple reaction monitoring with LC-MS/MS

    OpenAIRE

    2014-01-01

    Background Considerable efforts are being extended to develop more effective methods to detect drugs in forensic science for applications such as preventing doping in sport. The aim of this study was to develop a sensitive and accurate method for analytes of forensic and toxicological nature in human hair at sub-pg levels. Results The hair test covers a range of different classes of drugs and metabolites of forensic and toxicological nature including selected anabolic steroids, cocaine, amphe...

  13. Forensic geomorphology

    Science.gov (United States)

    Ruffell, Alastair; McKinley, Jennifer

    2014-02-01

    Geomorphology plays a critical role in two areas of geoforensics: searching the land for surface or buried objects and sampling scenes of crime and control locations as evidence. Associated geoscience disciplines have substantial bodies of work dedicated to their relevance in forensic investigations, yet geomorphology (specifically landforms, their mapping and evolution, soils and relationship to geology and biogeography) have not had similar public exposure. This is strange considering how fundamental to legal enquiries the location of a crime and its evolution are, as this article will demonstrate. This work aims to redress the balance by showing how geomorphology featured in one of the earliest works on forensic science methods, and has continued to play a role in the sociology, archaeology, criminalistics and geoforensics of crime. Traditional landscape interpretation from aerial photography is used to demonstrate how a geomorphological approach saved police time in the search for a clandestine grave. The application geomorphology has in military/humanitarian geography and environmental/engineering forensics is briefly discussed as these are also regularly reviewed in courts of law.

  14. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  15. A University-based Forensics Training Center as a Regional Outreach, Education, and Research activity

    Directory of Open Access Journals (Sweden)

    Rayford B. Vaughn

    2009-04-01

    Full Text Available This paper describes a university-based Forensics Training Center (FTC established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU security program pedagogy, and research effort.

  16. An overview of forensic drug testing methods and their suitability for harm reduction point-of-care services.

    Science.gov (United States)

    Harper, Lane; Powell, Jeff; Pijl, Em M

    2017-07-31

    Given the current opioid crisis around the world, harm reduction agencies are seeking to help people who use drugs to do so more safely. Many harm reduction agencies are exploring techniques to test illicit drugs to identify and, where possible, quantify their constituents allowing their users to make informed decisions. While these technologies have been used for years in Europe (Nightlife Empowerment & Well-being Implementation Project, Drug Checking Service: Good Practice Standards; Trans European Drugs Information (TEDI) Workgroup, Factsheet on Drug Checking in Europe, 2011; European Monitoring Centre for Drugs and Drug Addiction, An Inventory of On-site Pill-Testing Interventions in the EU: Fact Files, 2001), they are only now starting to be utilized in this context in North America. The goal of this paper is to describe the most common methods for testing illicit substances and then, based on this broad, encompassing review, recommend the most appropriate methods for testing at point of care.Based on our review, the best methods for point-of-care drug testing are handheld infrared spectroscopy, Raman spectroscopy, and ion mobility spectrometry; mass spectrometry is the current gold standard in forensic drug analysis. It would be prudent for agencies or clinics that can obtain the funding to contact the companies who produce these devices to discuss possible usage in a harm reduction setting. Lower tech options, such as spot/color tests and immunoassays, are limited in their use but affordable and easy to use.

  17. Forensic Data Carving

    Science.gov (United States)

    Povar, Digambar; Bhadran, V. K.

    File or data carving is a term used in the field of Cyber forensics. Cyber forensics is the process of acquisition, authentication, analysis and documentation of evidence extracted from and/or contained in a computer system, computer network and digital media. Extracting data (file) out of undifferentiated blocks (raw data) is called as carving. Identifying and recovering files based on analysis of file formats is known as file carving. In Cyber Forensics, carving is a helpful technique in finding hidden or deleted files from digital media. A file can be hidden in areas like lost clusters, unallocated clusters and slack space of the disk or digital media. To use this method of extraction, a file should have a standard file signature called a file header (start of the file). A search is performed to locate the file header and continued until the file footer (end of the file) is reached. The data between these two points will be extracted and analyzed to validate the file. The extraction algorithm uses different methods of carving depending on the file formats.

  18. DNS in Computer Forensics

    Directory of Open Access Journals (Sweden)

    Neil Fowler Wright

    2012-06-01

    Full Text Available The Domain Name Service (DNS is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures. This paper examines the history along with the rapid growth of DNS up to its current critical status. It then explores the often overlooked value of DNS query data; from packet traces, DNS cache data, and DNS logs, with its use in System Forensics and more frequently in Network Forensics, extrapolating examples and experiments that enhance knowledge.Continuing on, it details the common attacks that can be used directly against the DNS systems and services, before following on with the malicious uses of DNS in direct system attacks, Distributed Denial of Service (DDoS, traditional Denial of Service (DOS attacks and malware. It explores both cyber-criminal activities and cyber-warfare based attacks, and also extrapolates from a number of more recent attacks the possible methods for data exfiltration. It explores some of the potential analytical methodologies including; common uses in Intrusion Detection Systems (IDS, as well as infection and activity tracking in malware traffic analysis, and covers some of the associated methods around technology designed to defend against, mitigate, and/or manage these and other risks, plus the effect that ISP and nation states can have by direct manipulation of DNS queries and return traffic.This paper also investigates potential behavioural analysis and time-lining, which can then be used for the

  19. Teaching and learning based on peer review: a realistic approach in forensic sciences [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ricardo Jorge Dinis-Oliveira

    2016-05-01

    Full Text Available Teaching and learning methods need a continuous upgrade in higher education. However it is also true that some of the modern methodologies do not reduce or prevent school failure. Perhaps the real limitation is the inability to identify the true reasons that may explain it or ignore/undervalue the problem. In our opinion, one of the current constraints of the teaching/learning process is the excess of and inadequate bibliography recommended by the teacher, which results in continuous student difficulties and waste of time in searching and selecting useful information. The need to change the paradigm of the teaching/learning process comes also from employers. They claim forensic experts armed with useful knowledge to face professional life. It is therefore mandatory to identify the new needs and opportunities regarding pedagogical methodologies. This article reflects on the recent importance of peer review in teaching/learning forensic sciences based on the last 10 years of pedagogical experience inseparably from the scientific activity.

  20. [The possibility of using a laser stereolithography method in forensic medicine].

    Science.gov (United States)

    Abramov, S S; Boldyrev, N N; Evseev, A V; Kotsiuba, E V; Novikov, M M; Panchenko, V Ia; Semeshin, N M; Iakunin, V P

    1998-01-01

    The data of computer-aided tomography are proposed to be used in forensic medical diagnostic and identification studies. The technology of making hard copies of objects by laser stereolithography on the basis of tomography data is described.

  1. Bayesian networks for evaluation of evidence from forensic entomology.

    Science.gov (United States)

    Andersson, M Gunnar; Sundström, Anders; Lindström, Anders

    2013-09-01

    In the aftermath of a CBRN incident, there is an urgent need to reconstruct events in order to bring the perpetrators to court and to take preventive actions for the future. The challenge is to discriminate, based on available information, between alternative scenarios. Forensic interpretation is used to evaluate to what extent results from the forensic investigation favor the prosecutors' or the defendants' arguments, using the framework of Bayesian hypothesis testing. Recently, several new scientific disciplines have been used in a forensic context. In the AniBioThreat project, the framework was applied to veterinary forensic pathology, tracing of pathogenic microorganisms, and forensic entomology. Forensic entomology is an important tool for estimating the postmortem interval in, for example, homicide investigations as a complement to more traditional methods. In this article we demonstrate the applicability of the Bayesian framework for evaluating entomological evidence in a forensic investigation through the analysis of a hypothetical scenario involving suspect movement of carcasses from a clandestine laboratory. Probabilities of different findings under the alternative hypotheses were estimated using a combination of statistical analysis of data, expert knowledge, and simulation, and entomological findings are used to update the beliefs about the prosecutors' and defendants' hypotheses and to calculate the value of evidence. The Bayesian framework proved useful for evaluating complex hypotheses using findings from several insect species, accounting for uncertainty about development rate, temperature, and precolonization. The applicability of the forensic statistic approach to evaluating forensic results from a CBRN incident is discussed.

  2. Non-frontal model based approach to forensic face recognition

    NARCIS (Netherlands)

    Dutta, Abhishek; Veldhuis, Raymond; Spreeuwers, Luuk

    2012-01-01

    In this paper, we propose a non-frontal model based approach which ensures that a face recognition system always gets to compare images having similar view (or pose). This requires a virtual suspect reference set that consists of non-frontal suspect images having pose similar to the surveillance vie

  3. [The application of mitochondrial genomics to forensic investigations based on human mitochondrial DNA testing].

    Science.gov (United States)

    Skonieczna, Katarzyna; Bednarek, Jarosław; Rogalla, Urszula; Woźniak, Marcin; Gorzkiewicz, Marta; Linkowska, Katarzyna; Duleba, Anna; Sliwka, Karol; Grzybowski, Tomasz

    2012-01-01

    In this study we present two forensic cases where mitochondrial DNA HVS I and HVS II haplotypes of evidentiary hairs match reference samples. Based on the information retrieved from mtDNA coding region of reference material, we selected single nucleotide polymorphisms (SNPs) located outside the HVS I and HVS II regions that could increase the informativeness of mtDNA analysis. The SNPs were typed via SNaPshot or dideoxy sequencing technology. In both cases the SNP results allowed for unambiguous exlusion of the evidence and for determining that reference samples originated from the same person.

  4. 意会关键词信息取证方法%Information Forensics Method for Tacit Keyword

    Institute of Scientific and Technical Information of China (English)

    孙艳; 周学广; 陈涛

    2011-01-01

    As a new form of media, the Internet public opinion influences the society profoundly. Information forensics is an important aspect in the Internet public opinion monitoring field. To resolve the problem of unhealthy information forensics, an information forensics technique for tacit keywords is presented. It defines the term of tacit keywords, then classifies and quantifies tacit keywords. Six algorithms of tacit keywords extracted for information forensics are proposed. Based on the algorithms, the integrity of the evidence information is protected with Hash function. Experimental results show all the extraction time of the six algorithms presented controls in the ms grade, and the accurate rate and recall rate are up to 92% and 95%. This indicates that the presented information forensics technique is effective.%新型宣传媒介的网络舆情存在大量非法信息.为此,提出一种意会关键词信息取证方法,对中文意会关键词进行定义、分类和量化,给出6种意会关键词提取算法,对提取的证据信息进行完整性处理.实验结果表明,6种算法的提取速度均在毫秒级,查准率和查全率分别达到92%和95%,从而保证在网页舆情监控下非法信息的取证效率.

  5. Bio-forensics

    Energy Technology Data Exchange (ETDEWEB)

    Trewhella, J. (Jill)

    2004-01-01

    Bioforensics presents significant technical challenges. Determining if an outbreak is natural or not, and then providing evidence to trace an outbreak to its origin is very complex. Los Alamos scientists pioneered research and development that has generated leading edge strain identification methods based on sequence data. Molecular characterization of environmental background samples enable development of highly specific pathogen signatures. Economic impacts of not knowing the relationships at the molecular level Many different kinds of data are needed for DNA-based bio-forensics.

  6. Forensic DNA typing in China.

    Science.gov (United States)

    Hou, Y P

    2009-04-01

    In the field of forensic genetics, essential developmental impulses come from the advances of the molecular biology and human genome projects. This paper overviews existing technologies for forensic genetics in China and gives a perspective of forensic DNA analysis. In China, work has been done in the development of blood group serology of the conventional markers. Forensic scientists in China also contributed to the progress of DNA analysis by the validation of numerous test methods and by optimization of these methods. During these years, forensic DNA analysis in China has experienced tremendous progress towards development of robust, efficient and precise protocols, including the development of short tandem repeat analysis, mitochondrial DNA and Y-chromosome analysis. Forensic scientists are constantly looking for new methods to further improve DNA typing. Therefore, this paper also focuses on emerging new technologies in China, which represent an interest for forensic genetics.

  7. Forensic odontology.

    Science.gov (United States)

    Shamim, Thorakkal

    2012-04-01

    Forensic odontology is a specialized field of dentistry which analyses dental evidence in the interest of justice. Forensic odontology embraces all dental specialities and it is almost impossible to segregate this branch from other dental specialities. This review aims to discuss the utility of various dental specialities with forensic odontology.

  8. 基于Windows平台的动态取证系统%Dynamic Forensics System Based on Windows Platform

    Institute of Scientific and Technical Information of China (English)

    文少勇; 王箭; 李剑

    2012-01-01

    针对目前一些动态取证模型的不足,在分布式网络取证模型的基础上设计了一个基于Windows平台的动态取证系统,能够实现网络中的计算机作为作案目标和作案工具双重角色时的取证,具有实时获取多种数据源、取证过程隐秘、取证分析算法可扩展等特点.介绍了动态取证系统中各功能模块设计,并阐述了系统设计中涉及到的关键技术,最后通过模拟测试表明该系统能够在Windows网络下实现动态取证.%In view of the shortages of some dynamic forensics model at present, this paper designs a dynamic forensics system in distributed network forensics model based on Windows platform, which can realize obtaining evidence on the computers that plays a dual role on the network as crime goals and crime tools, and have the characteristic of real-time accessing various data sources, forensics process secretive, forensic analysis algorithm extensible etc. This paper introduces the designing of each function module in the dynamic forensics system at first Second, it lays out the key technology that appears in the design process of the system. Finally, simulation test indicates that the system can realize dynamic forensics in Windows network.

  9. Are there any similarities and/or differences in sex determination methods used in forensic dentistry and paleodontology?

    OpenAIRE

    Aleksandar Kovačević; Lea Gruengold

    2010-01-01

    Estimation of sex is one of the most important procedures in the identification of an unknown person. Teeth are a potential source of information in that process. Estimation of sex in paleodontology is based on two approaches: visual inspection and statistical analysis. Many techniques have been developed within these two approaches. Forensic dentistry and paleodontology are two disciplines that share common observation platforms and methodology.

  10. Forensic chemistry.

    Science.gov (United States)

    Bell, Suzanne

    2009-01-01

    Forensic chemistry is unique among chemical sciences in that its research, practice, and presentation must meet the needs of both the scientific and the legal communities. As such, forensic chemistry research is applied and derivative by nature and design, and it emphasizes metrology (the science of measurement) and validation. Forensic chemistry has moved away from its analytical roots and is incorporating a broader spectrum of chemical sciences. Existing forensic practices are being revisited as the purview of forensic chemistry extends outward from drug analysis and toxicology into such diverse areas as combustion chemistry, materials science, and pattern evidence.

  11. Total reflection x-ray fluorescence spectroscopy (TXRF) a new high sensitivity (PPT) quantitative method for forensic and environmental samples

    Energy Technology Data Exchange (ETDEWEB)

    Kubic, T.A.; Amray, M.S. [ATOMIKA, Bedford, MA (United States); Reus, U. [ATOMKIA Instruments, Munich (Germany)] [and others

    1995-12-31

    Total Reflection X-Ray Fluorescence (TYRF) Spectroscopy instrumentation has recently become available on the U.S. commercial market. This x-ray excited method is touted for its sensitivity (parts per trillion), quantitative ability without the need for multi-element standards and lack of response change to matrix element differences. It has been promoted for use in forensic science and on environmental samples. This paper will discuss the results of a blind studies, wherein well characterized samples of forensic interest and environmental water proficiency tests were submitted for determination of elemental composition and concentration. The results indicate that this instrumentation should be considered by those laboratories analyzing materials at low (trace) concentrations or small (microscopical) size.

  12. Developmental validation of the HIrisPlex system: DNA-based eye and hair colour prediction for forensic and anthropological usage.

    Science.gov (United States)

    Walsh, Susan; Chaitanya, Lakshmi; Clarisse, Lindy; Wirken, Laura; Draus-Barini, Jolanta; Kovatsi, Leda; Maeda, Hitoshi; Ishikawa, Takaki; Sijen, Titia; de Knijff, Peter; Branicki, Wojciech; Liu, Fan; Kayser, Manfred

    2014-03-01

    Forensic DNA Phenotyping or 'DNA intelligence' tools are expected to aid police investigations and find unknown individuals by providing information on externally visible characteristics of unknown suspects, perpetrators and missing persons from biological samples. This is especially useful in cases where conventional DNA profiling or other means remain non-informative. Recently, we introduced the HIrisPlex system, capable of predicting both eye and hair colour from DNA. In the present developmental validation study, we demonstrate that the HIrisPlex assay performs in full agreement with the Scientific Working Group on DNA Analysis Methods (SWGDAM) guidelines providing an essential prerequisite for future HIrisPlex applications to forensic casework. The HIrisPlex assay produces complete profiles down to only 63 pg of DNA. Species testing revealed human specificity for a complete HIrisPlex profile, while only non-human primates showed the closest full profile at 20 out of the 24 DNA markers, in all animals tested. Rigorous testing of simulated forensic casework samples such as blood, semen, saliva stains, hairs with roots as well as extremely low quantity touch (trace) DNA samples, produced complete profiles in 88% of cases. Concordance testing performed between five independent forensic laboratories displayed consistent reproducible results on varying types of DNA samples. Due to its design, the assay caters for degraded samples, underlined here by results from artificially degraded DNA and from simulated casework samples of degraded DNA. This aspect was also demonstrated previously on DNA samples from human remains up to several hundreds of years old. With this paper, we also introduce enhanced eye and hair colour prediction models based on enlarged underlying databases of HIrisPlex genotypes and eye/hair colour phenotypes (eye colour: N = 9188 and hair colour: N = 1601). Furthermore, we present an online web-based system for individual eye and hair colour

  13. Defining a Forensic Audit

    Directory of Open Access Journals (Sweden)

    Stevenson G. Smith

    2009-03-01

    Full Text Available Disclosures about new financial frauds and scandals are continually appearing in the press.  As a consequence, the accounting profession's traditional methods of monitoring corporate financial activities are under intense scrutiny.  At the same time, there is recognition that principles-based GAAP from the International Accounting Standards Board will become the recognized standard in the U.S.  The authors argue that these two factors will change the practices used to fight corporate malfeasance as investigators adapt the techniques of accounting into a forensic audit engagement model.

  14. Using a Forensic Research Method for Establishing an Alternative Method for Audience Measurement in Print Advertising

    DEFF Research Database (Denmark)

    Schmidt, Marcus; Krause, Niels; Solgaard, Hans Stubbe

    2012-01-01

    Advantages and disadvantages of the survey approach are discussed. It is hypothesized that observational methods sometimes constitute reasonable and powerful substitute to traditional survey methods. Under certain circumstances, unobtrusive methods may even outperform traditional techniques. Non-...

  15. Using a Forensic Research Method for Establishing an Alternative Method for Audience Measurement in Print Advertising

    DEFF Research Database (Denmark)

    Schmidt, Marcus; Krause, Niels; Solgaard, Hans Stubbe

    2012-01-01

    Advantages and disadvantages of the survey approach are discussed. It is hypothesized that observational methods sometimes constitute reasonable and powerful substitute to traditional survey methods. Under certain circumstances, unobtrusive methods may even outperform traditional techniques. Non...

  16. Forensic Science: Hair Identification.

    Science.gov (United States)

    Keller, Elhannan L.

    1980-01-01

    Presented is an activity in which students use a microscope to do a forensic hair comparative study and a medullary classification. Mounting methods, medulla types, hair photographs, and activities are described. (DS)

  17. Exploring trends in forensic odontology.

    Science.gov (United States)

    Singh, Narendra Nath; Gowhar, Owais; Ain, Tasneem S; Sultan, Saima

    2014-12-01

    Forensic odontology nowadays has become a developing science and is of great importance to society. It is important that dental practitioners should have a proper knowledge of forensics as the need has increased greatly over the last decades due to the unprecedented demand from the criminal justice including terrorism in Kashmir valley (J&K India). Data was collected based on questionnaire survey among qualified dental practitioners related to their awareness of forensic odontology. A total number of 235 dental practitioners responded to the questionnaire. RESULTS showed that there was a low confidence, in handling of forensic odontology related cases among dental practitioners and majority of dental practitioners were not having any formal training in forensic odontology. Each dental practitioner has a responsibility to understand the forensic implications associated with the practice of his profession and thus he should work sincerely enough so to ensure his contribution in the field of forensic odontology.

  18. Molecular Imprinting Applications in Forensic Science.

    Science.gov (United States)

    Yılmaz, Erkut; Garipcan, Bora; Patra, Hirak K; Uzun, Lokman

    2017-03-28

    Producing molecular imprinting-based materials has received increasing attention due to recognition selectivity, stability, cast effectiveness, and ease of production in various forms for a wide range of applications. The molecular imprinting technique has a variety of applications in the areas of the food industry, environmental monitoring, and medicine for diverse purposes like sample pretreatment, sensing, and separation/purification. A versatile usage, stability and recognition capabilities also make them perfect candidates for use in forensic sciences. Forensic science is a demanding area and there is a growing interest in molecularly imprinted polymers (MIPs) in this field. In this review, recent molecular imprinting applications in the related areas of forensic sciences are discussed while considering the literature of last two decades. Not only direct forensic applications but also studies of possible forensic value were taken into account like illicit drugs, banned sport drugs, effective toxins and chemical warfare agents in a review of over 100 articles. The literature was classified according to targets, material shapes, production strategies, detection method, and instrumentation. We aimed to summarize the current applications of MIPs in forensic science and put forth a projection of their potential uses as promising alternatives for benchmark competitors.

  19. Nicephor[e]: a web-based solution for teaching forensic and scientific photography.

    Science.gov (United States)

    Voisard, R; Champod, C; Furrer, J; Curchod, J; Vautier, A; Massonnet, G; Buzzini, P

    2007-04-11

    Nicephor[e] is a project funded by "Swiss Virtual Campus" and aims at creating a distant or mixed web-based learning system in forensic and scientific photography and microscopy. The practical goal is to organize series of on-line modular courses corresponding to the educational requirements of undergraduate academic programs. Additionally, this program could be used in the context of continuing educational programs. The architecture of the project is designed to guarantee a high level of knowledge in forensic and scientific photographic techniques, and to have an easy content production and the ability to create a number of different courses sharing the same content. The e-learning system Nicephor[e] consists of three different parts. The first one is a repository of learning objects that gathers all theoretical subject matter of the project such as texts, animations, images, and films. This repository is a web content management system (Typo3) that permits creating, publishing, and administrating dynamic content via a web browser as well as storing it into a database. The flexibility of the system's architecture allows for an easy updating of the content to follow the development of photographic technology. The instructor of a course can decide which modular contents need to be included in the course, and in which order they will be accessed by students. All the modular courses are developed in a learning management system (WebCT or Moodle) that can deal with complex learning scenarios, content distribution, students, tests, and interaction with instructor. Each course has its own learning scenario based on the goals of the course and the student's profile. The content of each course is taken from the content management system. It is then structured in the learning management system according to the pedagogical goals defined by the instructor. The modular courses are created in a highly interactive setting and offer autoevaluating tests to the students. The last

  20. Body fluid identification in forensics

    Directory of Open Access Journals (Sweden)

    Ja Hyun An1, Kyoung-Jin Shin1,2, Woo Ick Yang1 & Hwan Young Lee1,2,*

    2012-10-01

    Full Text Available At a crime scene can give important insights into crime scenereconstruction by supporting a link between sample donorsand actual criminal acts. For more than a century, numeroustypes of body fluid identification methods have beendeveloped, such as chemical tests, immunological tests,protein catalytic activity tests, spectroscopic methods andmicroscopy. However, these conventional body fluididentification methods are mostly presumptive, and are carriedout for only one body fluid at a time. Therefore, the use of amolecular genetics-based approach using RNA profiling orDNA methylation detection has been recently proposed tosupplant conventional body fluid identification methods.Several RNA markers and tDMRs (tissue-specific differentiallymethylated regions which are specific to forensically relevantbody fluids have been identified, and their specificities andsensitivities have been tested using various samples. In thisreview, we provide an overview of the present knowledge andthe most recent developments in forensic body fluididentification and discuss its possible practical application toforensic casework.

  1. Forensic entomology

    Science.gov (United States)

    Amendt, Jens; Krettek, Roman; Zehner, Richard

    Necrophagous insects are important in the decomposition of cadavers. The close association between insects and corpses and the use of insects in medicocriminal investigations is the subject of forensic entomology. The present paper reviews the historical background of this discipline, important postmortem processes, and discusses the scientific basis underlying attempts to determine the time interval since death. Using medical techniques, such as the measurement of body temperature or analysing livor and rigor mortis, time since death can only be accurately measured for the first two or three days after death. In contrast, by calculating the age of immature insect stages feeding on a corpse and analysing the necrophagous species present, postmortem intervals from the first day to several weeks can be estimated. These entomological methods may be hampered by difficulties associated with species identification, but modern DNA techniques are contributing to the rapid and authoritative identification of necrophagous insects. Other uses of entomological data include the toxicological examination of necrophagous larvae from a corpse to identify and estimate drugs and toxicants ingested by the person when alive and the proof of possible postmortem manipulations. Forensic entomology may even help in investigations dealing with people who are alive but in need of care, by revealing information about cases of neglect.

  2. Mendel Meets CSI: Forensic Genotyping as a Method to Teach Genetics & DNA Science

    Science.gov (United States)

    Kurowski, Scotia; Reiss, Rebecca

    2007-01-01

    This article describes a forensic DNA science laboratory exercise for advanced high school and introductory college level biology courses. Students use a commercial genotyping kit and genetic analyzer or gene sequencer to analyze DNA recovered from a fictitious crime scene. DNA profiling and STR genotyping are outlined. DNA extraction, PCR, and…

  3. A ranking index for quality assessment of forensic DNA profiles forensic DNA profiles

    Science.gov (United States)

    2010-01-01

    Background Assessment of DNA profile quality is vital in forensic DNA analysis, both in order to determine the evidentiary value of DNA results and to compare the performance of different DNA analysis protocols. Generally the quality assessment is performed through manual examination of the DNA profiles based on empirical knowledge, or by comparing the intensities (allelic peak heights) of the capillary electrophoresis electropherograms. Results We recently developed a ranking index for unbiased and quantitative quality assessment of forensic DNA profiles, the forensic DNA profile index (FI) (Hedman et al. Improved forensic DNA analysis through the use of alternative DNA polymerases and statistical modeling of DNA profiles, Biotechniques 47 (2009) 951-958). FI uses electropherogram data to combine the intensities of the allelic peaks with the balances within and between loci, using Principal Components Analysis. Here we present the construction of FI. We explain the mathematical and statistical methodologies used and present details about the applied data reduction method. Thereby we show how to adapt the ranking index for any Short Tandem Repeat-based forensic DNA typing system through validation against a manual grading scale and calibration against a specific set of DNA profiles. Conclusions The developed tool provides unbiased quality assessment of forensic DNA profiles. It can be applied for any DNA profiling system based on Short Tandem Repeat markers. Apart from crime related DNA analysis, FI can therefore be used as a quality tool in paternal or familial testing as well as in disaster victim identification. PMID:21062433

  4. Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis

    Directory of Open Access Journals (Sweden)

    G. Geethakumari

    2012-07-01

    Full Text Available Even though Cloud Computing has proved its utility and efficacy in many areas, security threats are a major obstacle in its widespread application. Cloud Forensics, with its existing equipment, has played an important role in improving our understanding of these threats, thereby contributing to the development of better and more robust cloud computing systems.In our earlier work, we introduced the use of fuzzy clustering techniques to detect and record malicious activities in cloudfor building strong and reliable evidences of the attacks. We now discuss the method in detail with certain essential aspects of its implementation. We also suggest ways to improve the time-complexity of the relevant back-end calculations.

  5. Printer identification based on graylevel co-occurrence features for security and forensic applications

    Science.gov (United States)

    Mikkilineni, Aravind K.; Chiang, Pei-Ju; Ali, Gazi N.; Chiu, George T. C.; Allebach, Jan P.; Delp, Edward J., III

    2005-03-01

    In today's digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. Many techniques have been developed to protect audio, video, digital documents, images, and programs (executable code). One example is watermarking of digital audio and images. We believe that a similar type of protection for printed documents is very important. The goals of our work are to securely print and trace documents on low cost consumer printers such as inkjet and electrophotographic (laser) printers. We will accomplish this through the use of intrinsic and extrinsic features obtained from modelling the printing process. In this paper we describe the use of image texture analysis to identify the printer used to print a document. In particular we will describe a set of features that can be used to provide forensic information about a document. We will demonstrate our methods using 10 EP printers.

  6. Forensic entomology: implementing quality assurance for expertise work.

    Science.gov (United States)

    Gaudry, Emmanuel; Dourel, Laurent

    2013-09-01

    The Department of Forensic Entomology (Institut de Recherche Criminelle de la Gendarmerie Nationale, France) was accredited by the French Committee of Accreditation (Cofrac's Healthcare section) in October 2007 on the basis of NF EN ISO/CEI 17025 standard. It was the first accreditation in this specific field of forensic sciences in France and in Europe. The present paper introduces the accreditation process in forensic entomology (FE) through the experience of the Department of Forensic Entomology. Based upon the identification of necrophagous insects and the study of their biology, FE must, as any other expertise work in forensic sciences, demonstrate integrity and good working practice to satisfy both the courts and the scientific community. FE does not, strictly speaking, follow an analytical method. This could explain why, to make up for a lack of appropriate quality reference, a specific documentation was drafted and written by the staff of the Department of Forensic Entomology in order to define working methods complying with quality standards (testing methods). A quality assurance system is laborious to set up and maintain and can be perceived as complex, time-consuming and never-ending. However, a survey performed in 2011 revealed that the accreditation process in the frame of expertise work has led to new well-defined working habits, based on an effort at transparency. It also requires constant questioning and a proactive approach, both profitable for customers (magistrates, investigators) and analysts (forensic entomologists).

  7. Forensic identification: From a faith-based "Science" to a scientific science.

    Science.gov (United States)

    Saks, Michael J

    2010-09-10

    This article reviews the fundamental assumptions of forensic identification ("individualization") science and notes the lack of empirical evidence or theory supporting its typical strong claims. The article then discusses three general research strategies for placing these fields on firmer scientific ground. It concludes by suggesting what forensic identification science experts can do while awaiting that scientific foundation.

  8. Forensic Phonetics.

    Science.gov (United States)

    Nolan, Francis

    1991-01-01

    Examines, with skepticism, the history and development of forensic phonetics in response to the publication of "Forensic Phonetics" by J. Baldwin and P. French (1990). Three issues are specifically explored: (1) whether voices are unique, (2) whether a purely auditory approach is adequate, and (3) whether legally sufficient conclusions…

  9. Accuracy Rates of Sex Estimation by Forensic Anthropologists through Comparison with DNA Typing Results in Forensic Casework.

    Science.gov (United States)

    Thomas, Richard M; Parks, Connie L; Richard, Adam H

    2016-09-01

    A common task in forensic anthropology involves the estimation of the biological sex of a decedent by exploiting the sexual dimorphism between males and females. Estimation methods are often based on analysis of skeletal collections of known sex and most include a research-based accuracy rate. However, the accuracy rates of sex estimation methods in actual forensic casework have rarely been studied. This article uses sex determinations based on DNA results from 360 forensic cases to develop accuracy rates for sex estimations conducted by forensic anthropologists. The overall rate of correct sex estimation from these cases is 94.7% with increasing accuracy rates as more skeletal material is available for analysis and as the education level and certification of the examiner increases. Nine of 19 incorrect assessments resulted from cases in which one skeletal element was available, suggesting that the use of an "undetermined" result may be more appropriate for these cases.

  10. DNA methylation-based forensic age prediction using artificial neural networks and next generation sequencing.

    Science.gov (United States)

    Vidaki, Athina; Ballard, David; Aliferi, Anastasia; Miller, Thomas H; Barron, Leon P; Syndercombe Court, Denise

    2017-02-28

    The ability to estimate the age of the donor from recovered biological material at a crime scene can be of substantial value in forensic investigations. Aging can be complex and is associated with various molecular modifications in cells that accumulate over a person's lifetime including epigenetic patterns. The aim of this study was to use age-specific DNA methylation patterns to generate an accurate model for the prediction of chronological age using data from whole blood. In total, 45 age-associated CpG sites were selected based on their reported age coefficients in a previous extensive study and investigated using publicly available methylation data obtained from 1156 whole blood samples (aged 2-90 years) analysed with Illumina's genome-wide methylation platforms (27K/450K). Applying stepwise regression for variable selection, 23 of these CpG sites were identified that could significantly contribute to age prediction modelling and multiple regression analysis carried out with these markers provided an accurate prediction of age (R(2)=0.92, mean absolute error (MAE)=4.6 years). However, applying machine learning, and more specifically a generalised regression neural network model, the age prediction significantly improved (R(2)=0.96) with a MAE=3.3 years for the training set and 4.4 years for a blind test set of 231 cases. The machine learning approach used 16 CpG sites, located in 16 different genomic regions, with the top 3 predictors of age belonged to the genes NHLRC1, SCGN and CSNK1D. The proposed model was further tested using independent cohorts of 53 monozygotic twins (MAE=7.1 years) and a cohort of 1011 disease state individuals (MAE=7.2 years). Furthermore, we highlighted the age markers' potential applicability in samples other than blood by predicting age with similar accuracy in 265 saliva samples (R(2)=0.96) with a MAE=3.2 years (training set) and 4.0 years (blind test). In an attempt to create a sensitive and accurate age prediction test, a next

  11. Development of two highly sensitive forensic sex determination assays based on human DYZ1 and Alu repetitive DNA elements.

    Science.gov (United States)

    Fazi, Amanda; Gobeski, Brianne; Foran, David

    2014-11-01

    Sex determination is a critical component of forensic identification, the standard genetic method for which is detection of the single copy amelogenin gene that has differing homologues on the X and Y chromosomes. However, this assay may not be sensitive enough when DNA samples are minute or highly compromised, thus other strategies for sex determination are needed. In the current research, two ultrasensitive sexing assays, based on real-time PCR and pyrosequencing, were developed targeting the highly repetitive elements DYZ1 on the Y chromosome and Alu on the autosomes. The DYZ1/Alu strategy was compared to amelogenin for overall sensitivity based on high molecular weight and degraded DNA, followed by assaying the sex of 34 touch DNA samples and DNA from 30 hair shafts. The real-time DYZ1/Alu assay proved to be approximately 1500 times more sensitive than its amelogenin counterpart based on high molecular weight DNA, and even more sensitive when sexing degraded DNA. The pyrosequencing DYZ1/Alu assay correctly sexed 26 of the touch DNAs, compared to six using amelogenin. Hair shaft DNAs showed equally improved sexing results using the DYZ1/Alu assays. Overall, both DYZ1/Alu assays were far more sensitive and accurate than was the amelogenin assay, and thus show great utility for sexing poor quality and low quantity DNA evidence.

  12. 纸张物证的分析检验方法%Analysis Methods of Forensic Paper

    Institute of Scientific and Technical Information of China (English)

    刘猛; 余静; 王继芬; 彭泊远

    2013-01-01

    纸张是犯罪现场经常出现的物证.对纸张物证的分析检验在案件侦破中有着重要作用,因此,法庭科学工作者一直对纸张物证的检验方法进行深入研究.随着法庭科学实验室的发展,纸张的检验技术得到了长足的进步,由传统的单一仪器分析方法发展到现在多种分析技术的联合应用,从而建立了快速、有效、灵敏的检验方法,为涉及纸张物证的案件侦破做出了显著的贡献.本文对纸张物证的分析检验方法进行了介绍和讨论.%Papers always appear in the criminal scene as important forensic evidence,and the possibility to discriminate between sheets of paper can be of considerable importance in forensic science.As the development of science and technology,a host of different techniques have been applied to the analysis of forensic paper.Our goal is to establish a fast,efficient,sensitive and reproducible analytical protocol for the identification and comparison of paper samples.Herein the various methods on the investigation of paper were introduced.

  13. Computed Tomography in Forensic Medicine

    DEFF Research Database (Denmark)

    Leth, Peter Mygind

    2015-01-01

    Modern diagnostic imagining techniques are gaining popularity in forensic medicine. Denmark has been involved in the development of this use of imaging techniques from the beginning. The Institute of Forensic Medicine at the University of Southern Denmark acquired a helical computed tomography (CT...... AND METHODS: This thesis investigated 900 forensic cases that were CT-scanned and autopsied at the Institute of Forensic Medicine, University of Southern Denmark, from 2006-2011. The scanner was a Siemens Somatom Spirit dual-slice CT-scanner with a Siemens Syngo MultiModality workstation. Contrast enhancement...

  14. Internet and forensic science

    Science.gov (United States)

    Chamakura, Reddy P.

    1997-02-01

    The Internet is a very powerful and inexpensive tool that was created for the free distribution of knowledge and information. The Internet is a learning tool, a research tool, a virtual library without borders and membership requirements, a journal with instant publication, a help desk, and a newspaper/journal with current information. Very soon, when live audio and video transmission is perfected, the Internet also will be a live classroom and everyday conference. Forensic scientists, laboratories and colleges should make use of information already available on the Internet. They also should actively participate and contribute. Very few forensic scientists and laboratories have made their presence felt by setting up their home pages/web pages. But, there is tremendous growth during the past year. Immense benefits from Internet to forensic community are discussed along with the author's personal experience. Creating on-line searchable data bases in all specialties of forensic science is an urgent need. Leading forensic journals should take a lead and create on-line searchable indexes with abstracts. On line electronic publishing, collaborative research/paper publishing or editing is easy, fast, economical and convenient through the use of the Internet. Creation of Internet repositories of unpublished papers is an idea worth looking into. Internet also can be used to give training, re-training or advanced training to students/forensic scientists.

  15. [Metabonomics and its perspective on forensic medicine].

    Science.gov (United States)

    Zhang, Gao-Qin; Wang, Mei; Zhang, Da-Ming; Liu, Yao

    2010-10-01

    Metabolomics is a new study, which use chromatography, mass spectrometry, nuclear magnetic resonance (NMR), capillary electrophoresis (CE) techniques on the cells, organs and other body fluids and metabolites in samples were isolated, purified and testing, re-use bioinformatics tools on the obtained data are analyzed to obtain one or a set of biomarker information. Based on analysis of the literatures in recent years, metabolomics was summarized from history, concept, advantage, methods, application, difficulties and challenges, journals and books, websites, and its application in forensic medicine was forecasted. As a new branch of global system biology, metabonomics developed rapidly, and its perspective on forensic medicine was feasible and very optimistic.

  16. UNIX系统取证分析方法%UNIX Forensic Analysis Method

    Institute of Scientific and Technical Information of China (English)

    殷联甫

    2010-01-01

    UNIX作为目前最常用的主流操作系统之一,研究UNIX系统的取证分析方法具有非常重要的现实意义.本文首先介绍从UNIX系统中获取易失性数据的方法,然后介绍获取被入侵UNIX机器上的硬盘数据,建立取证映像(forensic image),然后进行取证分析的具体步骤和方法.

  17. Filtering Intrusion Forensic Data Based on Attack Signatures%基于攻击特征的自动证据筛选技术

    Institute of Scientific and Technical Information of China (English)

    伏晓; 谢立

    2011-01-01

    Computer forensics is a new field on computer evidences process.This field is very important and practical, so it has drawn more and more attention in recent years.Intrusion forensics is a specific area of computer forensics, and has been applied to computer intrusion activities.It is a hot area because a large proportion of the computer crimes are intrusion activities.When investigating intrusion activities, one key step is obtaining intrusion evidences.In order to get this kind of evidences automatically, an attack-signature-based method for filtering intrusion forensic data is proposed.It mainly includes the following steps: Firstly, the detail behaviors of the attack being investigated are reconstructed based on its attack signatures; Then the attack features which are required by the filter are extracted from these details; Finally, according to the similarity between attack features and candidate data, all evidences related to the attack being investigated can be gotobtained.The experiment results on DARPA 2000 have proved that our method has high accuracy and its completeness is almost 100%.Compared with current methods, our method shows more advantages.For example it needs little manual work and can process more complex intrusion scenarios.Moreover,it has higher performance and can find more types of evidences.%为了自动获得入侵证据,提出一种基于攻击特征的自动证据筛选方法.其原理是首先根据被调查攻击的特征重构出攻击行为细节,并从中抽取筛选证据需要的"特征信息".然后,再根据候选数据与这些特征信息的匹配程度筛选出该攻击相关的证据.基于DARPA 2000的实验表明这种方法具有很高的准确率,其完备性更是接近100%.而与现有方法的比较则显示出这种方法能克服现有方法人工干预较多、效率低下、仅能筛选特定证据类型、不适合处理复杂攻击等诸多缺陷.

  18. Forensic massively parallel sequencing data analysis tool: Implementation of MyFLq as a standalone web- and Illumina BaseSpace(®)-application.

    Science.gov (United States)

    Van Neste, Christophe; Gansemans, Yannick; De Coninck, Dieter; Van Hoofstat, David; Van Criekinge, Wim; Deforce, Dieter; Van Nieuwerburgh, Filip

    2015-03-01

    Routine use of massively parallel sequencing (MPS) for forensic genomics is on the horizon. The last few years, several algorithms and workflows have been developed to analyze forensic MPS data. However, none have yet been tailored to the needs of the forensic analyst who does not possess an extensive bioinformatics background. We developed our previously published forensic MPS data analysis framework MyFLq (My-Forensic-Loci-queries) into an open-source, user-friendly, web-based application. It can be installed as a standalone web application, or run directly from the Illumina BaseSpace environment. In the former, laboratories can keep their data on-site, while in the latter, data from forensic samples that are sequenced on an Illumina sequencer can be uploaded to Basespace during acquisition, and can subsequently be analyzed using the published MyFLq BaseSpace application. Additional features were implemented such as an interactive graphical report of the results, an interactive threshold selection bar, and an allele length-based analysis in addition to the sequenced-based analysis. Practical use of the application is demonstrated through the analysis of four 16-plex short tandem repeat (STR) samples, showing the complementarity between the sequence- and length-based analysis of the same MPS data. Copyright © 2014 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  19. Testing Framework for Mobile Device Forensics Tools

    Directory of Open Access Journals (Sweden)

    Maxwell Anobah

    2014-09-01

    Full Text Available The proliferation of mobile communication and computing devices, in particular smart mobile phones, is almost paralleled with the increasing number of mobile device forensics tools in the market. Each mobile forensics tool vendor, on one hand claims to have a tool that is best in terms of performance, while on the other hand each tool vendor seems to be using different standards for testing their tools and thereby defining what support means differently. To overcome this problem, a testing framework based on a series of tests ranging from basic forensics tasks such as file system reconstruction up to more complex ones countering antiforensic techniques is proposed. The framework, which is an extension of an existing effort done in 2010, prescribes a method to clearly circumscribe the term support into precise levels. It also gives an idea of the standard to be developed and accepted by the forensic community that will make it easier for forensics investigators to quickly select the most appropriate tool for a particular mobile device.

  20. DESIDERATUM OF NEW REALITY: FORENSIC AUTHORSHIP ATTRIBUTION

    OpenAIRE

    2012-01-01

    The overarching premise in this discussion is to reiterate the cross-disciplinary intersection between law and language. Correspondingly, the application of language studies to legal issues generates a separate domain, referred to as forensic linguistics. The paper looks into one aspect of forensic linguistics, namely forensic authorship attribution that entails the process of identifying the author of an anonymous text by employing methods and features of forensic linguistics. This concept i...

  1. Best practice approach to live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-07-01

    Full Text Available The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically sound...

  2. Forensics Investigator

    Science.gov (United States)

    ... science, and several more offer degrees in chemistry, biochemistry, or genetic engineering with an emphasis on forensic ... Related Videos If you like this career, checkout these videos: Dr. Lois Tully NIST: Explanation of DNA ...

  3. A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ms. S. M. Nirkhi

    2013-07-01

    Full Text Available Mobile Ad Hoc Network (MANET is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ways of security compromise is denial of services (DoS form of attack, this attack may paralyze a node or the entire network and when coordinated by group of attackers is considered as distributed denial of services (DDoS attack. A typical, DoS attack is flooding excessive volume of traffic to deplete key resources of the target network. In MANET flooding can be done at routing. Ad Hoc nature of MANET calls for dynamic route management. In flat ad hoc routing categories there falls the reactive protocols sub category, in which one of the most prominent member of this subcategory is dynamic source routing (DSR which works well for smaller number of nodes and low mobility situations. DSR allows on demand route discovery, for this they broadcast a route request message (RREQ. Intelligently flooding RREQ message there forth causing DoS or DDoS attack, making targeted network paralyzed for a small duration of time is not very difficult to launch and have potential of loss to the network. After an attack on the target system is successful enough to crash or disrupt MANET for some period of time, this event of breach triggers for investigation. Investigation and forensically analyzing attack scenario provides the source of digital proof against attacker. In this paper, the parameters for RREQ flooding are pointed, on basis of these parameters fuzzy logic based rules are deduced and described for both DoS and DDoS. We implemented a fuzzy forensic tool to determine the flooding RREQ attack of the form DoS and DDoS. For this implementation various experiments and

  4. Digital Forensics

    OpenAIRE

    Ψευτέλης, Αθανάσιος Δημήτρης

    2013-01-01

    A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society Since the 1980s, computers have had increasing roles in all aspects of human life—including an involvement in criminal acts. This development has led to the rise of digital forensics, the uncovering and examination of evidence located on all things electronic with digital storage, including computers, cell phones, and networks. Digital forensics researchers and practitione...

  5. Forensic psychologist

    Directory of Open Access Journals (Sweden)

    Tinkara Pavšič Mrevlje

    2011-04-01

    Full Text Available The paper is a review of different issues that a forensic psychologists encounter at work. Forensic assessment might be needed in civil law cases, administrative procedures and in criminal law cases. The paper focuses on referrals in criminal law cases regarding matters such as assessing competence to stand trial, criminal responsibility and violence risk assessment. Finally, the role of expert testimony on eyewitness memory, which is not used in practice in Slovenia yet, is presented.

  6. An environmental forensic approach for tropical estuaries based on metal bioaccumulation in tissues of Callinectes danae.

    Science.gov (United States)

    Bordon, Isabella C A C; Sarkis, Jorge E S; Andrade, Nathalia P; Hortellani, Marcos A; Favaro, Deborah I T; Kakazu, Mauricio H; Cotrim, Marycel E B; Lavradas, Raquel T; Moreira, Isabel; Saint'Pierre, Tatiana D; Hauser-Davis, Rachel Ann

    2016-01-01

    The blue crab Callinectes danae is distributed throughout the Atlantic coast and this study aimed to evaluate a environmental forensics approach that could be applied at tropical estuarine systems where this species is distributed, based on the metal concentrations in its tissues. For this purpose, blue crab samples were collected in 9 sites (distributed in 3 areas) along the Santos Estuarine System, state of São Paulo, Brazil. The concentrations of Al, Cd, Co, Cr, Cu, Fe, Hg, Mn, Ni, Pb and Zn were determined in gills, hepatopancreas and muscle tissues. Sediment samples were collected and analyzed in these same sites. A data distribution pattern was identified during both sampling periods (August and December 2011). In order to validate this model, a new sampling campaign was performed in March 2013 at the Santos Estuarine System and also at Ilha Grande (state of Rio de Janeiro). These data were added to the previous database (composed of the August and December 2011 samples) and a discriminant analysis was applied. The results confirmed an environmental fingerprint for the Santos Estuarine System.

  7. Content-based Video Forensics%基于内容的视频取证研究

    Institute of Scientific and Technical Information of China (English)

    惠雯; 赵海英; 林闯; 杨扬

    2012-01-01

    基于内容的视频取证技术是检验视频内容合法性的一种有效方法,目前已成为多媒体安全领域的研究热点.该技术利用视频指纹,直接提取媒体对象内容的各种特征作为证据,具有较强的实用性.在典型的视频取证模型中,提取视频指纹需要经过镜头分割、关键帧选取和指纹提取等过程.分析和总结了这3个过程所涉及的各种算法及其近年来的研究进展情况.%Content-based video forensics is an effective technique to detect the legality of video content Nowadays, it has been a hot in the research field of multimedia security. By taking advantage of video fingerprint, this technique can extract varieties of visual features from illegal videos as evidence. In a typical video forensics model,the process of fingerprint extraction consists of shot segmentation, key frame extraction and fingerprint extraction. Thus, this paper analyzed content-based video forensics technique from these three aspects,and introduced the research development of the related algorithms.

  8. Learning about Bayesian networks for forensic interpretation: an example based on the 'the problem of multiple propositions'.

    Science.gov (United States)

    Biedermann, A; Voisard, R; Taroni, F

    2012-09-01

    Both, Bayesian networks and probabilistic evaluation are gaining more and more widespread use within many professional branches, including forensic science. Notwithstanding, they constitute subtle topics with definitional details that require careful study. While many sophisticated developments of probabilistic approaches to evaluation of forensic findings may readily be found in published literature, there remains a gap with respect to writings that focus on foundational aspects and on how these may be acquired by interested scientists new to these topics. This paper takes this as a starting point to report on the learning about Bayesian networks for likelihood ratio based, probabilistic inference procedures in a class of master students in forensic science. The presentation uses an example that relies on a casework scenario drawn from published literature, involving a questioned signature. A complicating aspect of that case study - proposed to students in a teaching scenario - is due to the need of considering multiple competing propositions, which is an outset that may not readily be approached within a likelihood ratio based framework without drawing attention to some additional technical details. Using generic Bayesian networks fragments from existing literature on the topic, course participants were able to track the probabilistic underpinnings of the proposed scenario correctly both in terms of likelihood ratios and of posterior probabilities. In addition, further study of the example by students allowed them to derive an alternative Bayesian network structure with a computational output that is equivalent to existing probabilistic solutions. This practical experience underlines the potential of Bayesian networks to support and clarify foundational principles of probabilistic procedures for forensic evaluation.

  9. [The application of dermatoglyphics as a method for the characteristic of the personality traits for the purpose of the forensic medical identification expertise].

    Science.gov (United States)

    Bozhchenko, A P; Teplov, K V; Nazarova, N E; Nazarov, Yu V

    2016-01-01

    The authors report a case of forensic medical expertise demonstrating the potential of the dermatoglyphic technique as a tool for the identification of the personality traits of unknown individuals including their race and ethnic background, biological age, constitutional characteristics, congenital and acquired pathologies and injuries. It was shown that the results of the dermatoglyphic studies agree with and complement the data obtained with the help of a set of traditional forensic medical investigations, such as urological, odontoscopic, and roentgenological ones. An important advantage of the dermatoglyphic techniques is the possibility of their application under conditions when the choice and the use of the alternative methods are limited by the specific features of the objects of forensic medical expertise and the lack of time.

  10. Forensic Analysis of Digital Dynamic Signatures: New Methods for Data Treatment and Feature Evaluation.

    Science.gov (United States)

    Linden, Jacques; Marquis, Raymond; Mazzella, Williams

    2017-03-01

    This study explored digital dynamic signatures containing quantifiable dynamic data. The change in data content and nature necessitates the development of new data treatment approaches. A SignPad Omega digitizing tablet was used to assess measurement reproducibility, as well as within-writer variation and the occurrence of correctly simulated features. Measurement reproducibility was found to be high except for pressure information. Within-writer variation was found to be higher between days than on a same day. Occurrence of correct simulation was low for features such as signature size, trajectory length, and total signature time. Feature discrimination factors combining within-writer variability and the occurrence of correctly simulated features were computed and show that signature size, trajectory length, and signature time are the features that perform the best for discriminating genuine from simulated signatures. A final experiment indicates that dynamic information can be used to create connections between simulation cases. © 2016 American Academy of Forensic Sciences.

  11. Progress of DNA-based Methods for Species Identification

    Institute of Scientific and Technical Information of China (English)

    HU Zhen; ZHANG Su-hua; WANG Zheng; BIAN Ying-nan; LI Cheng-tao

    2015-01-01

    Species identification of biological samples is widely used in such fields as forensic science and food industry. A variety of accurate and reliable methods have been developed in recent years. The cur-rent reviewshows common target genes and screening criteria suitable for species identification, and de-scribed various DNA-based molecular biology methods about species identification. Additionally, it dis-cusses the future development of species identification combined with real-time PCR and sequencing technologies.

  12. Expansion of Microbial Forensics.

    Science.gov (United States)

    Schmedes, Sarah E; Sajantila, Antti; Budowle, Bruce

    2016-08-01

    Microbial forensics has been defined as the discipline of applying scientific methods to the analysis of evidence related to bioterrorism, biocrimes, hoaxes, or the accidental release of a biological agent or toxin for attribution purposes. Over the past 15 years, technology, particularly massively parallel sequencing, and bioinformatics advances now allow the characterization of microorganisms for a variety of human forensic applications, such as human identification, body fluid characterization, postmortem interval estimation, and biocrimes involving tracking of infectious agents. Thus, microbial forensics should be more broadly described as the discipline of applying scientific methods to the analysis of microbial evidence in criminal and civil cases for investigative purposes. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  13. Forensic postmortem computed tomography

    DEFF Research Database (Denmark)

    Jakobsen, Lykke Schrøder; Lundemose, Sissel; Banner, Jytte

    2016-01-01

    differences. CONCLUSIONS: Noninvasive in situ PMCT methods for organ measuring, as performed in this study, are not useful tools in forensic pathology. The best method to estimate organ volume is a CT-scan of the eviscerated organ. PMCT-determined CTR seems to be useless for ascertaining cardiomegaly...

  14. A Review of Network Forensics Techniques for the Analysis of Web Based Attack

    Directory of Open Access Journals (Sweden)

    Mr. Sudhakar Parate, Ms. S. M. Nirkhi

    2012-12-01

    Full Text Available Network forensics has been the most prevalenttechnology to investigate different attack. It used fortroubleshooting connection issues and helping tosolve various network security problems, such assystem log, router log, and access control. NetworkForensic help to identify the evidences of datasource as intermediate side and the end sides. Thispaper gives comprehensive review on varioustechniques that helps to improve the system,analysis of different attack, detection of attack. Itfocuses on the critical stages of preservation andacquisition of digital evidence from the differentsource to be used as evidence for aidinginvestigation.

  15. Forensic value of the Lugol's staining method: further studies on glycogenated epithelium in the male urinary tract.

    Science.gov (United States)

    Hausmann, R; Schellmann, B

    1994-01-01

    This study presents findings from a series of investigations on the presence of glycogenated epithelium in the male urinary tract and on the penile surface in order to assess the forensic value of the Lugol's method for the identification of vaginal cells. Direct smears obtained from the urethral opening, glans penis, and penile shaft, along with post-mortem samples of the fossa navicularis, and histological sections of the penis were examined. The presence of polygonal, glycogenated, Lugol-positive epithelium cells in the male urinary tract was found to be common. Our results suggest that these cells originate from the fossa navicularis. Because of the possibility of exfoliation of glycogenated male cells and transfer to the penile surface a Lugol-positive reaction in epithelial cells on penile swabs can no longer be assumed to prove the presence of vaginal cells.

  16. EFFECT OF PROBLEM BASED LEARNING IN COMPARISION WITH LECTURE BASED LEARNING IN FORENSIC MEDICINE

    Directory of Open Access Journals (Sweden)

    Padmakumar

    2015-09-01

    Full Text Available BACKGROUND: Problem based learning (PBL is an approach to learning and instruction in which students tackle problems in small groups under the supervision of a teacher. This style of learning assumed to foster increased retention of knowledge, improve student’s gene ral problem solving skills, enhance integration of basic science concepts in to clinical problems, foster the development of self - directed learning skills and strengthen student’s intrinsic motivation. AIM: The study was conducted to compare the effect of Problem based learning in comparison with lecture based learning. SETTING: A cross - sectional study was conducted among 2nd year MBBS students of Jubilee Mission Medical College and Research Institute, Thrissur during the period of December 2014 to March 20 15. METHODOLOGY: The batch is divided into two groups (A & B, 45 in each group. By using PBL method, blunt force injuries were taught to Group - A and sharp weapon injuries to group - B. By using lecture based learning (LBL method blunt force injuries were t aught to Group - B and sharp weapon injuries to group - A. At the end of the session a test in the form of MCQ was conducted on the students to evaluate their learning outcome. OBSERVATION AND RESU LTS: In session I, the average test score of LBL group was 8.16 and PBL group was 12. The difference was statistically significant. In session - II also 45 students has participated each in LBL and PBL classes. The average of test score of LBL group was 7.267 and PBL was 11.289, which was highly significant statistical ly . CONCLUSION: Study has proven that problem based learning is an effective teaching learning method when compared to conventional lecture based learning.

  17. Examining the reactive proactive questionnaire in adults in forensic and non-forensic settings: A variable- and person-based approach.

    Science.gov (United States)

    Brugman, Suzanne; Cornet, Liza J M; Smeijers, Danique; Smeets, Kirsten; Oostermeijer, Sanne; Buitelaar, Jan K; Verkes, Robbert-Jan; Lobbestael, Jill; de Kogel, Catharina H; Jansen, Lucres M C

    2017-04-01

    The Reactive Proactive Questionnaire (RPQ) was originally developed to assess reactive and proactive aggressive behavior in children. Nevertheless, some studies have used the RPQ in adults. This study examines the reliability of the RPQ within an adult sample by investigating whether reactive and proactive aggression can be distinguished at a variable- and person-based level. Male adults from forensic samples (N = 237) and from the general population (N = 278) completed the RPQ questionnaire. Variable-based approaches, including factor analyses, were conducted to verify the two-factor model of the RPQ and to examine alternative factor solutions of the 23 items. Subsequently, a person-based approach, i.e., Latent Class Analysis (LCA), was executed to identify homogeneous classes of subjects with similar profiles of aggression in the observed data. The RPQ proved to have sufficient internal consistency. Multiple-factor models were examined, but the original two-factor model was statistically and theoretically considered as most solid and in line with previous research. The multi-level LCA identified three different classes of aggression severity (class 1 showed low aggressive behavior; class 2 subjects displayed modest aggression levels; and class 3 exhibited the highest level of aggressive behavior). In addition, class 1 and 2 showed more reactive than proactive aggression, whereas class 3 displayed comparable levels of reactive/proactive aggression. The RPQ appears to have clinical relevance for adult populations in the way that it can distinguish severity levels of aggression. Before the RPQ is implemented in adult populations, norm scores need to be developed. Aggr. Behav. 43:155-162, 2017. © 2016 Wiley Periodicals, Inc.

  18. 基于4级受信机制的可疑终端的恶意代码取证与分析%Analysis and Forensics of Malware in Suspicious Computer Based on Four Class Trust Model

    Institute of Scientific and Technical Information of China (English)

    苗得雨; 康学斌; 肖新光

    2011-01-01

    This paper analyzes the weaknesses and difficulties of traditional computer forensics technology in the field of analyzing the malicious code evidentiary, proposes a suspicious computer forensics model based on four class trust mechanism. It describes a static forensics method for the suspicious terminals and by large amounts of experiments, shows the feasibility,accuracy and efficiency of four class trust mechanism in the application of malicious code forensics.%本文分析了传统计算机取证技术在分析恶意代码取证方面的薄弱环节和难点,提出了一个基于4级受信机制的计算机取证分析模型的可疑终端的恶意代码取证方法和以4级受信机制为基础的恶意代码分析原则.阐述了对可疑终端计算机的静态取证手段,并以4级受信体制为例,通过大量数据测试和验证.证明了4级受信应用在可疑终端的恶意代码取证中的可行性、准确率和效率.

  19. Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection

    NARCIS (Netherlands)

    Baartmans, Chloë; Meuwly, Didier; Kosta, Eline

    2014-01-01

    Expert-based methods are used from the beginning of the 20th century for forensic evaluation of fingermarks (trace specimens) and fingerprints (reference specimens). Currently semi-automatic systems using biometric data, biometric technology and statistical models are developed to support the

  20. Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection

    NARCIS (Netherlands)

    Baartmans, Chloë; Meuwly, Didier; Kosta, Eline

    2014-01-01

    Expert-based methods are used from the beginning of the 20th century for forensic evaluation of fingermarks (trace specimens) and fingerprints (reference specimens). Currently semi-automatic systems using biometric data, biometric technology and statistical models are developed to support the expert

  1. An introduction to computer forensics.

    Science.gov (United States)

    Furneaux, Nick

    2006-07-01

    This paper provides an introduction to the discipline of Computer Forensics. With computers being involved in an increasing number, and type, of crimes the trace data left on electronic media can play a vital part in the legal process. To ensure acceptance by the courts, accepted processes and procedures have to be adopted and demonstrated which are not dissimilar to the issues surrounding traditional forensic investigations. This paper provides a straightforward overview of the three steps involved in the examination of digital media: Acquisition of data. Investigation of evidence. Reporting and presentation of evidence. Although many of the traditional readers of Medicine, Science and the Law are those involved in the biological aspects of forensics, I believe that both disciplines can learn from each other, with electronic evidence being more readily sought and considered by the legal community and the long, tried and tested scientific methods of the forensic community being shared and adopted by the computer forensic world.

  2. DNA methylation-based forensic age prediction using artificial neural networks and next generation sequencing

    NARCIS (Netherlands)

    A. Vidaki (Athina); Ballard, D. (David); Aliferi, A. (Anastasia); Miller, T.H. (Thomas H.); Barron, L.P. (Leon P.); D. Syndercombe-Court (Denise)

    2017-01-01

    textabstractThe ability to estimate the age of the donor from recovered biological material at a crime scene can be of substantial value in forensic investigations. Aging can be complex and is associated with various molecular modifications in cells that accumulate over a person's lifetime including

  3. Hillslope threshold response to rainfall: (1) a field based forensic approach

    Science.gov (United States)

    Chris B. Graham; Ross A. Woods; Jeffrey J. McDonnell

    2010-01-01

    Hillslope threshold response to storm rainfall is poorly understood. Basic questions regarding the type, location, and flow dynamics of lateral, subsurface flow remain unanswered, even at our most intensively studied field sites. Here we apply a forensic approach where we combined irrigation and excavation experiments at the well studied Maimai hillslope to determine...

  4. Forensic Psychiatric Perspective on Criminality Associated with Intellectual Disability: A Nationwide Register-Based Study

    Science.gov (United States)

    Mannynsalo, L.; Putkonen, H.; Lindberg, N.; Kotilainen, I.

    2009-01-01

    Background: Contrasting views exist over the association of intellectual disability (ID) and criminal offending. This nationwide study attempts to shed further light to expand understanding to substantiate the relation between socio-demographic characteristics, psychiatric co-morbidity and criminal behaviour among the Finnish forensic population…

  5. Digital-forensics based pattern recognition for discovering identities in electronic evidence

    NARCIS (Netherlands)

    Henseler, Hans; Hofsté, Jop; Keulen, van Maurice

    2013-01-01

    With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge an

  6. Forensic Psychiatric Perspective on Criminality Associated with Intellectual Disability: A Nationwide Register-Based Study

    Science.gov (United States)

    Mannynsalo, L.; Putkonen, H.; Lindberg, N.; Kotilainen, I.

    2009-01-01

    Background: Contrasting views exist over the association of intellectual disability (ID) and criminal offending. This nationwide study attempts to shed further light to expand understanding to substantiate the relation between socio-demographic characteristics, psychiatric co-morbidity and criminal behaviour among the Finnish forensic population…

  7. Examination of mobile phones in a university forensic lab environment

    Science.gov (United States)

    Luttenberger, Silas; Kröger, Knut; Creutzburg, Reiner

    2011-06-01

    The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence collection, evidence preservation, forensic analysis, and reporting. Open source tools as well as commercial forensic tools for forensic investigation of modern mobile (smart) phones are used. It is demonstrated how important data stored in the mobile device are investigated. Different scenarios of investigations are presented that are well-suited for forensics lab work in university.

  8. On the added value of forensic science and grand innovation challenges for the forensic community.

    Science.gov (United States)

    van Asten, Arian C

    2014-03-01

    In this paper the insights and results are presented of a long term and ongoing improvement effort within the Netherlands Forensic Institute (NFI) to establish a valuable innovation programme. From the overall perspective of the role and use of forensic science in the criminal justice system, the concepts of Forensic Information Value Added (FIVA) and Forensic Information Value Efficiency (FIVE) are introduced. From these concepts the key factors determining the added value of forensic investigations are discussed; Evidential Value, Relevance, Quality, Speed and Cost. By unravelling the added value of forensic science and combining this with the future needs and scientific and technological developments, six forensic grand challenges are introduced: i) Molecular Photo-fitting; ii) chemical imaging, profiling and age estimation of finger marks; iii) Advancing Forensic Medicine; iv) Objective Forensic Evaluation; v) the Digital Forensic Service Centre and vi) Real time In-Situ Chemical Identification. Finally, models for forensic innovation are presented that could lead to major international breakthroughs on all these six themes within a five year time span. This could cause a step change in the added value of forensic science and would make forensic investigative methods even more valuable than they already are today.

  9. The Pabst's method: an effective and low-budget tool for the forensic comparison of opaque thermoplastics--part 1: Additional discrimination of black electrical tapes.

    Science.gov (United States)

    Henning, Siegfried; Schönberger, Torsten; Simmross, Ulrich

    2013-12-10

    For many years now, Pabst's micro-press has been used in German forensic science laboratories as a valuable addition to methods of comparative analysis of plastic trace evidence. However, it is as yet hardly known in laboratories outside of Germany. The principal reproducibility is demonstrated by a homogeneity check of a raw backing material of defined origin. The illustrated results of a proficiency test emphasise the applicability of the Pabst method for forensic comparisons. The discrimination power of the Pabst method was tested by taking 90 black PVC-backings provided by the FBI Laboratory, i.e. those that could not be discriminated by standard methods. In this way further discriminations could be achieved. In the following, the Pabst method is therefore introduced as a straightforward, inexpensive and useful tool.

  10. 信息化警务模式下网络取证技术完善的研究%Research on Network Forensics Perfect Mode Based on Policing Information

    Institute of Scientific and Technical Information of China (English)

    刘泽

    2012-01-01

    Traditional static forensics develops slowly and imperfect dynamic forensics have caused technical difficulties to the development of network forensics at this stage.Enhancing the development of network forensics technology has great significance to policing information model.This paper defines the network forensics and the relationship between network forensics with policing information model,researches network forensics,analyzes the limitations of network forensics at the stage,explores in building a intelligent dynamic network forensics systems in technology;and creates actively the evidence preservation of network notarization as well with perfect network forensics methods and related laws and regulations in non-technical.%本文界定了网络取证的定义及其与信息化警务模式的关系,研究了网络取证的技术,分析了现阶段网络取证技术的局限性,从技术上,探索构建智能动态化的网络取证系统;从非技术上,主张开创网络公证的证据保全方法和积极健全网络取证的法律法规。

  11. Geoethics and Forensic Geology

    Science.gov (United States)

    Donnelly, Laurance

    2017-04-01

    The International Union of Geological Sciences (IUGS), Initiative on Forensic Geology (IFG) was set up in 2011 to promote and develop the applications of geology to policing and law enforcement throughout the world. This includes the provision of crime scene examinations, searches to locate graves or items of interest that have been buried beneath the ground surface as part of a criminal act and geological trace analysis and evidence. Forensic geologists may assist the police and law enforcement in a range of ways including for example; homicide, sexual assaults, counter terrorism, kidnapping, humanitarian incidents, environmental crimes, precious minerals theft, fakes and fraudulent crimes. The objective of this paper is to consider the geoethical aspects of forensic geology. This includes both delivery to research and teaching, and contribution to the practical applications of forensic geology in case work. The case examples cited are based on the personal experiences of the authors. Often, the technical and scientific aspect of forensic geology investigation may be the most straightforward, after all, this is what the forensic geologist has been trained to do. The associated geoethical issues can be the most challenging and complex to manage. Generally, forensic geologists are driven to carry-out their research or case work with integrity, honesty and in a manner that is law abiding, professional, socially acceptable and highly responsible. This is necessary in advising law enforcement organisations, society and the scientific community that they represent. As the science of forensic geology begins to advance around the world it is desirable to establish a standard set of principles, values and to provide an agreed ethical a framework. But what are these core values? Who is responsible for producing these? How may these become enforced? What happens when geoethical standards are breached? This paper does not attempt to provide all of the answers, as further work

  12. Detached concern of forensic mental health nurses in therapeutic relationships with patients the application of the early recognition method related to detached concern.

    Science.gov (United States)

    Fluttert, Frans; van Meijel, Berno; Nijman, Henk; Bjørkly, Stål; Grypdonck, Mieke

    2010-08-01

    Improvement of the interaction between forensic mental health nurses and patients may lead to a reduction of inpatient violence. The concept under study is detached concern, which refers to nurses' skills to neutralize the emotional appeal of patients by a balanced attitude between objectivity and emotional involvement. The Patient Contact Questionnaire (PCQ) aims at measuring the degree of concern of nurses for their patients. The PCQ was applied in a pretest-posttest design, evaluating the effects of the Early Recognition Method (ERM). This method aims at the prevention of inpatient violence in forensic psychiatry. Subjects were 116 forensic mental heath nurses working on 16 wards of a large Dutch forensic hospital. First, the baseline scores were compared to scores reported in an earlier study conducted in general psychiatry. Second, pretest-posttest comparisons were carried out for all nurses, and for subgroups of nurses with regard to gender, educational level, years of working experience, and patient population. Third, pretest-posttest comparisons were made on the PCQ item level. The baseline scores of male nurses indicated significantly higher levels of concern than those of female nurses. In addition, more experienced nurses scored significantly higher with regard to concern than less experienced nurses. When comparing the scores before and after applying ERM, no significant differences were found. However, the sores of female nurses showed a tendency toward more concern after implementation of ERM. Detached concern may be a meaningful concept in forensic mental health nursing in measuring nurses' concern for their patients. Levels of detached concern did not change significantly after application of ERM. However, the application of the PCQ could contribute to a better understanding of the interaction between nurses and their patients. 2010 Elsevier Inc. All rights reserved.

  13. On the Development of Digital Forensics Curriculum

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-09-01

    Full Text Available Computer Crime and computer related incidents continue their prevalence and frequency and result in loss of billions of dollars. To fight against those crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce to efficiently and effectively investigate crimes and frauds. However, there is no standard to guide the design of digital forensics curriculum for an academic program. In this research, we investigate the research works on digital forensics curriculum design and existing education programs.  Both digital forensics educators and practitioners were surveyed and the results are analyzed to determine what industry and law enforcement need. Based on the survey results and what the industry certificate programs cover, we identified topics that are desired to be covered in digital forensics courses. Finally, we propose six digital forensics courses and their topics that can be offered in both undergraduate and graduate digital forensics programs.

  14. Forensic dentistry in human identification: A review of the literature.

    Science.gov (United States)

    Ata-Ali, Javier; Ata-Ali, Fadi

    2014-04-01

    An update is provided of the literature on the role of odontology in human identification, based on a PubMed-Medline search of the last 5 years and using the terms: "forensic dentistry" (n = 464 articles), "forensic odontology" (n = 141 articles) and "forensic dentistry identification" (n = 169 articles). Apart from these initial 774 articles, others considered to be important and which were generated by a manual search and cited as references in review articles were also included. Forensic dentistry requires interdisciplinary knowledge, since the data obtained from the oral cavity can contribute to identify an individual or provide information needed in a legal process. Furthermore, the data obtained from the oral cavity can narrow the search range of an individual and play a key role in the victim identification process following mass disasters or catastrophes. This literature search covering the last 5 years describes the novelties referred to buccodental studies in comparative identification, buccodental evaluation in reconstructive identification, human bites as a method for identifying the aggressor, and the role of DNA in dental identification. The oral cavity is a rich and noninvasive source of DNA, and can be used to solve problems of a social, economic or legal nature. Key words:Forensic identification, DNA, forensic dentistry, rugoscopy, cheiloscopy, saliva.

  15. Methodological development of the Hoeven Outcome Monitor (HOM): A first step towards a more evidence based medicine in forensic mental health.

    Science.gov (United States)

    Keune, Lobke H; de Vogel, Vivienne; van Marle, Hjalmar J C

    2016-01-01

    To comply with the need for a more evidence based risk assessment and management in forensic mental health, an outcome monitor is being developed in the Dutch forensic psychiatric centre Van der Hoeven Kliniek in Utrecht, the Hoeven Outcome Monitor (HOM). Conform evidence based medicine (EBM) guidelines, the HOM is subdivided into three consecutive stages, (1) the evaluation stage, (2) the aetiology stage and (3) the implementation stage. In this article an account is provided for the design of the evaluation stage. To account for predicaments in previous research that pertain to a lack of uniformity and disregard of specific context- and patient-related characteristics, a macro-, meso- and micro-treatment evaluation instrument is developed. This instrument provides for the first step to build an evidence base for specific interventions and treatments in forensic psychiatry.

  16. Digital-forensics based pattern recognition for discovering identities in electronic evidence

    OpenAIRE

    Henseler, Hans; Hofsté, Jop; Keulen, van, H.

    2013-01-01

    With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge and rank identities that are encountered in the electronic evidence during processing. Two experiments are described demonstrating that our approach can assist with the identification of frequently o...

  17. Development of a candidate method for forensic microbial genotyping using multiplex pyrosequencing combined with a universal biotinylated primer.

    Science.gov (United States)

    Gu, Yan; Mao, Xuhu; Zha, Lagabaiyila; Hou, Yiping; Yun, Libing

    2015-01-01

    Bacterial genotyping can be used for crime scene investigations and contribute to the attribution of biological attacks for microbial forensics. PyroMark ID Pyrosequencer as an accurate detection platform for single nucleotide polymorphisms (SNPs) has been applied to identify and resolve microorganisms involved in closely Escherichia coli O157:H7 (E. coli O157:H7). To explore more applications and improve the efficiency for pyrosequencing in this field, we developed a method integrated multiplex pyrosequencing with a universal primer. Two multiplex pyrosequencing assays with a universal biotinylated primer were designed to analyze five SNPs located in four gene of E. coli O157:H7 strain. The accuracy of the established assays was validated by genotyping reference strain E. coli O157:H7 EDL933 and E. coli K-12. We also demonstrated that two multiplex pyrosequencing assays were specific and sensitive for genotyping closely related E. coli O157 strains. Reproducibility of results and multiplexing capability were evaluated by a comparison of this method with the monoplex pyrosequencing. Furthermore, these two multiplex pyrosequencing assays have been successfully applied to detect 11 E. coli O157 strains isolated from 1504 Chinese livestock samples. This method reduces costs and time consumption in the process of pyrosequencing analysis, and potentially serves as a rapid tool and reliable candidate strategy for the microbial identification and other genotyping application.

  18. The Use of Laser Microdissection in Forensic Sexual Assault Casework: Pros and Cons Compared to Standard Methods.

    Science.gov (United States)

    Costa, Sergio; Correia-de-Sá, Paulo; Porto, Maria J; Cainé, Laura

    2017-01-30

    Sexual assault samples are among the most frequently analyzed in a forensic laboratory. These account for almost half of all samples processed routinely, and a large portion of these cases remain unsolved. These samples often pose problems to traditional analytic methods of identification because they consist most frequently of cell mixtures from at least two contributors: the victim (usually female) and the perpetrator (usually male). In this study, we propose the use of current preliminary testing for sperm detection in order to determine the chances of success when faced with samples which can be good candidates to undergo analysis with the laser microdissection technology. Also, we used laser microdissection technology to capture fluorescently stained cells of interest differentiated by gender. Collected materials were then used for DNA genotyping with commercially available amplification kits such as Minifiler, Identifiler Plus, NGM, and Y-Filer. Both the methodology and the quality of the results were evaluated to assess the pros and cons of laser microdissection compared with standard methods. Overall, the combination of fluorescent staining combined with the Minifiler amplification kit provided the best results for autosomal markers, whereas the Y-Filer kit returned the expected results regardless of the used method.

  19. Cloud Based Drive Forensic and DDoS Analysis on Seafile as Case Study

    Science.gov (United States)

    Bahaweres, R. B.; Santo, N. B.; Ningsih, A. S.

    2017-01-01

    The rapid development of Internet due to increasing data rates through both broadband cable networks and 4G wireless mobile, make everyone easily connected to the internet. Storages as Services (StaaS) is more popular and many users want to store their data in one place so that whenever they need they can easily access anywhere, any place and anytime in the cloud. The use of the service makes it vulnerable to use by someone to commit a crime or can do Denial of Service (DoS) on cloud storage services. The criminals can use the cloud storage services to store, upload and download illegal file or document to the cloud storage. In this study, we try to implement a private cloud storage using Seafile on Raspberry Pi and perform simulations in Local Area Network and Wi-Fi environment to analyze forensically to discover or open a criminal act can be traced and proved forensically. Also, we can identify, collect and analyze the artifact of server and client, such as a registry of the desktop client, the file system, the log of seafile, the cache of the browser, and database forensic.

  20. Emergence of forensic podiatry--A novel sub-discipline of forensic sciences.

    Science.gov (United States)

    Krishan, Kewal; Kanchan, Tanuj; DiMaggio, John A

    2015-10-01

    "Forensic podiatry is defined as the application of sound and researched podiatric knowledge and experience in forensic investigations; to show the association of an individual with a scene of crime, or to answer any other legal question concerned with the foot or footwear that requires knowledge of the functioning foot". Forensic podiatrists can contribute to forensic identification by associating the pedal evidence with the criminal or crime scene. The most common pedal evidence collected from the crime scene is in the form of footprints, shoeprints and their tracks and trails. Forensic podiatrists can establish identity of the individuals from the footprints in many ways. The analysis of bare footprints involves the identification based on the individualistic features like flat footedness, ridges, humps, creases, an extra toe, missing toe, corns, cuts, cracks, pits, deformities, and various features of the toe and heel region. All these individualistic features can link the criminal with the crime. In addition to these, parameters of body size like stature and body weight as well as sex can also be estimated by using anthropometric methods. If a series of footprints are recovered from the crime scene, then parameters of the gait analysis such as stride/step length and general movement of the criminal can be traced. Apart from these, a newly established biometric parameter of the footprints i.e. footprint ridge density can also be evaluated for personal identification. Careful analysis of the footprint ridge density can give an idea about the sex of the criminal whose footprints are recovered at the scene which can further help to reduce the burden of the investigating officer as the investigations then may be directed toward either a male suspect or a female suspect accordingly. This paper highlights various aspects of Forensic Podiatry and discusses the different methods of personal identification related to pedal evidence. Copyright © 2015 Elsevier Ireland

  1. Application of the angle measure technique as image texture analysis method for the identification of uranium ore concentrate samples: New perspective in nuclear forensics.

    Science.gov (United States)

    Fongaro, Lorenzo; Ho, Doris Mer Lin; Kvaal, Knut; Mayer, Klaus; Rondinella, Vincenzo V

    2016-05-15

    The identification of interdicted nuclear or radioactive materials requires the application of dedicated techniques. In this work, a new approach for characterizing powder of uranium ore concentrates (UOCs) is presented. It is based on image texture analysis and multivariate data modelling. 26 different UOCs samples were evaluated applying the Angle Measure Technique (AMT) algorithm to extract textural features on samples images acquired at 250× and 1000× magnification by Scanning Electron Microscope (SEM). At both magnifications, this method proved effective to classify the different types of UOC powder based on the surface characteristics that depend on particle size, homogeneity, and graininess and are related to the composition and processes used in the production facilities. Using the outcome data from the application of the AMT algorithm, the total explained variance was higher than 90% with Principal Component Analysis (PCA), while partial least square discriminant analysis (PLS-DA) applied only on the 14 black colour UOCs powder samples, allowed their classification only on the basis of their surface texture features (sensitivity>0.6; specificity>0.6). This preliminary study shows that this method was able to distinguish samples with similar composition, but obtained from different facilities. The mean angle spectral data obtained by the image texture analysis using the AMT algorithm can be considered as a specific fingerprint or signature of UOCs and could be used for nuclear forensic investigation.

  2. Digital Forensics to Intelligent Forensics

    Directory of Open Access Journals (Sweden)

    Alastair Irons

    2014-09-01

    Full Text Available In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.

  3. An evidence based strategy for normalization of quantitative PCR data from miRNA expression analysis in forensic organ tissue identification.

    Science.gov (United States)

    Sauer, Eva; Babion, Iris; Madea, Burkhard; Courts, Cornelius

    2014-11-01

    Messenger-RNA (mRNA)-based analysis of organ tissues and their differentiation in complex crime stains has recently been introduced as a potential and powerful tool to forensic genetics. Given the notoriously low quality of many forensic samples it seems advisable, though, to substitute mRNA with micro-RNA (miRNA) which is much less susceptible to degradation. However, reliable miRNA detection and quantification using quantitative PCR requires a solid and forensically relevant normalization strategy. In our study we evaluated a panel of 15 carefully selected reference genes for their suitability as endogenous controls in miRNA qPCR normalization in forensically relevant settings. We analyzed assay performances and expression variances in 35 individual samples and mixtures thereof integrating highly standardized protocols with contemporary methodologies and included several well-established computational algorithms. Based on these empirical results, we recommend SNORD48, SNORD24, and RNU6-2 as endogenous references since these exhibit the most stable expression levels and the least expected variation among the evaluated candidate reference genes in the given set of forensically relevant organ tissues including skin. To account for the lack of consensus on how best to perform and interpret quantitative PCR experiments, our study's documentation is according to MIQE guidelines, defining the "minimum information for publication of quantitative real-time PCR experiments".

  4. Urine specimen collection following consensual intercourse - A forensic evidence collection method for Y-DNA and spermatozoa.

    Science.gov (United States)

    Joki-Erkkilä, Minna; Tuomisto, Sari; Seppänen, Mervi; Huhtala, Heini; Ahola, Arja; Karhunen, Pekka J

    2016-01-01

    The purpose of the prospective research was to evaluate the benefit of urine specimen as a collection technique for biological forensic evidence in adult volunteers following consensual intercourse. For detecting Y-chromosomal material Buccal Swab Spin Protocol(®) was used in DNA extraction and purification and samples were analysed with Quantifiler Y Human Male DNA Quantification Kit(®). The time frame for positive Y-DNA was evaluated. Immediate microscopy for detection of spermatozoa was performed. Y-DNA was detected in 173/205 (84.4%) urine samples. Of the 86 first post-coital void urine samples available, Y-DNA was detected in 83 (96.5%) specimens. Of the 119 urine samples from volunteers with post-coital activities Y-DNA was still measurable in 70 (58.8%) urine specimens. The male DNA amount was below 0.023 ng/μl in 28/153 (18.3%) urine samples. Of the 22 urine samples obtained after 24 post-coital hours, 9 (40.9%) were still Y-DNA positive. No associations were found between coital durance, coital frequency during the past two weeks prior to the study intercourse, post-coital activities, and the urine sample Y-DNA positivity. Of the 111 urine samples where the immediate microscopy was performed, in 66 (59.5%) samples spermatozoa were verified and one sample even contained motile spermatozoa. Microscopy detected 66 (67.3%) and failed to detect spermatozoa in 32 (32.7%) of Y-DNA positive samples. In addition to conventional invasive swab techniques, urine samples seem to be an effective biological trace collection method for Y-DNA and spermatozoa within 24 h following penile-vaginal penetration. Furthermore, it may be considered as a non-invasive collection method in suspected acute child sexual abuse cases to diminish time delay in forensic evidence collection and to improve patients' positive attitudes towards evidence collection.

  5. Modelling live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-06-01

    Full Text Available This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic...

  6. Identification of forensically important beetles (Coleoptera: Histeridae) in China based on 16S rRNA and Cyt b.

    Science.gov (United States)

    Su, R N; Guo, Y D; Xie, D; Peng, Y L; Cai, J F; Hua, F; Sheng, L H

    2013-09-01

    Exact identification of an insect sample is usually the first essential step in a forensic entomological analysis. However, the morphological similarity of beetles in the level of species usually poses a challenge for forensic scientists within their routine work. As a supplementary to traditional morphological method, molecular genetics identification turns out to be simple and time-saving. A molecular identification method involving a 288-bp segment of the 16S ribosomal RNA (16S rRNA) gene and a 334-bp segment of the cytochrome b (Cyt b) gene from 23 histerid beetles specimens, collected from 7 locations in 6 Chinese provinces, was evaluated. The 16S rRNA and Cyt b genes are sequenced to examine the ability of the region, resolve species identities and enrich the local databases. The monophyletic branches of the phylogenetic tree showed the potential of the markers in identifying beetles within families. Combined analysis is a more accurate approach for species identication than independent analysis.

  7. 一种用于网络取证分析的模糊决策树推理方法%Fuzzy Decision Tree Based Inference Techniques for Network Forensic Analysis

    Institute of Scientific and Technical Information of China (English)

    刘在强; 林东岱; 冯登国

    2007-01-01

    网络取证是对现有网络安全体系的必要扩展,已日益成为研究的重点.但目前在进行网络取证时仍存在很多挑战:如网络产生的海量数据;从已收集数据中提取的证据的可理解性;证据分析方法的有效性等.针对上述问题,利用模糊决策树技术强大的学习能力及其分析结果的易理解性,开发了一种基于模糊决策树的网络取证分析系统,以协助网络取证人员在网络环境下对计算机犯罪事件进行取证分析.给出了该方法的实验结果以及与现有方法的对照分析结果.实验结果表明,该系统可以对大多数网络事件进行识别(平均正确分类率为91.16%),能为网络取证人员提供可理解的信息,协助取证人员进行快速高效的证据分析.%Network forensics is an important extension to present security infrastructure,and is becoming the research focus of forensic investigators and network security researchers.However many challenges still exist in conducting network forensics:The sheer amount of data generated by the network;the comprehensibility of evidences extracted from collected data;the efficiency of evidence analysis methods,etc.Against above challenges,by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic,the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence.At the end of the paper,the experimental comparison results between our proposed method and other popular methods are presented.Experimental results show that the system can classify most kinds of events (91.16% correct classification rate on average),provide analyzed and comprehensible information for a forensic expert and automate or semi-automate the process of forensic analysis.

  8. Parricide: a forensic approach.

    Science.gov (United States)

    Dantas, Soraia; Santos, Agostinho; Dias, Isabel; Dinis-Oliveira, Ricardo Jorge; Magalhães, Teresa

    2014-02-01

    Parricide is the act of murdering one's father (patricide), mother (matricide) or other close relative, but usually not children (infanticide). It is a rare event and little information is available on this topic. This study aims to increase knowledge about this phenomenon, promoting the timely detection of problematic cases and avoiding fatalities. A retrospective study based on the autopsy reports of parricide victims performed by the North Services of the National Institute of Legal Medicine and Forensic Sciences of Portugal between 2003 and 2011, as well as on the judicial outcome of each case, was performed. Seven cases of parricide were found, corresponding to 1.7% of all the homicides undergoing forensic evaluated. Victims and perpetrators were typically males. The assaults occurred all at home, in the presence of witnesses, and the perpetrator remained at the scene after the crime. The main alleged reasons were untreated psychiatric illness and financial conflicts in the cases of adult parricide, and attempts to protect the mother from intimate partner violence in younger ones. The judicial outcomes ranged from acquittal for nonimputability to conviction for murder, manslaughter or involuntary manslaughter. This study was carried out on a forensic sample and it is useful to implement strategies to prevent parricide. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  9. Next generation sequencing (NGS): a golden tool in forensic toolkit.

    Science.gov (United States)

    Aly, S M; Sabri, D M

    2015-01-01

    The DNA analysis is a cornerstone in contemporary forensic sciences. DNA sequencing technologies are powerful tools that enrich molecular sciences in the past based on Sanger sequencing and continue to glowing these sciences based on Next generation sequencing (NGS). Next generation sequencing has excellent potential to flourish and increase the molecular applications in forensic sciences by jumping over the pitfalls of the conventional method of sequencing. The main advantages of NGS compared to conventional method that it utilizes simultaneously a large number of genetic markers with high-resolution of genetic data. These advantages will help in solving several challenges such as mixture analysis and dealing with minute degraded samples. Based on these new technologies, many markers could be examined to get important biological data such as age, geographical origins, tissue type determination, external visible traits and monozygotic twins identification. It also could get data related to microbes, insects, plants and soil which are of great medico-legal importance. Despite the dozens of forensic research involving NGS, there are requirements before using this technology routinely in forensic cases. Thus, there is a great need to more studies that address robustness of these techniques. Therefore, this work highlights the applications of forensic sciences in the era of massively parallel sequencing.

  10. A Case-Based Scenario with Interdisciplinary Guided-Inquiry in Chemistry and Biology: Experiences of First Year Forensic Science Students

    Science.gov (United States)

    Cresswell, Sarah L.; Loughlin, Wendy A.

    In this paper, insight into forensic science students' experiences of a case-based scenario with an interdisciplinary guided-inquiry experience in chemistry and biology is presented. Evaluation of student experiences and interest showed that the students were engaged with all aspects of the case-based scenario, including the curriculum theory…

  11. FORENSIC AUDIT

    OpenAIRE

    Rozas Flores, Alan Errol; Facultad de Ciencias Contables, Universidad Nacional Mayor de San Marcos

    2014-01-01

    The forensic audit is an audit specialist in obtaining evidence to turn them into tests, which are presented in the forum that is in the courts of justice, in order to check crime or settle legal disputes. Currently, major efforts are being carried out by compliance audits and comprehensive audits need to be retrofitted with legal research, to minimize the impunity that comes before economic and financial crimes, such as administrative corruption, corporate fraud and money laundering assets. ...

  12. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  13. 数字照片相机来源认证方法研究%Detecting Authentication Methods of the Source Camera Forensics

    Institute of Scientific and Technical Information of China (English)

    孙晓婷; 李叶舟; 牛少彰; 孟宪哲

    2012-01-01

    数字照片来源认证技术是对未知来源的图像与相机模型进行匹配的技术,即仅通过图像本身来判定图像是由该图像是由何种相机拍摄的技术。在这一领域近年来涌现了许多新理论、新方法。本文首先介绍了数字照片的成像原理,并概括出数字照片来源取证的一般模型框架。然后基于所提取特征的来源不同这一点将认证方法分为两类,一类是基于图像的统计特征;另一类基于相机成像过程引入的特征,并对不同算法进行了性能比较与总结。最后探讨了数字图像来源取证技术存在的问题及未来的发展方向。%The technology of digital image source authentication is to understand the real source of the image based on itself, and this digital image is by which a manufacturer and by which type of equipment for.Many new theories and new methods appeared in recent years.This paper first intruduces the theory of digital imaging,and presents a model of digital image source forensics.Then,arroding to the extraction features of different sources,the techniques of digital image source forensics are divided into two categories:techniques based on the image features of the image,techniques based on the image features from carmera imaging process,as well as performance comparison and analysis of various algorithms are summarized in detail for each category.The last part discussion on the unresolved problems and future directions is presented.

  14. Tasks of research in forensic medicine - different study types in clinical research and forensic medicine.

    Science.gov (United States)

    Madea, Burkhard; Saukko, Pekka; Musshoff, Frank

    2007-01-17

    In the last years the research output of forensic medicine has sometimes been regarded as insufficient and as of poor quality, especially when parameters as impact factors and external funding were taken into account. However, forensic medicine has different tasks compared to clinical medicine. The main difference between basic subjects, clinical and forensic medicine is not a lack of scientific efficiency in forensic medicine but is a result of the questions asked, the available methods and specific aims. In contrast to natural-scientific research, forensic science has furthermore important intersections with arts and socio-scientific disciplines. Etiologic and pathogenetic research is of only limited relevance in forensic medicine. Thus, forensic medicine is excluded from these research fields, which are mainly supported by external funding. In forensic medicine research mainly means applied research regarding findings, the probative value and reconstruction as well as examination at different points of intersection between medicine and law. Clinical types of research such as controlled randomised, prospective cross-sectional, cohort or case-control studies can only rarely be applied in forensic medicine due to the area specific research fields (e.g. thantatology, violent death, vitality, traffic medicine, analytical toxicology, hemogenetics and stain analysis). The types of studies which are successfully established in forensic medicine are comparison of methods, sensitivity studies, validation of methods, kinetic examinations etc. Tasks of research in forensic medicine and study types, which may be applied will be addressed.

  15. Regional potassium distribution in the brain in forensic relevant types of intoxication preliminary morphometric evaluation using a histochemical method.

    Science.gov (United States)

    Oehmichen, M; Ochs, U; Meissner, C

    2001-02-01

    A histochemical-morphometric method was used to measure potassium (K+) levels in gray and white matter of rats following sublethal intoxication with 11 different neurotoxic compounds of high forensic significance. Six rats were each given a single substance applied intraperitoneally, the same dosage being given to two animals each. The animals were subsequently killed, the brains immediately frozen, and cryosections cut. K+ levels were evaluated morphometrically. A drop in K+ levels was used as the criterion for cytotoxic edema. Application of ethanol, atropine, carbromal, carbon monoxide, morphine or triethyltin led to a rise in K+ levels in the gray matter and a simultaneous decline in the white matter. By contrast, administration of amitriptyline, glycerin, potassium cyanide, parathion or phenobarbital initiated an increase in K+ levels in both gray and white matter. A cytotoxic edema could thus be reliably excluded in these intoxications. Although the study design allows no statistical analysis, these conclusions are supported by the marked differences in K+ levels in gray and white matter induced by the different toxicants.

  16. Plant genetics for forensic applications.

    Science.gov (United States)

    Zaya, David N; Ashley, Mary V

    2012-01-01

    An emerging application for plant DNA fingerprinting and barcoding involves forensic investigations. Examples of DNA analysis of botanical evidence include crime scene analysis, identifying the source of commercial plant products, and investigation of trade in illicit drugs. Here, we review real and potential applications of DNA-based forensic botany and provide a protocol for microsatellite genotyping of leaf material, a protocol that could be used to link a suspect to a victim or to a crime scene.

  17. Identical twins in forensic genetics - Epidemiology and risk based estimation of weight of evidence.

    Science.gov (United States)

    Tvedebrink, Torben; Morling, Niels

    2015-12-01

    The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where the alternative hypothesis is assumed not to encompass close relatives. However, this approach implies that important factors present in real human populations are discarded. This approach may be very unfavourable to the defendant. In this paper, we discuss some important aspects concerning the closest familial relationship, i.e., identical (monozygotic) twins, when reporting the weight of evidence. This can be done even when the suspect has no knowledge of an identical twin or when official records hold no twin information about the suspect. The derived expressions are not original as several authors previously have published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator. If accounting for a monozygotic twin in the weight of evidence, it implies that the likelihood ratio is truncated at a maximal value depending on the prevalence of monozygotic twins and the societal efficiency of recognising a monozygotic twin. If a monozygotic twin is considered as an alternative proposition, then data relevant for the Danish society suggests that the threshold of likelihood ratios should approximately be between 150,000 and 2,000,000 in order to take the risk of an unrecognised identical, monozygotic twin into consideration. In other societies, the threshold of the likelihood ratio in crime cases may reach other, often lower, values depending on the recognition of monozygotic twins and the age of the suspect. In general, more strictly kept

  18. [Forensic risk calculation: basic methodological aspects for the evaluation of the applicability and validity of diverse methods].

    Science.gov (United States)

    Urbaniok, F; Rinne, T; Held, L; Rossegger, A; Endrass, J

    2008-08-01

    Risk assessment instruments have been the subject of a number of validation studies which have mainly examined the psychometric properties known primarily from psychological test development (objectivity, reliability and validity). Hardly any attention was paid to the fact that validation of forensic risk assessment instruments is confronted with a whole row of methodical challenges. Risk assessments include a quantitative and a qualitative component in that they state the probability (quantitative) of a particular offense (qualitative) to occur. To disregard the probabilistic nature of risk calculations leads to methodically faulty assumptions on the predictive validity of an instrument and what represents a suitable statistical method to test it. For example, ROC analyses are considered to be state of the art in the validation of risk assessment instruments. This method does however not take into account the probabilistic nature of prognoses and its results can be interpreted only to a limited degree. ROC analyses for example disregard certain aspects of an instrument's calibration which might lead in an instrument's validation to high ROC values while demonstrating only low validity. Further shortcomings of validation studies are that they ignore changes of risk dispositions or that they don't differentiate between offense specific risks (e. g. any recidivism vs. violent or sexual recidivism). The paper discusses and reviews different quality criteria of risk assessment instruments in view of methodological as well as practical issues. Many of these criteria have been ignored so far in the scientific discourse even though they are essential to the evaluation of the validity and the scope of indication of an instrument.

  19. Multimedia Forensics Is Not Computer Forensics

    Science.gov (United States)

    Böhme, Rainer; Freiling, Felix C.; Gloe, Thomas; Kirchner, Matthias

    The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

  20. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these

  1. [The choice of the study method in forensic medical osteological identification].

    Science.gov (United States)

    Abramov, S S

    1996-01-01

    Discusses the problems related to the theoretical validation of selecting a method of investigation, its application with due consideration for the algorithm of osteological identification, and assessment of the results of this or that method from the viewpoint of the objectiveness and informative value of the method for osteological identification.

  2. Forensic entomology: a template for forensic acarology?

    Science.gov (United States)

    Turner, Bryan

    2009-10-01

    Insects are used in a variety of ways in forensic science and the developing area of forensic acarology may have a similar range of potential. This short account summarises the main ways in which entomology currently contributes to forensic science and discusses to what extent acarology might also contribute in these areas.

  3. Forensic diagnosis of ante- and postmortem burn based on aquaporin-3 gene expression in the skin.

    Science.gov (United States)

    Kubo, Hidemichi; Hayashi, Takahito; Ago, Kazutoshi; Ago, Mihoko; Kanekura, Takuro; Ogata, Mamoru

    2014-05-01

    In order to diagnose death associated with fire, it is essential to show that the person was exposed to heat while still alive. We investigated both AQP1 and AQP3 expression in the skin of an experimental burn model, as well as in forensic autopsy cases, and discuss its role in the differential diagnosis of ante- and postmortem burns. In animal experiments, there was no difference in AQP1 gene expression among four groups (n=4): antemortem burn, postmortem burn, mechanical wound, and control. However, AQP3 expression in the antemortem burn was increased significantly compared with that of the other groups even at 5min after burn. Water content of the skin was decreased significantly by the burn procedure. Consistent with animal experiments, AQP3 gene expression in the skin of antemortem burn cases was increased significantly compared with postmortem burns, mechanical wounds, and controls (n=12 in each group). These observations suggest that dermal AQP3 gene expression was increased to maintain water homeostasis in response to dehydration from burn. Finally, our results suggest that AQP3 gene expression may be useful for forensic molecular diagnosis of antemortem burn.

  4. Client-side Skype forensics: an overview

    Science.gov (United States)

    Meißner, Tina; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.

  5. Sex determination in forensic odontology: A review.

    Science.gov (United States)

    Ramakrishnan, K; Sharma, Subramanya; Sreeja, C; Pratima, D Bhavani; Aesha, I; Vijayabanu, B

    2015-08-01

    Forensic odontology is the application of dental principles to legal issues. Sex determination is a subdivision of forensic odontology and it is very important especially when information relating to the deceased is unavailable. Sex determination becomes the first priority in the process of identification of a person by a forensic investigator in the case of mishaps, chemical and nuclear bomb explosions, natural disasters crime investigations, and ethnic studies. This article reviews upon the various methods used in sex determination.

  6. Sex determination in forensic odontology: A review

    Science.gov (United States)

    Ramakrishnan, K.; Sharma, Subramanya; Sreeja, C.; Pratima, D. Bhavani; Aesha, I.; Vijayabanu, B.

    2015-01-01

    Forensic odontology is the application of dental principles to legal issues. Sex determination is a subdivision of forensic odontology and it is very important especially when information relating to the deceased is unavailable. Sex determination becomes the first priority in the process of identification of a person by a forensic investigator in the case of mishaps, chemical and nuclear bomb explosions, natural disasters crime investigations, and ethnic studies. This article reviews upon the various methods used in sex determination. PMID:26538886

  7. Computer networks forensics

    Directory of Open Access Journals (Sweden)

    Ratomir Đ. Đokić

    2013-02-01

    Full Text Available Normal 0 false false false MicrosoftInternetExplorer4 Digital forensics is a set of scientific methods and procedures for collection, analysis and presentation of evidence that can be found on the computers, servers, computer networks, databases, mobile devices, as well as all other devices on which can store (save data. Digital forensics, computer networks is an examination of digital evidence that can be found on servers and user devices, which are exchanged internal or external communication through local or public networks. Also there is a need for identifying sites and modes of origin messages, establish user identification, and detection types of manipulation by logging in to your account. This paper presents the basic elements of computer networks, software used to communicate and describe the methods of collecting digital evidence and their analysis.

  8. Guidelines in forensic odontology: legal aspects.

    Science.gov (United States)

    Vermylen, Y

    2006-05-15

    The task of the forensic dentist is ruled by an obligation to be diligent and prudent. If guidelines should exist which are recognised by the dental forensic community, they will probably be used to judge his work, even if guidelines are only considered as recommendations. The questions to be answered are: who issued these guidelines and are they conform to evidence-based forensic odontology.

  9. 基于云架构的计算机取证研究%Computer Forensic Research Base on Cloud Architecture

    Institute of Scientific and Technical Information of China (English)

    郑秋新

    2012-01-01

    取证证据必须遵循及时、合法、多备份、远离不安全因素等原则,传统计算机取证无法满足海量证据存储、及时分析的需求。云计算具有高效计算、虚拟化、并行处理等特点,适于解决当前计算机取证领域新的需求。基于云架构的计算机取证模型具有能够解决海量数据分析的问题、提高设备利用率、解决取证人才紧缺以及缩短取证时间等优势。但云的复杂环境存在诸多不安全因素和隐私问题,对计算机取证具有极大的挑战,应对这些挑战亟待业界人员的共同努力。%Forensic evidence must be prompt,legal,multi-backuped,far away from insecure causes,and so on.Traditional computer forensic cannot meet the need of massive evidence storage and timely analysis.Cloud computation has several features,e.g.efficient computation,virtualization,and parallel processing.It agrees with the new need of computer forensic.The computer forensic model,which bases on cloud computation,solves the problem of huge data analysis,improves the equipment utilization rate and shortens the forensics time.A lot of insecure elements and privacy exist in cloud's complicated environment,challenging computer forensics.It demands the active participation of relevant personnel.

  10. Evaluation of Methods to Improve the Extraction and Recovery of DNA from Cotton Swabs for Forensic Analysis

    Science.gov (United States)

    Adamowicz, Michael S.; Stasulli, Dominique M.; Sobestanovich, Emily M.; Bille, Todd W.

    2014-01-01

    Samples for forensic DNA analysis are often collected from a wide variety of objects using cotton or nylon tipped swabs. Testing has shown that significant quantities of DNA are retained on the swab, however, and subsequently lost. When processing evidentiary samples, the recovery of the maximum amount of available DNA is critical, potentially dictating whether a usable profile can be derived from a piece of evidence or not. The QIAamp DNA Investigator extraction kit was used with its recommended protocol for swabs (one hour incubation at 56°C) as a baseline. Results indicate that over 50% of the recoverable DNA may be retained on the cotton swab tip, or otherwise lost, for both blood and buccal cell samples when using this protocol. The protocol’s incubation time and temperature were altered, as was incubating while shaking or stationary to test for increases in recovery efficiency. An additional step was then tested that included periodic re-suspension of the swab tip in the extraction buffer during incubation. Aliquots of liquid blood or a buccal cell suspension were deposited and dried on cotton swabs and compared with swab-less controls. The concentration of DNA in each extract was quantified and STR analysis was performed to assess the quality of the extracted DNA. Stationary incubations and those performed at 65°C did not result in significant gains in DNA yield. Samples incubated for 24 hours yielded less DNA. Increased yields were observed with three and 18 hour incubation periods. Increases in DNA yields were also observed using a swab re-suspension method for both cell types. The swab re-suspension method yielded an average two-fold increase in recovered DNA yield with buccal cells and an average three-fold increase with blood cells. These findings demonstrate that more of the DNA collected on swabs can be recovered with specific protocol alterations. PMID:25549111

  11. Evaluation of methods to improve the extraction and recovery of DNA from cotton swabs for forensic analysis.

    Science.gov (United States)

    Adamowicz, Michael S; Stasulli, Dominique M; Sobestanovich, Emily M; Bille, Todd W

    2014-01-01

    Samples for forensic DNA analysis are often collected from a wide variety of objects using cotton or nylon tipped swabs. Testing has shown that significant quantities of DNA are retained on the swab, however, and subsequently lost. When processing evidentiary samples, the recovery of the maximum amount of available DNA is critical, potentially dictating whether a usable profile can be derived from a piece of evidence or not. The QIAamp DNA Investigator extraction kit was used with its recommended protocol for swabs (one hour incubation at 56°C) as a baseline. Results indicate that over 50% of the recoverable DNA may be retained on the cotton swab tip, or otherwise lost, for both blood and buccal cell samples when using this protocol. The protocol's incubation time and temperature were altered, as was incubating while shaking or stationary to test for increases in recovery efficiency. An additional step was then tested that included periodic re-suspension of the swab tip in the extraction buffer during incubation. Aliquots of liquid blood or a buccal cell suspension were deposited and dried on cotton swabs and compared with swab-less controls. The concentration of DNA in each extract was quantified and STR analysis was performed to assess the quality of the extracted DNA. Stationary incubations and those performed at 65°C did not result in significant gains in DNA yield. Samples incubated for 24 hours yielded less DNA. Increased yields were observed with three and 18 hour incubation periods. Increases in DNA yields were also observed using a swab re-suspension method for both cell types. The swab re-suspension method yielded an average two-fold increase in recovered DNA yield with buccal cells and an average three-fold increase with blood cells. These findings demonstrate that more of the DNA collected on swabs can be recovered with specific protocol alterations.

  12. Evaluation of methods to improve the extraction and recovery of DNA from cotton swabs for forensic analysis.

    Directory of Open Access Journals (Sweden)

    Michael S Adamowicz

    Full Text Available Samples for forensic DNA analysis are often collected from a wide variety of objects using cotton or nylon tipped swabs. Testing has shown that significant quantities of DNA are retained on the swab, however, and subsequently lost. When processing evidentiary samples, the recovery of the maximum amount of available DNA is critical, potentially dictating whether a usable profile can be derived from a piece of evidence or not. The QIAamp DNA Investigator extraction kit was used with its recommended protocol for swabs (one hour incubation at 56°C as a baseline. Results indicate that over 50% of the recoverable DNA may be retained on the cotton swab tip, or otherwise lost, for both blood and buccal cell samples when using this protocol. The protocol's incubation time and temperature were altered, as was incubating while shaking or stationary to test for increases in recovery efficiency. An additional step was then tested that included periodic re-suspension of the swab tip in the extraction buffer during incubation. Aliquots of liquid blood or a buccal cell suspension were deposited and dried on cotton swabs and compared with swab-less controls. The concentration of DNA in each extract was quantified and STR analysis was performed to assess the quality of the extracted DNA. Stationary incubations and those performed at 65°C did not result in significant gains in DNA yield. Samples incubated for 24 hours yielded less DNA. Increased yields were observed with three and 18 hour incubation periods. Increases in DNA yields were also observed using a swab re-suspension method for both cell types. The swab re-suspension method yielded an average two-fold increase in recovered DNA yield with buccal cells and an average three-fold increase with blood cells. These findings demonstrate that more of the DNA collected on swabs can be recovered with specific protocol alterations.

  13. Statistical basis for positive identification in forensic anthropology.

    Science.gov (United States)

    Steadman, Dawnie Wolfe; Adams, Bradley J; Konigsberg, Lyle W

    2006-09-01

    Forensic scientists are often expected to present the likelihood of DNA identifications in US courts based on comparative population data, yet forensic anthropologists tend not to quantify the strength of an osteological identification. Because forensic anthropologists are trained first and foremost as physical anthropologists, they emphasize estimation problems at the expense of evidentiary problems, but this approach must be reexamined. In this paper, the statistical bases for presenting osteological and dental evidence are outlined, using a forensic case as a motivating example. A brief overview of Bayesian statistics is provided, and methods to calculate likelihood ratios for five aspects of the biological profile are demonstrated. This paper emphasizes the definition of appropriate reference samples and of the "population at large," and points out the conceptual differences between them. Several databases are introduced for both reference information and to characterize the "population at large," and new data are compiled to calculate the frequency of specific characters, such as age or fractures, within the "population at large." Despite small individual likelihood ratios for age, sex, and stature in the case example, the power of this approach is that, assuming each likelihood ratio is independent, the product rule can be applied. In this particular example, it is over three million times more likely to obtain the observed osteological and dental data if the identification is correct than if the identification is incorrect. This likelihood ratio is a convincing statistic that can support the forensic anthropologist's opinion on personal identity in court.

  14. One Validity Model of Digital Data Forensics Based on Trusted Probability%基于可信概率的电子数据取证有效性模型

    Institute of Scientific and Technical Information of China (English)

    孙国梓; 耿伟明; 陈丹伟; 申涛

    2011-01-01

    According to the shortage of the current evidence s validity, one validity model of digital data forensics based on trusted probability is put forward. Based on Petri net, after collecting the evidence, the digital data processed through formalization is abstracted as the place of Petri net, at the same time, the operating behaviors and forensics methods are abstracted as the transitions. Then the backward nodes are formed by making some transformation on the forward nodes using the methods described above. The model puts forward the basic definitions and the methods of formalization processing. Moreover, it makes some researches on the related algorithms of probability calculation and describes the reasoning process in detail. The validity of evidence is proved by the combination architecture "Credit + Data source + Forensics rules", which provides theoretical basis for credibility of dynamic behavior in trusted forensics. Using the method of probability calculation, the concrete probability value can be finally gained. If the data source is supposed to be trusted, which means the data has trusted static attribute, then we can use the method of trusted probability, whose value is closing to 0 or 1, to ensure the forensics rules to betrusted within the processing, and the methods or the behaviors of dynamic forensics are trusted too. These models and methods give high confidence to the digital data as the evidence. In the end, a system of validity proof is designed to analyze and verify the trusted probability through its concrete application in the validity model of digital data forensics.%针对当前证据有效性不足的缺点,结合概率论,提出了基于可信概率的电子数据取证有效性模型.以Petri网为基础,将取证后经形式化处理的数据抽象为Petri网中的库所,操作行为和取证方法抽象为变迁,后一节点为运用该操作方法对前一节点进行某种变换所形成.给出了取证过程中的基本定义和形

  15. Human identification & forensic analyses of degraded or low level DNA

    NARCIS (Netherlands)

    Westen, Antoinette-Andrea

    2013-01-01

    DNA-based human identification is employed in varying situations, such as disaster victim identification, relationship testing and forensic analyses. When DNA is of low quality and/or quantity, standard methods for DNA profiling may not suffice. The research described in this thesis is aimed at the

  16. Human identification & forensic analyses of degraded or low level DNA

    NARCIS (Netherlands)

    Westen, Antoinette-Andrea

    2013-01-01

    DNA-based human identification is employed in varying situations, such as disaster victim identification, relationship testing and forensic analyses. When DNA is of low quality and/or quantity, standard methods for DNA profiling may not suffice. The research described in this thesis is aimed at the

  17. Forensic toxicology.

    Science.gov (United States)

    Drummer, Olaf H

    2010-01-01

    Forensic toxicology has developed as a forensic science in recent years and is now widely used to assist in death investigations, in civil and criminal matters involving drug use, in drugs of abuse testing in correctional settings and custodial medicine, in road and workplace safety, in matters involving environmental pollution, as well as in sports doping. Drugs most commonly targeted include amphetamines, benzodiazepines, cannabis, cocaine and the opiates, but can be any other illicit substance or almost any over-the-counter or prescribed drug, as well as poisons available to the community. The discipline requires high level skills in analytical techniques with a solid knowledge of pharmacology and pharmacokinetics. Modern techniques rely heavily on immunoassay screening analyses and mass spectrometry (MS) for confirmatory analyses using either high-performance liquid chromatography or gas chromatography as the separation technique. Tandem MS has become more and more popular compared to single-stage MS. It is essential that analytical systems are fully validated and fit for the purpose and the assay batches are monitored with quality controls. External proficiency programs monitor both the assay and the personnel performing the work. For a laboratory to perform optimally, it is vital that the circumstances and context of the case are known and the laboratory understands the limitations of the analytical systems used, including drug stability. Drugs and poisons can change concentration postmortem due to poor or unequal quality of blood and other specimens, anaerobic metabolism and redistribution. The latter provides the largest handicap in the interpretation of postmortem results.

  18. Dental Forensics: Bitemark Analysis

    Directory of Open Access Journals (Sweden)

    Elza Ibrahim Auerkari

    2013-06-01

    Full Text Available Forensic odontology (dental forensics can provide useful evidence in both criminal and civil cases, and therefore remains a part of the wider discipline of forensic science. As an example from the toolbox of forensic odontology, the practice and experience on bitemark analysis is reviewed here in brief. The principle of using visible bitemarks in crime victims or in other objects as evidence is fundamentally based on the observation that the detailed pattern of dental imprints tend to be practically unique for each individual. Therefore, finding such an imprint as a bitemark can bear a strong testimony that it was produced by the individual that has the matching dental pattern. However, the comparison of the observed bitemark and the suspected set of teeth will necessarily require human interpretation, and this is not infallible. Both technical challenges in the bitemarks and human errors in the interpretation are possible. To minimise such errors and to maximise the value of bitemark analysis, dedicated procedures and protocols have been developed, and the personnel taking care of the analysis need to be properly trained. In principle the action within the discipline should be conducted as in evidence-based dentristy, i.e. accepted procedures should have known error rates. Because of the involvement of human interpretation, even personal performance statistics may be required from legal expert statements. The requirements have been introduced largely due to cases where false convictions based on bitemark analysishave been overturned after DNA analysis.DOI: 10.14693/jdi.v15i2.76

  19. 基于Apriori算法的网络取证设计%Design of Network Forensics Based on Apriori Algorithm

    Institute of Scientific and Technical Information of China (English)

    钟秀玉

    2011-01-01

    传统的计算机取证在事后收集证据,证据的法律效率低.网络取证把入侵发生后的被动调查转为事件发生之前的主动防御.基于Apriori算法的网络取证系统挖掘各种犯罪事件的关联,建立犯罪特征库.系统在获取、过滤网络数据包后,对原始数据进行协议分析,挖掘数据包间的关联信息,提取关联规则记录,再根据当前用户行为记录与犯罪特征规则的匹配结果来判定当前用户行为是否非法.为保证证据更具有原始性、完整性和法律效率,系统对获得原始数据进行加密传输,使用基于SSL的加密认证安全设计,防止证据泄露和被伪造.模拟实验表明,Apriori算法的应用提高了非法入侵检测效率,可识别新的犯罪行为,系统完整地重构犯罪过程.%Because the traditional computer forensics collects evidence after events, the legal efficiency of evidence is low.Network forensics turns the passive investigation after events to the active defense before events.Network forensics based on Apriori algorithm mines the association of crime events to build crime characteristic database.After gaining and filtering the network data packet, the system carries on protocol analysis to the primary data, the association information between data packets are mined and the association role records are extracted,and the current user behavior is illegal or not according to match result of the current user behavior records and the crime characteristic rules.In order to guarantee the primitiveness, integrity and legal efficiency of evidence, the system uses encryption transmission to the primary data and uses the SSL encryption authentication safe design to prevent evidence revealed and fabricated.Simulation results show that the application of Apriori algorithm increases illegal invasion detection efficiency and can identify new crime, and the system restructures criminal process completely.

  20. Forensic geotechnical engineering

    CERN Document Server

    Babu, GL

    2016-01-01

    In this edited volume on advances in forensic geotechnical engineering, a number of technical contributions by experts and professionals in this area are included. The work is the outcome of deliberations at various conferences in the area conducted by Prof. G.L. Sivakumar Babu and Dr. V.V.S. Rao as secretary and Chairman of Technical Committee on Forensic Geotechnical Engineering of International Society for Soil Mechanics and Foundation Engineering (ISSMGE). This volume contains papers on topics such as guidelines, evidence/data collection, distress characterization, use of diagnostic tests (laboratory and field tests), back analysis, failure hypothesis formulation, role of instrumentation and sensor-based technologies, risk analysis, technical shortcomings. This volume will prove useful to researchers and practitioners alike.

  1. [Allele-specific PCR and its application in forensic science].

    Science.gov (United States)

    Nie, Yan-chai; Wang, Bin; Zhao, Zi-qin; Zhou, Huai-gu

    2014-08-01

    Allele-specific polymerase chain reaction (AS-PCR) is a technique based on allele-specific primers, which can be used to analyze single nucleotide polymorphism (SNP) effectively including the transition, transversion and insertion/deletion polymorphism and has been exploited in the study of diseases research, molecular diagnosis, and forensic biological evidence. The article systematically reviews the principle, the detection methods, improvement of AS-PCR, and its research updates in the fields of autosome, Y chromosome and mitochondrial SNP, as well as its application in forensic science.

  2. Detection of Acetone Processing of Castor Bean Mash for Forensic Investigation of Ricin Preparation Methods

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer-Martin, Helen W.; Wahl, Jon H.; Metoyer, Candace N.; Colburn, Heather A.; Wahl, Karen L.

    2010-07-01

    The toxic protein ricin is of concern as a potential biological threat agent (BTA) Recently, several samples of ricin have been seized in connection with biocriminal activity. Analytical methods are needed that enable federal investigators to determine how the samples were prepared, to match seized samples to potential source materials, and to identify samples that may have been prepared by the same method using the same source materials. One commonly described crude ricin preparation method is acetone extraction of crushed castor beans. Here we describe the use of solid-phase microextraction and headspace analysis of crude ricin preparation samples to determine whether they were processed by acetone extraction. In all cases, acetone-extracted bean mash could be distinguished from un-extracted mash or mash extracted with other organic solvents. Statistical analysis showed that storage in closed containers for up to 109 days had no effect on acetone signal intensity. Signal intensity in acetone-extracted mash decreased during storage in open containers, but extracted mash could still be distinguished from un-extracted mash after 94 days.

  3. The forensic aspects of sexual violence.

    Science.gov (United States)

    Newton, Mary

    2013-02-01

    Complainants of sexual assault may disclose to different agencies, the police and health professionals being the most likely. It is possible for certain evidence types to be collected before a clinical forensic assessment takes place that do not require the need for a Forensic Medical Practitioner. If the time frames after the incident and the nature of assault warrant the need for a forensic medical examination of either a complainant or a suspect, this should only be conducted by doctors and nurses who have received relevant, up-to-date specialist theoretical and practical training. Clear evidence shows that few other criminal offences require as extensive an examination and collection of forensic evidence as that of a sexual assault. The forensic evidence in a case may identify an assailant, eliminate a nominated suspect(s), and assist in the prosecution of a case. The elements of forensic medical examination, reviewed in this chapter, are those that are the most varied across jurisdictions around the world currently. Key focus points of this chapter are considerations for early evidence collection, utilising dedicated medical examination facilities for sample collection, contamination issues associated with evidence collection and certain practical aspects of forensic sampling methods which have evolved given results identified by Forensic Scientists processing evidential samples in sexual assault cases, Some of the problems encountered by the forensic science provider will also be discussed.

  4. A comparative study of photogrammetric methods using panoramic photography in a forensic context.

    Science.gov (United States)

    Sheppard, Kayleigh; Cassella, John P; Fieldhouse, Sarah

    2017-02-04

    Taking measurements of a scene is an integral aspect of the crime scene documentation process, and accepted limits of accuracy for taking measurements at a crime scene vary throughout the world. In the UK, there is no published accepted limit of accuracy, whereas the United States has an accepted limit of accuracy of 0.25 inch. As part of the International organisation for Standardisation 17020 accreditation competency testing is required for all work conducted at the crime scene. As part of this, all measuring devices need to be calibrated within known tolerances in order to meet the required standard, and measurements will be required to have a clearly defined limit of accuracy. This investigation sought to compare measurement capabilities of two different methods for measuring crime scenes; using a tape measure, and a 360° camera with complimentary photogrammetry software application. Participants measured ten fixed and non-fixed items using both methods and these were compared to control measurements taken using a laser distance measure. Statistical analysis using a Wilcoxon Signed Rank test demonstrated statistically significant differences between the tape, software and control measurements. The majority of the differences were negligible, amounting to millimetre differences. The tape measure was found to be more accurate than the software application, which offered greater precision. Measurement errors were attributed to human error in understanding the operation of the software, suggesting that training be given before using the software to take measurements. Transcription errors were present with the tape measure approach. Measurements taken using the photogrammetry software were more reproducible than the tape measure approach, and offered flexibility with regards to the time and location of the documentation process, unlike manual tape measuring.

  5. An Android Communication App Forensic Taxonomy.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2016-09-01

    Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps. © 2016 American Academy of Forensic Sciences.

  6. [Application of DNA labeling technology in forensic botany].

    Science.gov (United States)

    Znang, Xian; Li, Jing-Lin; Zhang, Xiang-Yu

    2008-12-01

    Forensic botany is a study of judicial plant evidence. Recently, researches on DNA labeling technology have been a mainstream of forensic botany. The article systematically reviews various types of DNA labeling techniques in forensic botany with enumerated practical cases, as well as the potential forensic application of each individual technique. The advantages of the DNA labeling technology over traditional morphological taxonomic methods are also summarized.

  7. Forensic odontology in India, an oral pathologist's perspective

    OpenAIRE

    Pushparaja Shetty; A Raviprakash

    2011-01-01

    Objectives: Oral pathologists have major responsibilities in the development of forensic science. We conducted a survey to evaluate the degree of involvement of oral pathologists in forensic investigations in India and the difficulties faced by them. Materials and Methods: Data was collected during 2007-2009 by means of a questionnaire survey among qualified oral pathologists related to confidence in handling forensic cases, knowledge and awareness, training in forensic odontology, practical ...

  8. [Low template DNA profiling and its application in forensic science].

    Science.gov (United States)

    Ma, Yan; Kuang, Jin-zhi; Hou, Yi-ping

    2010-04-01

    Low template DNA (LTDNA) has been widely applied in the field of forensic science in recent years. However, the application of low copy number(LCN) analysis is still controversial in certain forensic. This paper focus on the definition of LCN and LTDNA, casework because of its inherent limiting factors. the validity and application of LCN in forensic science, methods of typing, quality control, replicate analysis, detection thresholds and then reviews the latest development of LCN in forensic science.

  9. American Academy of Forensic Sciences

    Science.gov (United States)

    ... College & University Listings FEPAC Accredited Programs Courses in Forensic Odontology Choosing a Career What is Forensic Science? What ... Legislative Corner Forensic Sciences Foundation American Society of Forensic Odontology Research Grants Academy Standards Board (ASB) Account Portal ...

  10. Forensic odontology in India, an oral pathologist′s perspective

    Directory of Open Access Journals (Sweden)

    Pushparaja Shetty

    2011-01-01

    Full Text Available Objectives: Oral pathologists have major responsibilities in the development of forensic science. We conducted a survey to evaluate the degree of involvement of oral pathologists in forensic investigations in India and the difficulties faced by them. Materials and Methods: Data was collected during 2007-2009 by means of a questionnaire survey among qualified oral pathologists related to confidence in handling forensic cases, knowledge and awareness, training in forensic odontology, practical exposure to forensic cases, and difficulties faced. Results: A total of 120 oral pathologists responded to the questionnaire. Of these, 28% expressed confidence in handling forensic cases, 7% had been exposed to formal training in forensic odontology, and 6% had handled forensic cases earlier. Only two participants said that they were part of the forensic team in their respective cities. Forty-eight percent of the participants said that they read forensic journals regularly. Conclusion: Oral pathologists are generally not very confident about handling forensic cases mainly because of inadequate formal training in the field of forensic dentistry, inadequate exposure to the subject, minimal importance given to the subject in the undergraduate and postgraduate curriculum, and no practical exposure to forensic cases.

  11. Identification of the forensically important beetles Nicrophorus japonicus, Ptomascopus plagiatus and Silpha carinata (Coleoptera: Silphidae) based on 16S rRNA gene in China.

    Science.gov (United States)

    Tang, Z C; Guo, Y D; Zhang, X W; Shi, J; Yang, K T; Li, X L; Chen, Y Q; Cai, J F

    2012-09-01

    Sarcophagous beetles play an important role in estimating postmortem interval time (PMI) in the later stages decomposition of carcasses. However, the morphological similarity of beetles usually poses a challenge for forensic scientists within their routine work. As a supplementary to traditional morphological method, molecular genetics identification is simple and time-saving. A molecular identification method involving a 288-bp segment of the 16S ribosomal RNA (16S rRNA) gene from 15 beetles of Silphidae (Coleoptera), collected from 5 locations in 4 Chinese provinces, was evaluated. Phenogram analysis of the sequenced segments by the unweighted pairgroup method analysis (UPGMA) method showed that all specimens were properly assigned into four species with strong similarity, which indicated the possibility of separation congeneric species with the short 16S rRNA fragment. These results will be instrumental for implementation of the Chinese database of forensically relevant beetles.

  12. Practical mobile forensics

    CERN Document Server

    Bommisetty, Satish; Mahalik, Heather

    2014-01-01

    The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re

  13. Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns

    Directory of Open Access Journals (Sweden)

    Jie Zhao

    2013-01-01

    Full Text Available Nowadays the demand for identifying the authenticity of an image is much increased since advanced image editing software packages are widely used. Region duplication forgery is one of the most common and immediate tampering attacks which are frequently used. Several methods to expose this forgery have been developed to detect and locate the tampered region, while most methods do fail when the duplicated region undergoes rotation or flipping before being pasted. In this paper, an efficient method based on Harris feature points and local binary patterns is proposed. First, the image is filtered with a pixelwise adaptive Wiener method, and then dense Harris feature points are employed in order to obtain a sufficient number of feature points with approximately uniform distribution. Feature vectors for a circle patch around each feature point are extracted using local binary pattern operators, and the similar Harris points are matched based on their representation feature vectors using the BBF algorithm. Finally, RANSAC algorithm is employed to eliminate the possible erroneous matches. Experiment results demonstrate that the proposed method can effectively detect region duplication forgery, even when an image was distorted by rotation, flipping, blurring, AWGN, JPEG compression, and their mixed operations, especially resistant to the forgery with the flat area of little visual structures.

  14. Thinking forensics: Cognitive science for forensic practitioners.

    Science.gov (United States)

    Edmond, Gary; Towler, Alice; Growns, Bethany; Ribeiro, Gianni; Found, Bryan; White, David; Ballantyne, Kaye; Searston, Rachel A; Thompson, Matthew B; Tangen, Jason M; Kemp, Richard I; Martire, Kristy

    2017-03-01

    Human factors and their implications for forensic science have attracted increasing levels of interest across criminal justice communities in recent years. Initial interest centred on cognitive biases, but has since expanded such that knowledge from psychology and cognitive science is slowly infiltrating forensic practices more broadly. This article highlights a series of important findings and insights of relevance to forensic practitioners. These include research on human perception, memory, context information, expertise, decision-making, communication, experience, verification, confidence, and feedback. The aim of this article is to sensitise forensic practitioners (and lawyers and judges) to a range of potentially significant issues, and encourage them to engage with research in these domains so that they may adapt procedures to improve performance, mitigate risks and reduce errors. Doing so will reduce the divide between forensic practitioners and research scientists as well as improve the value and utility of forensic science evidence.

  15. Forensic seismology revisited

    Science.gov (United States)

    Douglas, A.

    2007-01-01

    The first technical discussions, held in 1958, on methods of verifying compliance with a treaty banning nuclear explosions, concluded that a monitoring system could be set up to detect and identify such explosions anywhere except underground: the difficulty with underground explosions was that there would be some earthquakes that could not be distinguished from an explosion. The development of adequate ways of discriminating between earthquakes and underground explosions proved to be difficult so that only in 1996 was a Comprehensive Nuclear Test Ban Treaty (CTBT) finally negotiated. Some of the important improvements in the detection and identification of underground tests—that is in forensic seismology—have been made by the UK through a research group at the Atomic Weapons Establishment (AWE). The paper describes some of the advances made in identification since 1958, particularly by the AWE Group, and the main features of the International Monitoring System (IMS), being set up to verify the Test Ban. Once the Treaty enters into force, then should a suspicious disturbance be detected the State under suspicion of testing will have to demonstrate that the disturbance was not a test. If this cannot be done satisfactorily the Treaty has provisions for on-site inspections (OSIs): for a suspicious seismic disturbance for example, an international team of inspectors will search the area around the estimated epicentre of the disturbance for evidence that a nuclear test really took place. Early observations made at epicentral distances out to 2,000 km from the Nevada Test Site showed that there is little to distinguish explosion seismograms from those of nearby earthquakes: for both source types the short-period (SP: ˜1 Hz) seismograms are complex showing multiple arrivals. At long range, say 3,000 10,000 km, loosely called teleseismic distances, the AWE Group noted that SP P waves—the most widely and well-recorded waves from underground explosions—were in

  16. Forensics mobile devices

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2013-02-01

    Full Text Available The article gives an overview of possibilities of digitized mobile(portable devices, and methods of research data with them.Emphasis is placed on the forensic investigation of mobilephones, but are covered by other media and research for digitalprocessing, transmission and storage of information.A special emphasis was made on the software tools in carrying out the acquisition of digital data, with the aim of sending the reader on ways and methods to protect data but also knowledgewhich is the same all be found and how they can be misused for criminal purposes

  17. Paternity analysis based on NGM SElect system in the Medical and Forensic Genetics Laboratory, Department of Forensic Medicine, Medical University of Lodz

    Directory of Open Access Journals (Sweden)

    Beata Markiewicz-Knyziak

    2015-08-01

    Full Text Available The aim of the study was to evaluate the usefulness of the NGM SElect multiplex kit for paternity testing in the population of central Poland, and compare it with the IDENTIFILER system. The study material consisted of buccal swabs taken from individuals who reported to the Medical and Forensic Genetics Laboratory in Lodz. Samples from 450 trio cases of disputed paternity carried out in 2010–2014 were investigated. Genomic DNA was extracted from buccal swabs collected from 1,350 individuals using the Swab kit (A&A Biotechnology according to the manufacturer’s protocol. DNA amplification was performed using the AmpFℓSTR ® NGM Select TM PCR Amplification Kit (Life Technologies. PCR products were separated by capillary electrophoresis using HID 3500 Genetic Analyzer. In the analyzed cases with paternity confirmation in the NGM SElect system, the maximum value of PI was 3.9 × 10 12 , which corresponds to the probability of paternity W = 99.9999999999%. It was thus significantly higher than analogical parameters obtained in the IDENTIFILER system (PI = 6.0 × 10 10 , W = 99.99999999%. The NGM SElect kit was unable to resolve just one case out of 450, which represents only 0.2% of all analyzed disputed paternity cases. The study showed the SE33 (ACTBP2 locus to have the highest evidence value in paternity analysis out of all investigated autosomal STRs.

  18. Paternity analysis based on NGM SElect system in the Medical and Forensic Genetics Laboratory, Department of Forensic Medicine, Medical University of Lodz.

    Science.gov (United States)

    Markiewicz-Knyziak, B; Jędrzejczyk, M; Bąbol-Pokora, K; Wojtkiewicz, R; Jacewicz, R

    2015-01-01

    The aim of the study was to evaluate the usefulness of the NGM SElect multiplex kit for paternity testing in the population of central Poland, and compare it with the IDENTIFILER system. The study material consisted of buccal swabs taken from individuals who reported to the Medical and Forensic Genetics Laboratory in Lodz. Samples from 450 trio cases of disputed paternity carried out in 2010-2014 were investigated. Genomic DNA was extracted from buccal swabs collected from 1,350 individuals using the Swab kit (A and A Biotechnology) according to the manufacturer's protocol. DNA amplification was performed using the AmpFℓSTR® NGM SelectTM PCR Amplification Kit (Life Technologies). PCR products were separated by capillary electrophoresis using HID 3500 Genetic Analyzer. In the analyzed cases with paternity confirmation in the NGM SElect system, the maximum value of PI was 3.9 × 1012, which corresponds to the probability of paternity W = 99.9999999999%. It was thus significantly higher than analogical parameters obtained in the IDENTIFILER system (PI = 6.0 × 1010, W = 99.99999999%). The NGM SElect kit was unable to resolve just one case out of 450, which represents only 0.2% of all analyzed disputed paternity cases. The study showed the SE33 (ACTBP2) locus to have the highest evidence value in paternity analysis out of all investigated autosomal STRs.

  19. Forensic Botany: Evidence and Analysis.

    Science.gov (United States)

    Coyle, H M

    2009-01-01

    Forensic botany is the use of plant evidence in matters of law. While plant fragments are often collected as trace evidence, they are only occasionally identified using microscopy and are still more rarely assessed using molecular biology techniques for individualization and sourcing of a sample. There are many different methods useful for DNA typing of plants; this review focuses on those techniques (DNA sequencing, STR, AFLP, RAPD) most relevant to the forensic science community and on those methods currently in practice. Plant evidence is commonly associated with homicides, with clandestine graves, as trace pollen on clothing, vehicles, or packaging, or in the transport of illicit drugs. DNA can be especially useful for the identification of minute quantity of samples, for differentiation of plants that lack distinguishing morphological features, and for generating a unique identifier for associative forensic evidence.

  20. Post-mortem forensic neuroimaging: correlation of MSCT and MRI findings with autopsy results.

    Science.gov (United States)

    Yen, Kathrin; Lövblad, Karl-Olof; Scheurer, Eva; Ozdoba, Christoph; Thali, Michael J; Aghayev, Emin; Jackowski, Christian; Anon, Javier; Frickey, Nathalie; Zwygart, Karin; Weis, Joachim; Dirnhofer, Richard

    2007-11-15

    Multislice-computed tomography (MSCT) and magnetic resonance imaging (MRI) are increasingly used for forensic purposes. Based on broad experience in clinical neuroimaging, post-mortem MSCT and MRI were performed in 57 forensic cases with the goal to evaluate the radiological methods concerning their usability for forensic head and brain examination. An experienced clinical radiologist evaluated the imaging data. The results were compared to the autopsy findings that served as the gold standard with regard to common forensic neurotrauma findings such as skull fractures, soft tissue lesions of the scalp, various forms of intracranial hemorrhage or signs of increased brain pressure. The sensitivity of the imaging methods ranged from 100% (e.g., heat-induced alterations, intracranial gas) to zero (e.g., mediobasal impression marks as a sign of increased brain pressure, plaques jaunes). The agreement between MRI and CT was 69%. The radiological methods prevalently failed in the detection of lesions smaller than 3mm of size, whereas they were generally satisfactory concerning the evaluation of intracranial hemorrhage. Due to its advanced 2D and 3D post-processing possibilities, CT in particular possessed certain advantages in comparison with autopsy with regard to forensic reconstruction. MRI showed forensically relevant findings not seen during autopsy in several cases. The partly limited sensitivity of imaging that was observed in this retrospective study was based on several factors: besides general technical limitations it became apparent that clinical radiologists require a sound basic forensic background in order to detect specific signs. Focused teaching sessions will be essential to improve the outcome in future examinations. On the other hand, the autopsy protocols should be further standardized to allow an exact comparison of imaging and autopsy data. In consideration of these facts, MRI and CT have the power to play an important role in future forensic

  1. Accreditation standards for undergraduate forensic science programs

    Science.gov (United States)

    Miller, Marilyn Tebbs

    Undergraduate forensic science programs are experiencing unprecedented growth in numbers of programs offered and, as a result, student enrollments are increasing. Currently, however, these programs are not subject to professional specialized accreditation. This study sought to identify desirable student outcome measures for undergraduate forensic science programs that should be incorporated into such an accreditation process. To determine desirable student outcomes, three types of data were collected and analyzed. All the existing undergraduate forensic science programs in the United States were examined with regard to the input measures of degree requirements and curriculum content, and for the output measures of mission statements and student competencies. Accreditation procedures and guidelines for three other science-based disciplines, computer science, dietetics, and nursing, were examined to provide guidance on accreditation processes for forensic science education programs. Expert opinion on outcomes for program graduates was solicited from the major stakeholders of undergraduate forensic science programs-forensic science educators, crime laboratory directors, and recent graduates. Opinions were gathered by using a structured Internet-based survey; the total response rate was 48%. Examination of the existing undergraduate forensic science programs revealed that these programs do not use outcome measures. Of the accreditation processes for other science-based programs, nursing education provided the best model for forensic science education, due primarily to the balance between the generality and the specificity of the outcome measures. From the analysis of the questionnaire data, preliminary student outcomes, both general and discipline-specific, suitable for use in the accreditation of undergraduate forensic science programs were determined. The preliminary results were reviewed by a panel of experts and, based on their recommendations, the outcomes

  2. Forensic DNA phenotyping : Regulatory issues

    NARCIS (Netherlands)

    Koops, E.J.; Schellekens, M.H.M.

    2008-01-01

    Forensic DNA phenotyping is an interesting new investigation method: crime-scene DNA is analyzed to compose a description of the unknown suspect, including external and behavioral features, geographic origin and perhaps surname. This method is allowed in some countries but prohibited in a few

  3. Forensic DNA phenotyping : Regulatory issues

    NARCIS (Netherlands)

    Koops, E.J.; Schellekens, M.H.M.

    2008-01-01

    Forensic DNA phenotyping is an interesting new investigation method: crime-scene DNA is analyzed to compose a description of the unknown suspect, including external and behavioral features, geographic origin and perhaps surname. This method is allowed in some countries but prohibited in a few others

  4. The use of electroconvulsive therapy in a cohort of forensic psychiatric patients with schizophrenia

    DEFF Research Database (Denmark)

    Kristensen, Diana; Brandt-Christensen, Anne Mette; Ockelmann, Hans Henrik;

    2012-01-01

    BACKGROUND: In Denmark, over 2500 people are in psychiatric treatment in forensic mental health services at any one time, most suffering from schizophrenia. Many of them have illnesses that are resistant to medication. There is evidence of the effectiveness of electroconvulsive therapy (ECT......) for schizophrenia, but not explicitly for this complex forensic group. AIMS: The aim of this study was to describe the outcome of using ECT as augmentation therapy in a cohort of forensic psychiatric patients with schizophrenia who were failing to respond to antipsychotic medication. METHODS: In one university......-based psychiatric clinic, data were extracted from the medical records of all patients treated with ECT during a 6-year period. Fifty-nine of these patients were diagnosed within the schizophrenia spectrum and eight were in specialist forensic hospital services. RESULTS: The mean duration of illness...

  5. Learning Android forensics

    CERN Document Server

    Tamma, Rohit

    2015-01-01

    If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

  6. Integrating Forensic Science.

    Science.gov (United States)

    Funkhouser, John; Deslich, Barbara J.

    2000-01-01

    Explains the implementation of forensic science in an integrated curriculum and discusses the advantages of this approach. Lists the forensic science course syllabi studied in three high schools. Discusses the unit on polymers in detail. (YDS)

  7. Integrating Forensic Science.

    Science.gov (United States)

    Funkhouser, John; Deslich, Barbara J.

    2000-01-01

    Explains the implementation of forensic science in an integrated curriculum and discusses the advantages of this approach. Lists the forensic science course syllabi studied in three high schools. Discusses the unit on polymers in detail. (YDS)

  8. A forensics-based approach for assessing incipient heterogeneity of a hydrologic system.

    Science.gov (United States)

    Alves Meira Neto, A.; Matos, K. A.; Wang, Y.; Troch, P. A. A.; Chorover, J.; Ferré, T. P. A.

    2015-12-01

    Hydrologic systems are far from being static in time. Therefore, the study of the evolution of natural systems along with the investigation of the interactions between hydrology, geochemistry and geophysics can be highly beneficial for improving hydrologic predictions. In this study, a combined hydrologic, geophysical and geochemical approach is proposed to investigate the incipient heterogeneity in a small hydrologic system subject to intensive flux of water through a period of one year. The Mini-LEO is a sloping metallic lysimeter containing 1 m3 of granular basalt, constructed as a smaller scale version of Landscape Evolution Observatory (LEO) artificial hillslopes. The initially pristine soil inside the Mini-LEO had undergone several cycles of irrigation, which might have changed the internal structure of this system, as observed by both hydrometric data and corroborated by studies pointing out to a rapid weathering of the basaltic soil. A forensic approach was proposed, where the Mini-LEO was systematically excavated for the investigation of its initial signs of hydrologic co-evolution. The lysimeter was sub-divided in voxels, for which 100 undisturbed soil samples and fragmented subsamples were collected for further analysis of soil hydraulic properties (saturated hydraulic conductivity and characteristic curve) as well as geochemical composition (elemental dissolution/accumulations and mineralogical transformations). Additionally, electrical resistivity (ER) measurements at different water content were measured for each sample. The results of this study are manifold: The expected geochemical signature will be used for validating current hydro-geochemical models of the Mini-LEO, and the superposition of the geochemical and hydraulic analysis will serve as discriminatory data for the results of geophysical investigation.

  9. Forensic microbiology and bioterrorism risk (Part II

    Directory of Open Access Journals (Sweden)

    Maria Nasso

    2007-04-01

    Full Text Available The letters containing anthrax, sent in 2001 in USA, showed that pathogens and toxins can be effectively used for terrorist purposes. A new subfield of forensic science, called “microbial forensics”, has been developed. It is a new scientific discipline dedicated to collect and analyze microbiological evidence from a scene of crime. In addition to collecting and analyzing traditional forensic evidences, the microbial forensic investigation will attempt to determine the identity of the causal agent, as so as epidemiologic investigation, but with higher-resolution characterization. The tools for a successful attribution include genetically based-assays to determine the exact strain of isolate, aiming the individualization of the source of the pathogen used in a biological weapon. Following the 2001 anthrax attacks, genotyping of B. anthracis was done on 8 variable number tandem repeats loci (VNTR polymorphisms, with multilocus variable number tandem repeats (MLVA method. In recent years some research groups have increased the VNTR markers number to 25 loci, while other groups have identified single nucleotide repeat (SNR polymorphisms, which display very high mutation rates. SNR marker system allows the distinguishing of isolates with extremely low levels of genetic diversity within the same MLVA genotype.

  10. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    procedures and training to meet these initial challenges so as minimize disturbance of the evidence. While epidemiology and forensics are similar sciences with similar goals when applied to biocrimes, forensics has additional and more stringent requirements. Maintaining a chain of custody on evidentiary samples is one example of an extra requirement imposed on an investigation of a biocrime. Another issue is the intent in microbial forensics to identify a bioattack organism in greatest detail. If possible, forensic investigations will strive to identify the precise strain and substrain, rather than just to the species level, which might be sufficient in an epidemiological investigation. Although multiple groups have developed lists of bioterrorism target pathogens, these lists are too narrow. An expansion of microorganisms relevant to food and water threats should be considered. Computerized networks should be established to track infectious disease outbreaks in real time. These systems could alert public health and agricultural officials to the existence of a potential bioattack earlier than simply waiting for a report of a suspicious cluster of similar patients. Once a biocrime is suspected, a wide variety of methods are available to identify the microorganism used in the bioattack and to analyze features that might lead to the source of the event. A multi-pronged approach to such an investigation may be preferable, using many available methods-ranging from genomics to sequencing to physiology to analysis of substances in the sample. Microbial forensics will be most effective if there is sufficient basic scientific information concerning microbial genetics, evolution, physiology, and ecology. Strain subtyping analysis will be difficult to interpret if we do not understand some of the basic evolutionary mechanisms and population diversity of pathogens. Phenotypic features associated with evidentiary pathogens also may provide investigative leads, but full exploitation of

  11. Principal component analysis for the forensic discrimination of black inkjet inks based on the Vis-NIR fibre optics reflection spectra.

    Science.gov (United States)

    Gál, Lukáš; Oravec, Michal; Gemeiner, Pavol; Čeppan, Michal

    2015-12-01

    Nineteen black inkjet inks of six different brands were examined by fibre optics reflection spectroscopy in Visible and Near Infrared Region (Vis-NIR FORS) directly on paper with a view to achieving good resolution between them. These different inks were tested on nineteen different inkjet printers from three brands. Samples were obtained from prints by reflection probe. Processed reflection spectra in the range 500-1000 nm were used as samples in principal component analysis. Variability between spectra of the same ink obtained from different prints, as well as between spectra of square areas and lines was examined. For both spectra obtained from square areas and lines reference, Principal Component Analysis (PCA) models were created. According to these models, the inkjet inks were divided into clusters. PCA method is able to separate inks containing carbon black as main colorant from the other inks using other colorants. Some spectra were recorded from another piece of printer and used as validation samples. Spectra of validation samples were projected onto reference PCA models. According to position of validation samples in score plots it can be concluded that PCA based on Vis-NIR FORS can reliably differentiate inkjet inks which are included in the reference database. The presented method appears to be a suitable tool for forensic examination of questioned documents containing inkjet inks. Inkjet inks spectra were obtained without extraction or cutting sample with possibility to measure out of the laboratory.

  12. Cloud Forensics Issues

    Science.gov (United States)

    2014-07-01

    Cloud Computing , Forensics , IT Security, Standards, Monitoring, Virtualization. I. INTRODUCTION LOUD computing has come to mean many different...an efficient re-allocation of resources. VI. ACCOUNTABILITY, MONITORING AND FORENSICS The goal of computer forensics is to perform a structured...away from the concept of cloud computing [12 - 14]. We believe, however, that a precise statement of the high assurance and forensics requirements

  13. Typing of 49 autosomal SNPs by single base extension and capillary electrophoresis for forensic genetic testing

    DEFF Research Database (Denmark)

    Børsting, Claus; Tomas Mas, Carmen; Morling, Niels

    2012-01-01

    We describe a method for simultaneous amplification of 49 autosomal single nucleotide polymorphisms (SNPs) by multiplex PCR and detection of the SNP alleles by single base extension (SBE) and capillary electrophoresis. All the SNPs may be amplified from only 100 pg of genomic DNA and the length o...... victim identifications, where the DNA from the victims may be highly degraded and the victims are identified via investigation of their relatives. The assay was validated according to the ISO 17025 standard and used for routine case work in our laboratory....

  14. [Characteristic of fatal thrombotic complications based on the materials from the Thanatology Department of Forensic Medicine Bureau of the Rostov region, for 2004-2007].

    Science.gov (United States)

    Berezovskiĭ, D P; Kolkutin, V V; Kovtunov, V V; Kornienko, I V

    2009-01-01

    The authors report statistical data on the spectrum and frequency of fatal thrombotic complications based on the analysis of materials available from the regional bureau of forensic medical examination collected in the period from 2004 to 2007. All lethal cases are categorized in terms of the patients' age, gender, time and clinical characteristics of the injury, time of surgical intervention. Results of the analysis indicate the necessity of examination of fatal cases of thrombotic complications following a standardized protocol.

  15. DNA-based methods of geochemical prospecting

    Science.gov (United States)

    Ashby, Matthew

    2011-12-06

    The present invention relates to methods for performing surveys of the genetic diversity of a population. The invention also relates to methods for performing genetic analyses of a population. The invention further relates to methods for the creation of databases comprising the survey information and the databases created by these methods. The invention also relates to methods for analyzing the information to correlate the presence of nucleic acid markers with desired parameters in a sample. These methods have application in the fields of geochemical exploration, agriculture, bioremediation, environmental analysis, clinical microbiology, forensic science and medicine.

  16. Development and evaluation of a rapid PCR method for the PowerPlex®S5 system for forensic DNA profiling.

    Science.gov (United States)

    Bahlmann, Sarah; Hughes-Stamm, Sheree; Gangitano, David

    2014-07-01

    Forensic DNA profiling is a multi-step process taking approximately 10h to complete. A reduction in the amount of time required for the amplification step would allow for faster human identification and increase laboratory throughput. The goal of this work was to optimize and evaluate a rapid PCR method for the PowerPlex®S5 system for forensic DNA profiling. By pairing fast chemistries with a fast thermal cycler, we were able to reduce the amplification time by 70% (1 h). Sensitivity and heterozygous peak height ratios were comparable between the fast and standard protocols. However, there was a notable decrease (5%) in peak height ratio at the D18S51 locus with the fast cycling method. An increase in average mean stutter for combined loci of 2.6% was observed in profiles amplified using the fast protocol compared to the standard system. Our results suggest that with further optimization and validation the fast protocol can be used to replace the standard amplification conditions.

  17. Forensic Taxonomy of Android Social Apps.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2017-03-01

    An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented.

  18. Taxonomy of Challenges for Digital Forensics.

    Science.gov (United States)

    Karie, Nickson M; Venter, Hein S

    2015-07-01

    Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well-defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.

  19. An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2014-02-01

    In crime scene forensics latent fingerprints are found on various substrates. Nowadays primarily physical or chemical preprocessing techniques are applied for enhancing the visibility of the fingerprint trace. In order to avoid altering the trace it has been shown that contact-less sensors offer a non-destructive acquisition approach. Here, the exploitation of fingerprint or substrate properties and the utilization of signal processing techniques are an essential requirement to enhance the fingerprint visibility. However, especially the optimal sensory is often substrate-dependent. An enhanced generic pattern recognition based contrast enhancement approach for scans of a chromatic white light sensor is introduced in Hildebrandt et al.1 using statistical, structural and Benford's law2 features for blocks of 50 micron. This approach achieves very good results for latent fingerprints on cooperative, non-textured, smooth substrates. However, on textured and structured substrates the error rates are very high and the approach thus unsuitable for forensic use cases. We propose the extension of the feature set with semantic features derived from known Gabor filter based exemplar fingerprint enhancement techniques by suggesting an Epsilon-neighborhood of each block in order to achieve an improved accuracy (called fingerprint ridge orientation semantics). Furthermore, we use rotation invariant Hu moments as an extension of the structural features and two additional preprocessing methods (separate X- and Y Sobel operators). This results in a 408-dimensional feature space. In our experiments we investigate and report the recognition accuracy for eight substrates, each with ten latent fingerprints: white furniture surface, veneered plywood, brushed stainless steel, aluminum foil, "Golden-Oak" veneer, non-metallic matte car body finish, metallic car body finish and blued metal. In comparison to Hildebrandt et al.,1 our evaluation shows a significant reduction of the error rates

  20. Computer forensics with FTK

    CERN Document Server

    Carbone, Fernando

    2014-01-01

    This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT profe

  1. Expanding forensic science through forensic intelligence.

    Science.gov (United States)

    Ribaux, Olivier; Talbot Wright, Benjamin

    2014-12-01

    Research and Development ('R&D') in forensic science currently focuses on innovative technologies improving the efficiency of existing forensic processes, from the detection of marks and traces at the scene, to their presentation in Court. R&D approached from this perspective provides no response to doubts raised by recent criminological studies, which question the effective contribution of forensic science to crime reduction, and to policing in general. Traces (i.e. forensic case data), as remnants of criminal activity are collected and used in various forms of crime monitoring and investigation. The aforementioned doubts therefore need to be addressed by expressing how information is conveyed by traces in these processes. Modelling from this standpoint expands the scope of forensic science and provides new R&D opportunities. Twelve propositions for R&D are stated in order to pave the way.

  2. Procedures for a harmonised digital forensic process in live forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-09-01

    Full Text Available Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid...

  3. DNA鉴定技术在法科学中的应用%Studies and Applications of DNA-based Identity Test in Forensic Sciences

    Institute of Scientific and Technical Information of China (English)

    李生斌; 阎春霞; 赖江华; 汪建; 杨焕明

    2001-01-01

    人类基因组遗传多态现象研究的深入,导致了法科学领域个体识别和亲权鉴定发生根本性变化。本文就新的遗传标记和各种DNA鉴定技术在法科学中的研究进展、应用前景与亟待解决的问题进行了探讨。%With the study advances on DNA polymorphism of human genome,radical changes have been taking place in forensic individual identification and paternity tests.In this paper,we introduced research progress of new genetic markers,their applications and problems should be solved urgently in the field of DNA-based identity test in forensic sciences.

  4. Plethora of Cyber Forensics

    Directory of Open Access Journals (Sweden)

    N.Sridhar

    2011-11-01

    Full Text Available As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.

  5. Flexible Ag-C60 nano-biosensors based on surface plasmon coupled emission for clinical and forensic applications.

    Science.gov (United States)

    Mulpur, Pradyumna; Yadavilli, Sairam; Mulpur, Praharsha; Kondiparthi, Neeharika; Sengupta, Bishwambhar; Rao, Apparao M; Podila, Ramakrishna; Kamisetti, Venkataramaniah

    2015-10-14

    The relatively low sensitivity of fluorescence detection schemes, which are mainly limited by the isotropic nature of fluorophore emission, can be overcome by utilizing surface plasmon coupled emission (SPCE). In this study, we demonstrate directional emission from fluorophores on flexible Ag-C60 SPCE sensor platforms for point-of-care sensing, in healthcare and forensic sensing scenarios, with at least 10 times higher sensitivity than traditional fluorescence sensing schemes. Adopting the highly sensitive Ag-C60 SPCE platform based on glass and novel low-cost flexible substrates, we report the unambiguous detection of acid-fast Mycobacterium tuberculosis (Mtb) bacteria at densities as low as 20 Mtb mm(-2); from non-acid-fast bacteria (e.g., E. coli and S. aureus), and the specific on-site detection of acid-fast sperm cells in human semen samples. In combination with the directional emission and high-sensitivity of SPCE platforms, we also demonstrate the utility of smartphones that can replace expensive and cumbersome detectors to enable rapid hand-held detection of analytes in resource-limited settings; a much needed critical advance to biosensors, for developing countries.

  6. [On the problem of traumatic shock associated with a combined injury (based on the materials of one forensic medical expertise)].

    Science.gov (United States)

    Volkov, V P

    2012-01-01

    The author presents the results of the critical analysis of the materials of forensic medical expertise of a case of the serious harm to health that has led to involunry manslaughter. According to the expert opinion, the death resulted from the traumatic shock associated with the combined head and the chest injury. Such conclusion levels out the difference between the two accused persons and their "contribution" to the extent and severity of the inflicted damage to the victim's body; thereby, it equalizes the degree of their guilt and criminal responsibility. The present study showed that such interpretation of tanatogenesis associated with the combined injury is erroneous. The death of the injured person resulted from cerebral coma that developed following a severe craniocerebral injury as a constituent component of the combined trauma. It is emphasized that the thorough investigation of tanatogenesis based on the reliable elucidation of the immediate cause of death makes it possible to avoid poorly substantiated expert conclusions and their potential dire legal consequences.

  7. 云计算环境下的电子证据取证关键技术研究%Research of Key Technologies of Electronic Evidence Forensics Based on Cloud Computing Environment

    Institute of Scientific and Technical Information of China (English)

    吴绍兵

    2012-01-01

    Cloud computing is a method of calculation which provides users with the computing capacity, storage capacity and service capabilities,according to need and the final purpose is user-friendly and greatly reduces the user's hardware and software procurement costs. Cloud computing forensics is a new battlefield,in order to better combat cybercrime in the battlefield,you must come up with some novel methods of investigation. Static electronic evidence, dynamic web-based electronic evidence, the cloud environment of electronic forensics related concepts,key technologies, etc. Are reviewed and the key technologies of the electronic evidence collection model in cloud computing environments are discussed. That cloud computing mode of thinking is proposed. It points out the cloud forensics technology development trends.%云计算是能为用户提供按需分配的计算能力、存储能力及应用服务能力,方便用户使用,大大降低用户软硬件采购费用的一种计算方式.云计算取证是一个新的战场,为了在这一战场中更好地打击网络犯罪,必须研究出一些新奇的调查方法.从静态的电子证据、动态的网络电子取证到云计算环境下的电子取证的相关概念、关键技术等进行了综述,探讨了云计算环境下的电子取证模型关键技术,提出了云计算思维模式,并指出了云取证技术的发展趋势和展望.

  8. Incorporating Argumentation through Forensic Science

    Science.gov (United States)

    Wheeler, Lindsay B.; Maeng, Jennifer L.; Smetana, Lara K.

    2014-01-01

    This article outlines how to incorporate argumentation into a forensic science unit using a mock trial. Practical details of the mock trial include: (1) a method of scaffolding students' development of their argument for the trial, (2) a clearly outlined set of expectations for students during the planning and implementation of the mock…

  9. Incorporating Argumentation through Forensic Science

    Science.gov (United States)

    Wheeler, Lindsay B.; Maeng, Jennifer L.; Smetana, Lara K.

    2014-01-01

    This article outlines how to incorporate argumentation into a forensic science unit using a mock trial. Practical details of the mock trial include: (1) a method of scaffolding students' development of their argument for the trial, (2) a clearly outlined set of expectations for students during the planning and implementation of the mock…

  10. [The application of the methods for the measurement of tissue pressure during the comprehensive evaluation of the state of cadaveric tissues for the purpose of forensic medical expertise].

    Science.gov (United States)

    Édelev, N S; Vorob'ev, V G; Kraev, I P; Bushkov, V M

    2014-01-01

    The present paper reports the results of the application of measurements of cadaveric tissue pressure (CTP) in forensic medical thanatology for the determination of the initial position of the corpse and the identification of the visually undetectable bleeding sites on the scalp during examination at the place of its discovery. Moreover, the study of the tissue pressure parameters in the affected tissues may be used to determine the intravitality of the injury and dynamics of its prescription. The parameters of intra-organ tissue pressure suggest its dependence not only on the prescription of the death and manifestations of the postmortem processes but also on the character and extent of the pathological process in the tissues of the organ of interest; these findings can be used for the verification of various diagnostic procedures including those for the objective elucidation of the cause of the death. It is concluded that the investigations along these lines extend the possibilities for the use of quantitative parameters of CTP for the substantiation of expert conclusions based on the results of forensic medical examination.

  11. High Performance Proactive Digital Forensics

    Science.gov (United States)

    Alharbi, Soltan; Moa, Belaid; Weber-Jahnke, Jens; Traore, Issa

    2012-10-01

    With the increase in the number of digital crimes and in their sophistication, High Performance Computing (HPC) is becoming a must in Digital Forensics (DF). According to the FBI annual report, the size of data processed during the 2010 fiscal year reached 3,086 TB (compared to 2,334 TB in 2009) and the number of agencies that requested Regional Computer Forensics Laboratory assistance increasing from 689 in 2009 to 722 in 2010. Since most investigation tools are both I/O and CPU bound, the next-generation DF tools are required to be distributed and offer HPC capabilities. The need for HPC is even more evident in investigating crimes on clouds or when proactive DF analysis and on-site investigation, requiring semi-real time processing, are performed. Although overcoming the performance challenge is a major goal in DF, as far as we know, there is almost no research on HPC-DF except for few papers. As such, in this work, we extend our work on the need of a proactive system and present a high performance automated proactive digital forensic system. The most expensive phase of the system, namely proactive analysis and detection, uses a parallel extension of the iterative z algorithm. It also implements new parallel information-based outlier detection algorithms to proactively and forensically handle suspicious activities. To analyse a large number of targets and events and continuously do so (to capture the dynamics of the system), we rely on a multi-resolution approach to explore the digital forensic space. Data set from the Honeynet Forensic Challenge in 2001 is used to evaluate the system from DF and HPC perspectives.

  12. Massively parallel sequencing of forensic STRs

    DEFF Research Database (Denmark)

    Parson, Walther; Ballard, David; Budowle, Bruce

    2016-01-01

    The DNA Commission of the International Society for Forensic Genetics (ISFG) is reviewing factors that need to be considered ahead of the adoption by the forensic community of short tandem repeat (STR) genotyping by massively parallel sequencing (MPS) technologies. MPS produces sequence data...... accessible genome assembly, and in place before the uptake of MPS by the general forensic community starts to generate sequence data on a large scale. While the established nomenclature for CE-based STR analysis will remain unchanged in the future, the nomenclature of sequence-based STR genotypes will need...

  13. Elliptical Fourier analysis: fundamentals, applications, and value for forensic anthropology.

    Science.gov (United States)

    Caple, Jodi; Byrd, John; Stephan, Carl N

    2017-02-17

    The numerical description of skeletal morphology enables forensic anthropologists to conduct objective, reproducible, and structured tests, with the added capability of verifying morphoscopic-based analyses. One technique that permits comprehensive quantification of outline shape is elliptical Fourier analysis. This curve fitting technique allows a form's outline to be approximated via the sum of multiple sine and cosine waves, permitting the profile perimeter of an object to be described in a dense (continuous) manner at a user-defined level of precision. A large amount of shape information (the entire perimeter) can thereby be collected in contrast to other methods relying on sparsely located landmarks where information falling in between the landmarks fails to be acquired. First published in 1982, elliptical Fourier analysis employment in forensic anthropology from 2000 onwards reflects a slow uptake despite large computing power that makes its calculations easy to conduct. Without hurdles arising from calculation speed or quantity, the slow uptake may partly reside with the underlying mathematics that on first glance is extensive and potentially intimidating. In this paper, we aim to bridge this gap by pictorially illustrating how elliptical Fourier harmonics work in a simple step-by-step visual fashion to facilitate universal understanding and as geared towards increased use in forensic anthropology. We additionally provide a short review of the method's utility for osteology, a summary of past uses in forensic anthropology, and software options for calculations that largely save the user the trouble of coding customized routines.

  14. Image processing of false identity documents for forensic intelligence.

    Science.gov (United States)

    Talbot-Wright, Benjamin; Baechler, Simon; Morelato, Marie; Ribaux, Olivier; Roux, Claude

    2016-06-01

    Forensic intelligence has recently gathered increasing attention as a potential expansion of forensic science that may contribute in a wider policing and security context. Whilst the new avenue is certainly promising, relatively few attempts to incorporate models, methods and techniques into practical projects are reported. This work reports a practical application of a generalised and transversal framework for developing forensic intelligence processes referred to here as the Transversal model adapted from previous work. Visual features present in the images of four datasets of false identity documents were systematically profiled and compared using image processing for the detection of a series of modus operandi (M.O.) actions. The nature of these series and their relation to the notion of common source was evaluated with respect to alternative known information and inferences drawn regarding respective crime systems. 439 documents seized by police and border guard authorities across 10 jurisdictions in Switzerland with known and unknown source level links formed the datasets for this study. Training sets were developed based on both known source level data, and visually supported relationships. Performance was evaluated through the use of intra-variability and inter-variability scores drawn from over 48,000 comparisons. The optimised method exhibited significant sensitivity combined with strong specificity and demonstrates its ability to support forensic intelligence efforts.

  15. Implementation of one Keyboard-Event-Based Computer Forensics Process Modle%一种基于键盘事件计算机取证过程模型的实现

    Institute of Scientific and Technical Information of China (English)

    刘文俭

    2014-01-01

    In the paper, simple introduction of Computer Forensics and influences of Computer Anti-forensics are made,And then, A Keyboard-Event-Based forensic process flow chart according to the revised law enforcement process model combining with dynamic and static forensic technology and conventional evidence extraction technology has been drawn out.%该文简述了计算机取证技术及反取证技术对计算机取证结果的影响,结合动态、静态取证技术及常规证据提取技术,利用修改后的法律执行过程模型画出了基于键盘事件提取的取证过程流程图并将其实现。

  16. 基于Bloom filter引擎的分布式网络取证系统%Distributed network forensics system based on Bloom filter engine

    Institute of Scientific and Technical Information of China (English)

    赵骞; 崔益民; 邹涛

    2009-01-01

    针对目前网络取证的特点和技术挑战,提出和设计了一种基于Bloom filter引擎的分布式网络取证系统.该系统以Bloom filter引擎为核心,能够实时的对网络原始数据进行过滤,映射压缩和存储,捕获完整的证据,节省存储空间,有效支持网络取证的事后分析查询.%Aiming at technical challenges of network forensics at present,a distributed network forensics system based on the Bloom filter engine was proposed and designed.The system with the Bloom filter engine as the core can filtrate,memory-map raw network data for compression,capture complete evidence,save storage space,and help with post-event investigation of network forensics.

  17. Research on Network Forensic Based on Weiyun%对微云的网络取证研究

    Institute of Scientific and Technical Information of China (English)

    杨新宇; 王健

    2015-01-01

    云存储应用是目前使用最广泛的云计算服务之一,然而云存储为用户提供随时存取数据的便捷服务的同时,通过云存储传播敏感文件,导致泄密的风险也大大增加。而云计算环境给传统的数字取证带来诸多挑战。为此面向云存储的取证已经成为取证技术研究热点。文章在传统数字取证模型的基础上,提出一种基于网络取证的云存储取证模型,通过协议分析对微云进行取证,证实了云存储网络取证的可行性。最后为云存储取证的下一步工作提出方法和思路。%The storage as a service (StaaS) is one of the most widely used cloud computing services. But convenient service is provided means dissemination of sensitive documents is possible at the same time. However, traditional forensic frameworks reviewed to identify the required changes to current forensic practices. We propose a network forensic framework which emphasizes the differences in StaaS data for forensic purposes. Using a cloud StaaS application – weiyun – as a case study. Verified the feasibility of undertaking cloud storage forensics with protocol analyzing. Finally we provide some general guidelines for future forensic analysis and recommendations for future work.

  18. Forensic Analysis of Parachute Deaths.

    Science.gov (United States)

    Burke, Michael Philip; Chitty, Johannes

    2017-03-01

    Deaths associated with parachuting are very uncommon. However, these deaths do tend to be "high profile" in the traditional and social media. When forensic pathologists examine the deceased after a fatal parachuting incident, the anatomical cause of death is usually not in question. For most forensic pathologists, it is usually the case that we will have very limited knowledge of parachuting equipment or the mechanics of a typical successful parachute jump. As such, the investigation of the death should involve a multidisciplinary approach with an appropriate expert providing the formal forensic examination of the parachuting equipment. We have endeavored to describe, in simple terms, the usual components of a typical parachute rig, a précis of the sequence of events in a routine skydive and BASE jump, and the various types of malfunctions that may occur. Last, we present a case report of a BASE jump fatality to illustrate how an expert examination of the BASE jumper's gear aided the medicolegal investigation of the death with some important aspects in the forensic examination of the jumper's equipment.

  19. Nanoparticles in forensic science

    Science.gov (United States)

    Cantu, Antonio A.

    2008-10-01

    Nanoparticles appear in several areas of forensic science including security documents, paints, inks, and reagents that develop latent prints. One reagent (known as the silver physical developer) that visualizes the water insoluble components of latent print residue is based on the formation of highly charged silver nanoparticles. These attach to and grow on the residue and generate a silver image. Another such reagent involves highly charged gold nanoparticles. These attach to the residue forming a weak gold image which can be amplified with a silver physical developer. Nanoparaticles are also used in items such as paints, printing inks, and writing inks. Paints and most printing inks consist of nano-sized pigments in a vehicle. However, certain modern ink jet printing inks now contain nano-sized pigments to improve their light fastness and most gel inks are also based on nano scale pigments. These nanoparticlecontaining materials often appear as evidence and are thus subject to forensic characterization. Both luminescent (quantum dots), up-converting nano scale phosphors, and non luminescent nanoparticles are used as security tags to label product, add security to documents, and as anti counterfeiting measures. These assist in determining if an item is fraudulently made.

  20. Forensic profiling of sassafras oils based on comprehensive two-dimensional gas chromatography.

    Science.gov (United States)

    Schäffer, M; Gröger, T; Pütz, M; Zimmermann, R

    2013-06-10

    Safrole, the main compound in the essential oil of several plants of the Laurel family (Lauraceae), and its secondary product piperonylmethylketone are the predominantly used precursors for the illicit synthesis of 3,4-methylenedioxymethamphetamine (MDMA) which is, in turn, the most common active ingredient in Ecstasy tablets. Analytical methods with adequate capacity to identify links and origin of precursors, such as safrole, provide valuable information for drug-related police intelligence. Authentic sassafras oil samples from police seizures were subjected to comparative analysis based on their chemical profiles obtained by comprehensive two-dimensional gas chromatography time-of-flight mass spectrometry (GC × GC-TOFMS). The enhanced separation power and increased sensitivity of GC × GC allowed for the detection of minor compounds present in the essential oils which were of particular interest in case of very pure samples whose impurity profiles were not very pronounced. Discrimination of such samples was still possible even in the absence of characteristic main compounds.

  1. Forensic Assertive Community Treatment: A Review of the Literature.

    Science.gov (United States)

    Marquant, Thomas; Sabbe, Bernard; Van Nuffel, Meike; Goethals, Kris

    2016-11-01

    An extensive body of literature provides evidence supporting the effectiveness of assertive community treatment (ACT) with regard to non-forensic outcome measures, such as number of hospital admissions and length of stay. However, research findings on the effectiveness of ACT for forensic outcome measures, such as rearrests or detentions, is much less clear. The present review, therefore, focuses on the application of ACT in forensic populations, combining key elements of ACT with elements of forensic rehabilitation models. Specifically, a review of the literature was conducted using a systematic methodology in an attempt to combine evidence-based elements of 40 years of research on regular ACT with elements of forensic rehabilitation models. Results reveal limited yet promising evidence in support of the effectiveness of forensic ACT for forensic outcome measures. Implications for future research and clinical practice are discussed.

  2. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    Directory of Open Access Journals (Sweden)

    Grover Kearns

    2010-06-01

    Full Text Available Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants. Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. This paper presents a curriculum design methodology for teaching graduate accounting students computer forensics. The methodology is tested using perceptions of the students about the success of the methodology and their acquisition of forensics knowledge and skills. An important component of the pedagogical approach is the use of an annotated list of over 50 forensic web-based tools.

  3. Autopsy practice in forensic pathology - evidence-based or experience-based? a review of autopsies performed on victims of traumatic asphyxia in a mass disaster.

    Science.gov (United States)

    Colville-Ebeling, Bonnie; Freeman, Michael; Banner, Jytte; Lynnerup, Niels

    2014-02-01

    Current autopsy practice in forensic pathology is to a large extent based on experience and individual customary practices as opposed to evidence and consensus based practices. As a result there is the potential for substantial variation in how knowledge is applied in each case. In the present case series, we describe the variation observed in autopsy reports by five different pathologists of eight victims who died simultaneously from traumatic asphyxia due to compression during a human stampede. We observed that there was no mention of the availability of medical charts in five of the reports, of potentially confounding resuscitation efforts in three reports, of cardinal signs in seven reports and of associated injuries to a various degree in all reports. Further, there was mention of supplemental histological examination in two reports and of pre-autopsy radiograph in six reports. We inferred that reliance on experience and individual customary practices led to disparities between the autopsy reports as well as omissions of important information such as cardinal signs, and conclude that such reliance increases the potential for error in autopsy practice. We suggest that pre-autopsy data-gathering and the use of check lists specific to certain injury causes are likely to result in less deviation from evidence-based practices in forensic pathology. Pre-autopsy data-gathering and check lists will help ensure a higher degree of standardization in autopsy reports thus enhancing the quality and accuracy of the report as a legal document as well as rendering it more useful for data-gathering efforts.

  4. Neuropsychological Impairment and Its Association with Violence Risk in Japanese Forensic Psychiatric Patients: A Case-Control Study

    Science.gov (United States)

    Nishinaka, Hirofumi; Nakane, Jun; Nagata, Takako; Imai, Atsushi; Kuroki, Noriomi; Sakikawa, Noriko; Omori, Mayu; Kuroda, Osamu; Hirabayashi, Naotsugu; Igarashi, Yoshito; Hashimoto, Kenji

    2016-01-01

    Background In Japan, the legislation directing treatment of offenders with psychiatric disorders was enacted in 2005. Neuropsychological impairment is highly related to functional outcomes in patients with psychiatric disorders, and several studies have suggested an association between neuropsychological impairment and violent behaviors. However, there have been no studies of neuropsychological impairment in forensic patients covered by the Japanese legislation. This study is designed to examine the neuropsychological characteristics of forensic patients in comparison to healthy controls and to assess the relationship between neuropsychological impairment and violence risk. Methods Seventy-one forensic patients with psychiatric disorders and 54 healthy controls (matched by age, gender, and education) were enrolled. The CogState Battery (CSB) consisting of eight cognitive domains, the Iowa Gambling Task (IGT) to test emotion-based decision making, and psychological measures of violence risk including psychopathy were used. Results Forensic patients exhibited poorer performances on all CSB subtests and the IGT than controls. For each group, partial correlational analyses indicated that poor IGT performance was related to psychopathy, especially antisocial behavior. In forensic patients, the CSB composite score was associated with risk factors for future violent behavior, including stress and noncompliance with remediation attempts. Conclusion Forensic patients with psychiatric disorders exhibit a wide range of neuropsychological impairments, and these findings suggest that neuropsychological impairment may increase the risk of violent behavior. Therefore, the treatment of neuropsychological impairment in forensic patients with psychiatric disorders is necessary to improve functional outcomes as well as to prevent violence. PMID:26824701

  5. Discrepancies between diagnoses of methanol and ethylene glycol intoxication based on determinations performed in the regional clinical toxicology centre and in the department of forensic medicine

    Directory of Open Access Journals (Sweden)

    Tomasz Cywka

    2014-08-01

    Full Text Available The situations in which autopsy blood toxicology results do not confirm methanol and/or ethylene glycol intoxications diagnosed during patients` hospitalizations are frequently observed in the Department of Forensic Medicine in Lublin. Material and methods: In order to verify inconsistent findings, serum samples of 18 individuals, routinely stored in the regional clinical toxicology centre after testing, were re-examined using the specific method of gas chromatography (GC. Results: None of the fatal methanol intoxications was confirmed; toxic concentration of glycol was detected only in one case whereas the remaining determinations were negative or revealed “congeneric” concentrations. In cases of negative results of chromatographic re-analyses, the difference between hospital analysis and GC results were on average 29.6 mg% (max. 127.7 mg% for glycol and 31.8 mg% (max. 80.0 mg% for methanol. Severe metabolic acidosis was found in all hospitalized patients. In the hospital setting, “intoxications” were diagnosed even when low concentrations of methanol or glycol (below the cut-off values were detected with spectrophotometry, which is the method still used in the hospital laboratory. The diagnosis of methanol intoxication in a car accident victim was particularly bizarre; as were the methanol intoxication diagnoses established in cases of acute diabetes-associated complications (4, pancreatitis (1, pneumonia (2 and peritonitis (1, gastrointestinal haemorrhage (1, and decompensated hepatic cirrhosis (1. The therapeutic management based on those diagnoses was incorrectly targeted at the non-existing intoxication that was considered the cause of patient’s deteriorating condition. Conclusions : Our findings indicate inadequate knowledge of physicians to interpret and critically verify toxicological results. Moreover, low cost and speed of spectrophotometric analysis should not veil its significant limitations: mainly low specificity and

  6. Forensic Stable Isotope Biogeochemistry

    Science.gov (United States)

    Cerling, Thure E.; Barnette, Janet E.; Bowen, Gabriel J.; Chesson, Lesley A.; Ehleringer, James R.; Remien, Christopher H.; Shea, Patrick; Tipple, Brett J.; West, Jason B.

    2016-06-01

    Stable isotopes are being used for forensic science studies, with applications to both natural and manufactured products. In this review we discuss how scientific evidence can be used in the legal context and where the scientific progress of hypothesis revisions can be in tension with the legal expectations of widely used methods for measurements. Although this review is written in the context of US law, many of the considerations of scientific reproducibility and acceptance of relevant scientific data span other legal systems that might apply different legal principles and therefore reach different conclusions. Stable isotopes are used in legal situations for comparing samples for authenticity or evidentiary considerations, in understanding trade patterns of illegal materials, and in understanding the origins of unknown decedents. Isotope evidence is particularly useful when considered in the broad framework of physiochemical processes and in recognizing regional to global patterns found in many materials, including foods and food products, drugs, and humans. Stable isotopes considered in the larger spatial context add an important dimension to forensic science.

  7. Evidence of forensic scientific opinion and the rules for admissibility

    National Research Council Canada - National Science Library

    Heydon, JD

    2015-01-01

    Possible methods for the exclusion of unreliable forensic scientific evidence - irrelevance - probative value exceeding prejudicial effect - categories of automatic inadmissibility - whether existing...

  8. Forensic neuropsychological assessment: a review of its scope

    Directory of Open Access Journals (Sweden)

    Antonio De Pádua Serafim

    2015-04-01

    Full Text Available Background Issues related to the field of mental health and justice require a multifactorial understanding of the possible causes of such issues. Objective To conduct an integrative literature review of controlled studies describing forensic neuropsychological assessment. Methods The articles were compiled and analyzed in two phases: 1 first, we retrieved all papers in PubMed by the keywords “Forensic Neuropsychology” and generated a growth curve for the subject and a cluster-based thematic distribution of publications. 2 We then conducted a curated analysis of all relevant papers indexed in Medline, PubMed and ISI, between 2000 and 2012. Results The evolution of the field during the last 15 years reveals an unstable growth pattern and three main thematic clusters. In terms of our curated analysis, a total of 390 articles were pre-selected, resulting in the selection of 44 fully-relevant studies, which comprise four main categories: cognitive damage in forensic psychiatric patients; imitation of cognitive damage; civil capacity, penal liability and violence risk; and validation of neuropsychological assessment tools. Discussion Two aspects appeared as the most relevant in this study: growth in the use of neuropsychological assessment as a diagnostic tool in the forensic context; and the necessity to enhance conformity in assessments.

  9. Base Rates, Multiple Indicators, and Comprehensive Forensic Evaluations: Why Sexualized Behavior Still Counts in Assessments of Child Sexual Abuse Allegations

    Science.gov (United States)

    Everson, Mark D.; Faller, Kathleen Coulborn

    2012-01-01

    Developmentally inappropriate sexual behavior has long been viewed as a possible indicator of child sexual abuse. In recent years, however, the utility of sexualized behavior in forensic assessments of alleged child sexual abuse has been seriously challenged. This article addresses a number of the concerns that have been raised about the…

  10. Base Rates, Multiple Indicators, and Comprehensive Forensic Evaluations: Why Sexualized Behavior Still Counts in Assessments of Child Sexual Abuse Allegations

    Science.gov (United States)

    Everson, Mark D.; Faller, Kathleen Coulborn

    2012-01-01

    Developmentally inappropriate sexual behavior has long been viewed as a possible indicator of child sexual abuse. In recent years, however, the utility of sexualized behavior in forensic assessments of alleged child sexual abuse has been seriously challenged. This article addresses a number of the concerns that have been raised about the…

  11. Intra- and interobserver error of the Greulich-Pyle method as used on a Danish forensic sample

    DEFF Research Database (Denmark)

    Lynnerup, N; Belard, E; Buch-Olsen, K

    2008-01-01

    and intraoral dental radiographs. Different methods are used depending on the maturity of the individual examined; and (3) a carpal X-ray examination, using the Greulich and Pyle Atlas (GPA) method. We present the results of intra- and interobserver tests of carpal X-rays in blind trials, and a comparison...... difference was 0.053 years, with a standard deviation of +/-0.567 years. Our results show that the direct and naïve use of the GPA is simple and reproducible, even when applied by non-experienced users. This is probably also why the method is still widely applied, even though other authors have stated...... that atlas-based techniques are obsolete and ought to be replaced by other methods. Specifically, the GPA test sample consisted of American "white" children "above average in economic and educational status", leading to the question as to how comparable subjects being scored by the GPA method today...

  12. PCR in forensic genetics

    DEFF Research Database (Denmark)

    Morling, Niels

    2009-01-01

    Since the introduction in the mid-1980s of analyses of minisatellites for DNA analyses, a revolution has taken place in forensic genetics. The subsequent invention of the PCR made it possible to develop forensic genetics tools that allow both very informative routine investigations and still more...... and more advanced, special investigations in cases concerning crime, paternity, relationship, disaster victim identification etc. The present review gives an update on the use of DNA investigations in forensic genetics....

  13. Forensic odontology: an overview.

    Science.gov (United States)

    Spencer, Duane E

    2014-06-01

    This article is an overview of the field of forensic odontology, highlighting historical cases, with an emphasis on California cases, and briefly discussing some of the current techniques and issues in the field. As with all fields of dentistry, forensic odontology is adapting to new methodologies, changes in techniques, research findings and legal issues. Today's dentist who works in the forensic arena must face and understand these changes and advancements.

  14. [Role of forensic medicine and forensic psychiatry in solving the problem of organized crime].

    Science.gov (United States)

    Kokavec, M; Dobrotka, G

    2001-01-01

    Term--organized crime is not satisfactorily defined todate neither in forensic sciences, nor in lexical formulations. It is necessary to come to grips with the criminalistic and social pathological meaning of three terms--individual crime, grouped and organized crime as well as participation of forensic sciences including forensic medicine on solving problems of organized crime. Forensic medicine and forensic psychology can help to solve this acute problem of present development of social life. It can help in criminalistic expertize and insider activity in profiliation of perpetrators and victims. Mainly it will be about searching and improving of methodical approaches in solving of incriminated cases and its analysis for investigative organs and courts. Important asset in this problem must be also preventive portion in preclusion of criminality.

  15. VoIP Forensic Analyzer

    Directory of Open Access Journals (Sweden)

    M Mohemmed Sha

    2016-01-01

    Full Text Available People have been utilizing Voice over Internet Protocol (VoIP in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of next- generation communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges for the law enforcement system in any Country. This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network. This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream, which is employed to convey the data. Proposed network forensic investigation framework also accentuates on developing an efficient packet restructuring algorithm for tracing the depraved users involved in a conversation. Network forensics is the basis of proposed work, and performs packet level surveillance of VoIP followed by reconstruction of original malicious content or network session between users for their prosecution in the court.

  16. Error and its meaning in forensic science.

    Science.gov (United States)

    Christensen, Angi M; Crowder, Christian M; Ousley, Stephen D; Houck, Max M

    2014-01-01

    The discussion of "error" has gained momentum in forensic science in the wake of the Daubert guidelines and has intensified with the National Academy of Sciences' Report. Error has many different meanings, and too often, forensic practitioners themselves as well as the courts misunderstand scientific error and statistical error rates, often confusing them with practitioner error (or mistakes). Here, we present an overview of these concepts as they pertain to forensic science applications, discussing the difference between practitioner error (including mistakes), instrument error, statistical error, and method error. We urge forensic practitioners to ensure that potential sources of error and method limitations are understood and clearly communicated and advocate that the legal community be informed regarding the differences between interobserver errors, uncertainty, variation, and mistakes.

  17. Biosensors in forensic sciences

    Directory of Open Access Journals (Sweden)

    Frederickx, C.

    2011-01-01

    Full Text Available A biosensor is a device that uses biological materials to detect and monitor the presence of specific chemicals in an area. Traditional methods of volatile detection used by law enforcement agencies and rescue teams typically consist of reliance on canine olfaction. This concept of using dogs to detect specific substances is quite old. However, dogs have some limitations such as cost of training and time of conditioning. Thus, the possibility of using other organisms as biosensors including rats, dolphins, honeybees, and parasitic wasps for detecting explosives, narcotics and cadavers has been developed. Insects have several advantages unshared by mammals. Insects are sensitive, cheap to produce and can be conditioned with impressive speed for a specific chemical-detection task. Moreover, insects might be a preferred sensing method in scenarios that are deemed too dangerous to use mammals. The purpose of this review is to provide an overview of the biosensors used in forensic sciences.

  18. The Hot Issues and Future Direction of Forensic Document Examination in China

    Directory of Open Access Journals (Sweden)

    Bing Li

    2016-01-01

    Full Text Available The domain of forensic document examination consists of a variety of professional tasks related to the history and preliminary of questioned documents. The wide area of tasks implemented by forensic document examiners includes the skill to identify the authorship of handwriting and signature; discriminate among genuine, imitated, or disguised handwriting; to examine and analyze components of inks, papers, and other materials connected with documents; and other highly skilled analyses based on specialized technique. The field of handwriting examination is tightly related to empirical knowledge and practical experience. Handwriting is usually thought to be behavioral activities that are identifiable due to the appearance of features and characteristics within the writing. When we assess these features we universally analyze them in two aspects: Both quality and quantity of writing. As mentioned above, the evaluation of quality and quantity is performed by forensic document examiners. The problem is how to conduct this kind of evaluation related to empirical knowledge and experience. There is not consistent answer yet, although many researchers devote themselves to explore in this hot issue, such as mathematical methods applied in handwriting analysis. In this article, several mathematical methods applied to forensic document field are deciphered in domestic perspective of China. In the digital age, we all inevitably deal with problems with the help of computer or computer technology. We also pay close attention to the computer technique assistant in the field of forensic document examination. Standards or criteria of forensic document examination are still hot issues in China. Although we established a few standards or criterion based on requires of practice, it is also a lack of standards or criterion associated to trainees and continuing education in view of practitioners. At the end of this article, the author intends to discuss a piece of a

  19. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...

  20. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab Mission Establish and maintain a Digital...

  1. FORENSIC SCIENCE:: 20 YEARS OF FORENSIC DENTISTRY AT THE UNIVERSITY OF ZAGREB, 1994 - 2014.

    Science.gov (United States)

    Brkić, Hrvoje

    2014-06-01

    Data from available literature point to an early beginning of Forensic Dentistry in Croatia relating to a post-mortem examination of a female patient after a dental procedure in the 1930s. Later on, there were several mass casualties due to collisions and airplane crashes and a railway accident at the Zagreb Main Railway Station wherein the identity of the victims was established based on dental features. Foreign experts in forensics helped identify those victims, particularly forensic dentists because this specialty was almost unknown in our region at the time. During the twenty-year period of the development of Forensic Dentistry at the University of Zagreb, the School of Dental Medicine, the city of Zagreb and Croatia have become internationally recognised on the forensic map of the world.

  2. Forensic pharmacovigilance and substandard or counterfeit drugs.

    Science.gov (United States)

    Labadie, Jerry

    2012-01-01

    Identification of harm in the form of adverse drug reactions that are caused by counterfeit or other substandard medicinal products by application of standard pharmacovigillance methods of registration, analysis and investigation could be forensic pharmacovigillance. As recent example of this type of forensic pharmacovigilance is the discovery and investigation into the adverse drug reactions caused by contaminated heparin in the USA in 2008 is discussed.

  3. Towards early software reliability prediction for computer forensic tools (case study).

    Science.gov (United States)

    Abu Talib, Manar

    2016-01-01

    Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into assessing this type of tool. A Markov model is a robust means for analyzing and anticipating the functioning of an advanced component based system. It is used, for instance, to analyze the reliability of the state machines of real time reactive systems. This research extends the architecture-based software reliability prediction model for computer forensic tools, which is based on Markov chains and COSMIC-FFP. Basically, every part of the computer forensic tool is linked to a discrete time Markov chain. If this can be done, then a probabilistic analysis by Markov chains can be performed to analyze the reliability of the components and of the whole tool. The purposes of the proposed reliability assessment method are to evaluate the tool's reliability in the early phases of its development, to improve the reliability assessment process for large computer forensic tools over time, and to compare alternative tool designs. The reliability analysis can assist designers in choosing the most reliable topology for the components, which can maximize the reliability of the tool and meet the expected reliability level specified by the end-user. The approach of assessing component-based tool reliability in the COSMIC-FFP context is illustrated with the Forensic Toolkit Imager case study.

  4. Multivariate methods for the analysis of complex and big data in forensic sciences. Application to age estimation in living persons.

    Science.gov (United States)

    Lefèvre, Thomas; Chariot, Patrick; Chauvin, Pierre

    2016-09-01

    Researchers handle increasingly higher dimensional datasets, with many variables to explore. Such datasets pose several problems, since they are difficult to handle and present unexpected features. As dimensionality increases, classical statistical analysis becomes inoperative. Variables can present redundancy, and the reduction of dataset dimensionality to its lowest possible value is often needed. Principal components analysis (PCA) has proven useful to reduce dimensionality but present several shortcomings. As others, forensic sciences will face the issues specific related to an evergrowing quantity of data to be integrated. Age estimation in living persons, an unsolved problem so far, could benefit from the integration of various sources of data, e.g., clinical, dental and radiological data. We present here novel multivariate techniques (nonlinear dimensionality reduction techniques, NLDR), applied to a theoretical example. Results were compared to those of PCA. NLDR techniques were then applied to clinical, dental and radiological data (13 variables) used for age estimation. The correlation dimension of these data was estimated. NLDR techniques outperformed PCA results. They showed that two living persons sharing similar characteristics may present rather different estimated ages. Moreover, data presented a very high informational redundancy, i.e., a correlation dimension of 2. NLDR techniques should be used with or preferred to PCA techniques to analyze complex and big data. Data routinely used for age estimation may not be considered suitable for this purpose. How integrating other data or approaches could improve age estimation in living persons is still uncertain.

  5. 适用于云取证的证据数据完整性评估方法%Evaluation method of evidence data integrity adaptive for cloud forensics

    Institute of Scientific and Technical Information of China (English)

    胡波; 韩臻; 黄伟庆; 孙德刚

    2016-01-01

    As cloud computing makes many challenges for digital forensics ,the problem of evidence data integrity was focused on ,the essentiality to evaluate the evidence data integrity in cloud forensics was pointed out .By researching the information system in the aspects of physical environment ,net‐work and transmission ,computer and system ,application ,management and time ,a framework was proposed to evaluate the evidence data integrity ,and data fusion method was used for description of the evidence data integrity in quantization pattern . To confirm the validity of this framework and method ,the evaluations had been done towards traditional computer forensic and one of could forensic methods respectively .The result shows that the evaluation framework and method are adaptive for cloud forensics ,that the uncertainty of evidence for cloud forensics is 5 times larger than tradition fo‐rensics by using traditional forensic tools .%针对证据数据完整性的问题,指出证据数据完整性评估的意义和重要性。通过考察信息系统在物理环境、网络传输、主机与系统、应用程序、管理和时间这六个方面对于证据数据完整性的影响和作用,提出了一种评估证据数据完整性的框架。运用数据融合方法对评价结果进行量化,通过分别对传统终端取证方法和面向云的取证方法的实例进行评估与量化,证实了该框架对证据数据完整性评估具有切实有效的指导作用及可操作性,结果表明使用传统终端取证工具所获取证据数据的不确定性在云环境下是传统终端取证的5倍。

  6. Forensic odontological examinations of alleged torture victims at the University of Copenhagen 1997-2011

    DEFF Research Database (Denmark)

    Arge, Sára Oladóttir; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    BACKGROUND: Clinical forensic examinations of alleged torture victims have been performed by forensic pathologists at the University of Copenhagen since 1995. In 13.2%/33 of these cases the examinations were supplemented by a forensic odontological clinical examination. In this study the forensic...... odontological cases from the years 1997-2011 are presented and discussed. METHODS: This study includes 33 reports from alleged torture victims (4 females, 29 males) who have been examined by a forensic odontologist at the Copenhagen School of Dentistry in the years 1997-2011.The material available consisted...... of copies of medical forensic reports and the forensic odontological reports including x-rays. BACKGROUND data, anamnestic data and results of the forensic odontological clinical examinations were registered as well as the conclusion of the clinical examinations. FINDINGS: The forensic odontological...

  7. Forensic odontological examinations of alleged torture victims at the University of Copenhagen 1997-2011

    DEFF Research Database (Denmark)

    Arge, Sára Oladóttir; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    BACKGROUND: Clinical forensic examinations of alleged torture victims have been performed by forensic pathologists at the University of Copenhagen since 1995. In 13.2%/33 of these cases the examinations were supplemented by a forensic odontological clinical examination. In this study the forensic...... odontological cases from the years 1997-2011 are presented and discussed. METHODS: This study includes 33 reports from alleged torture victims (4 females, 29 males) who have been examined by a forensic odontologist at the Copenhagen School of Dentistry in the years 1997-2011.The material available consisted...... of copies of medical forensic reports and the forensic odontological reports including x-rays. BACKGROUND data, anamnestic data and results of the forensic odontological clinical examinations were registered as well as the conclusion of the clinical examinations. FINDINGS: The forensic odontological...

  8. Pioneer identification of fake tiger claws using morphometric and DNA-based analysis in wildlife forensics in India.

    Science.gov (United States)

    Vipin; Sharma, Vinita; Sharma, Chandra Prakash; Kumar, Ved Prakash; Goyal, Surendra Prakash

    2016-09-01

    The illegal trade in wildlife is a serious threat to the existence of wild animals throughout the world. The short supply and high demand for wildlife articles have caused an influx of many different forms of fake wildlife articles into this trade. The task of identifying the materials used in making such articles poses challenges in wildlife forensics as different approaches are required for species identification. Claws constitute 3.8% of the illegal animal parts (n=2899) received at the Wildlife Institute of India (WII) for species identification. We describe the identification of seized suspected tiger claws (n=18) using a combined approach of morphometric and DNA-based analysis. The differential keratin density, determined using X-ray radiographs, indicated that none of the 18 claws were of any large cat but were fake. We determined three claw measurements, viz. ac (from the external coronary dermo-epidermal interface to the epidermis of the skin fold connecting the palmar flanges of the coronary horn), bc (from the claw tip to the epidermis of the skin fold connecting the palmar flanges of the coronary horn) and the ratio bc/ac, for all the seized (n=18), tiger (n=23) and leopard (n=49) claws. Univariate and multivariate statistical analyses were performed using SPSS. A scatter plot generated using canonical discriminant function analysis revealed that of the 18 seized claws, 14 claws formed a cluster separate from the clusters of the tiger and leopard claws, whereas the remaining four claws were within the leopard cluster. Because a discrepancy was observed between the X-ray images and the measurements of these four claws, one of the claw that clustered with the leopard claws was chosen randomly and DNA analysis carried out using the cyt b (137bp) and 16S rRNA (410bp) genes. A BLAST search and comparison with the reference database at WII indicated that the keratin material of the claw was derived from Bos taurus (cattle). This is a pioneering discovery, and

  9. Forensic discrimination of blue ballpoint pen inks based on thin layer chromatography and image analysis.

    Science.gov (United States)

    Djozan, Djavanshir; Baheri, Tahmineh; Karimian, Ghader; Shahidi, Masomeh

    2008-08-06

    This article aims to provide a new and fast method for differentiation of inks on a questioned document. The data acquisition was carried out by designing specific image analysis software for evaluating thin layer chromatograms (TLC-IA). The ink spot was extracted from the document using methanol and separated by TLC using plastic sheet silica gel 60 without fluorescent indicator, and a mixture of ethyl acetate, ethanol, and water (70:35:30, v/v/v) as mobile phase. To discriminate between different pen inks, new software was designed on the basis of intensity profile of red, green, and blue (RGB) characteristic. In practice, after development of chromatogram, the chromatograms were scanned by ordinary office scanner, intensity profiles of RGB characteristics on the development straight of each sample were produced and compared with the mentioned software. RGB profiles of ballpoint inks from various manufacturers showed that the patterns in most cases were distinctly different from each other. This new method allowed discriminating among different pen inks with a high reliability and the discriminating power of 92.8%. Blue ballpoint pen inks of 41 different samples available on the local market were successfully analyzed and discriminated.

  10. Forensic age assessment of asylum seekers in Finland.

    Science.gov (United States)

    Metsäniitty, Mari; Varkkola, Olli; Waltimo-Sirén, Janna; Ranta, Helena

    2017-01-01

    In Finland, forensic age assessment is strictly regulated by legislation. According to the Aliens Act (301/2004) and the amendment of the Act (549/2010), the police authorities, the frontier guard authorities, and the immigration authorities have the right to refer asylum seekers to the University of Helsinki, Department of Forensic Medicine, for age assessment. These assessments are especially performed to solve if the person is of major age, the cutoff being 18 completed years. The forensic age assessment is largely based on dental development, since the special permit of the Radiation and Nuclear Safety Authority (STUK) to the Department of Forensic Medicine of the University of Helsinki, allowing the use of ionizing radiation for non-medical purposes, includes dental and hand X-rays. Forensic age assessment is always performed by two forensic odontologists. In 2015, the total number of forensic age assessment examinations was 149, and the countries of origin of the asylum seekers were most commonly Iraq, Afghanistan, and Somalia. The current legislation on forensic age assessment has been well received and approved. Radiological and other examinations can be performed in different parts of Finland, but the forensic odontologist at the University of Helsinki is always involved in the process and ensures joint quality standards for the forensic age assessment.

  11. Role of forensic pathologists in mass disasters.

    Science.gov (United States)

    Schuliar, Yves; Knudsen, Peter Juel Thiis

    2012-06-01

    The forensic pathologist has always had a central role in the identification of the dead in every day practice, in accidents, and in disasters involving hundreds or thousands of victims. This role has changed in recent years, as advances in forensic odontology, genetics and anthropology have improved the chances of identifying victims beyond recognition. According to the Interpol DVI Guide, fingerprints, dental examination and DNA are the primary identifiers, and this has given new emphasis to the role of the forensic pathologist as the leader of a multidisciplinary team of experts in a disaster situation, based on his or her qualifications and the experience gained from doing the same work in the everyday situation of an institute of forensic medicine.

  12. Forensic Science Technician

    Science.gov (United States)

    Tech Directions, 2010

    2010-01-01

    Forensic science technicians, also called crime laboratory technicians or police science technicians, help solve crimes. They examine and identify physical evidence to reconstruct a crime scene. This article discusses everything students need to know about careers for forensic science technicians--wages, responsibilities, skills needed, career…

  13. Forensic Science Technician

    Science.gov (United States)

    Tech Directions, 2010

    2010-01-01

    Forensic science technicians, also called crime laboratory technicians or police science technicians, help solve crimes. They examine and identify physical evidence to reconstruct a crime scene. This article discusses everything students need to know about careers for forensic science technicians--wages, responsibilities, skills needed, career…

  14. The application of CamScan 2 in forensic dentistry.

    Science.gov (United States)

    Dostalova, Tatjana; Eliasova, Hana; Seydlova, Michaela; Broucek, Jaroslav; Vavrickova, Lenka

    2012-10-01

    Forensic dentistry plays a major role in body identification. The dental examination is very accurate and also, nowadays, in the time of a comprehensive fingerprint and DNA assessment, objectively supported. The identification, which is based on the dental documentation, leads up to 43-89% of a successful process. The purpose of the study is to describe the techniques employed by forensic odontology to identify human remains and also to provide details of some of the novel developments within this area. Comparative methods of dental identification of the unknown subject with pre-mortem clinical records, X-ray images, implant presence, superimposition and DNA analysis confirm the identity of the individual. It was shown that dental identification of a person is based on unique individual characteristics of the dentition and dental restorations, relative resistance of the mineralised dental tissues and dental restorations to changes resulting from decomposition and harsh environmental extremes such as conditions of temperature and violent physical forces.

  15. Forensic psychiatry in Pakistan.

    Science.gov (United States)

    Hassan, Tariq; Nizami, Asad Tamizuddin; Hirji, Sarah

    2015-01-01

    This article reviews existing forensic psychiatric services in Pakistan highlighting the role played by the judicial and the medical fraternity in managing the legal and forensic issues of the population of patients with mental illnesses. Until 2001, all legal and forensic issues were dealt with the mental health legislation of 1912, the Lunacy Act of 1912. This was inherited from the British rulers in the Sub-Continent at the time. The Mental Health Ordinance of 2001 could not sustain following the 18th constitutional amendment in 2010, whereby psychiatric healthcare was devolved to the provinces from the previous federal authority. The article also highlights the difficulties and the barriers in implementation of the forensic psychiatric services in Pakistan at various levels within the healthcare system. This article also delves into the current framework of training in forensic psychiatry for postgraduates as well as the assessments and management schedules for the mentally ill offenders at tertiary care institutions in Pakistan.

  16. A Model for a Doctor of Psychology Program in Forensic Psychology: Curriculum and Rationale

    Science.gov (United States)

    Fenster, C. Abraham; And Others

    1976-01-01

    An overview of the objectives and courses of a doctoral program in forensic psychology is provided. Forensic psychology is the application of psychological methods, principles, and skills to the relevant needs of the legal system. (DE)

  17. [Polish forensic entomology--the past, present and future perspectives].

    Science.gov (United States)

    Skowronek, Rafał; Chowaniec, Czesław

    2010-01-01

    Forensic medicine increasingly more often benefits from the achievements of other biological sciences, which may be used in post mortem investigation. One of them is forensic entomology--the science based on the knowledge about biology of insects preying on cadavers. The objective of this article is to present the history of Polish forensic entomology, its present state and possibilities and directions of further development.

  18. Development and validation of an ESI-LC-MS/MS method for simultaneous identification and quantification of 24 analytes of forensic relevance in vitreous humour, whole blood and plasma.

    Science.gov (United States)

    Arora, Beauty; Velpandian, Thirumurthy; Saxena, Rohit; Lalwani, Sanjeev; Dogra, T D; Ghose, Supriyo

    2016-01-01

    Detection and quantification of drugs from various biological matrices are of immense importance in forensic toxicological analysis. Despite the various reported methods, development of a new method for the detection and quantification of drugs is still an active area of research. However, every method and biological matrix has its own limitation, which further encourage forensic toxicologists to develop new methods and to explore new matrices for the analysis of drugs. In this study, an electrospray ionization-liquid chromatograph-tandem mass spectrometry (ESI-LC-MS/MS) method is developed and validated for simultaneous identification and quantification of 24 drugs of forensic relevance in various body fluids, namely, whole blood, plasma and vitreous humour. The newly developed method has been validated for intra-day and inter-day accuracy, precision, selectivity and sensitivity. Absolute recovery shows a mean of 84.5, 86.2, and 103% in the vitreous humour, whole blood and plasma respectively, which is suitable for the screening procedure. Further, the absolute matrix effect (AME) shows a mean of 105, 96.5, and 109% in the vitreous humour, whole blood and plasma, respectively. In addition, to examine the practical utility of this method, it has been applied for screening of drugs in post-mortem samples of the vitreous humour, whole blood and plasma collected at autopsy from ten cadavers. Experimental results show that the newly developed method is well applicable for screening of analytes in all the three matrices.

  19. Development and validation of an EI-GC-MS method for the determination of benzodiazepine drugs and their metabolites in blood: applications in clinical and forensic toxicology.

    Science.gov (United States)

    Papoutsis, Ioannis I; Athanaselis, Sotirios A; Nikolaou, Panagiota D; Pistos, Constantinos M; Spiliopoulou, Chara A; Maravelias, Constantinos P

    2010-08-01

    Benzodiazepines are used widely in daily clinical practice, due to their multiple pharmacological actions. The frequent problems associated with the wide use of benzodiazepines, as well as the multiple incidents of poisonings, led to the necessity for the development of a precise, sensitive and rapid method for the simultaneous determination of the 23 most commonly used benzodiazepines (diazepam, nordiazepam, oxazepam, bromazepam, alprazolam, lorazepam, medazepam, flurazepam, fludiazepam, tetrazepam, chlordiazepoxide, clobazam, midazolam, flunitrazepam, 7-amino-flunitrazepam, triazolam, prazepam, nimetazepam, nitrazepam, temazepam, lormetazepam, clonazepam, camazepam) in blood. A gas chromatographic method combined with mass spectrometric detection was developed, optimized and validated for the determination of the above substances. This method includes liquid-liquid extraction with chloroform at pH 9 and two stages of derivatization using tetramethylammonium hydroxide and propyliodide (propylation), as well as a mixture of triethylamine:propionic anhydride (propionylation). The recoveries were higher than 74% for all the benzodiazepines. The calibration curves were linear within the dynamic range of each benzodiazepine with a correlation coefficient higher than 0.9981. The limits of detection and quantification for each analyte were statistically calculated from the relative calibration curves. Accuracy and precision were also calculated and were found to be less than 8.5% and 11.1%, respectively. The developed method was successfully applied for the investigation of both forensic and clinical toxicological cases of accidental and suicidal poisoning.

  20. Accurate pose estimation for forensic identification

    Science.gov (United States)

    Merckx, Gert; Hermans, Jeroen; Vandermeulen, Dirk

    2010-04-01

    In forensic authentication, one aims to identify the perpetrator among a series of suspects or distractors. A fundamental problem in any recognition system that aims for identification of subjects in a natural scene is the lack of constrains on viewing and imaging conditions. In forensic applications, identification proves even more challenging, since most surveillance footage is of abysmal quality. In this context, robust methods for pose estimation are paramount. In this paper we will therefore present a new pose estimation strategy for very low quality footage. Our approach uses 3D-2D registration of a textured 3D face model with the surveillance image to obtain accurate far field pose alignment. Starting from an inaccurate initial estimate, the technique uses novel similarity measures based on the monogenic signal to guide a pose optimization process. We will illustrate the descriptive strength of the introduced similarity measures by using them directly as a recognition metric. Through validation, using both real and synthetic surveillance footage, our pose estimation method is shown to be accurate, and robust to lighting changes and image degradation.

  1. Primer design for PCR reactions in forensic biology.

    Science.gov (United States)

    Elkins, Kelly M

    2015-01-01

    The polymerase chain reaction (PCR) is a popular method to copy DNA in vitro. Its invention revolutionized fields ranging from clinical medicine to anthropology, molecular biology, and forensic biology. The method employs one of many available heat-stable DNA polymerases in a reaction that is repeated many times in situ. The DNA polymerase reads a template DNA strand and using the components of the reaction mix, catalyzes the addition of free 2'-deoxynucleotide triphosphate nitrogenous bases to short segment of DNA that forms a complement with the template via Watson-Crick base pairing. This short segment of DNA is referred to as a PCR primer and it is essential to the success of the reaction. The most widely used application of PCR in forensic labs is the amplification of short tandem repeat (STR) loci used in DNA typing. The STRs are routinely evaluated in concert with 16 or more reactions, a multiplex, run in one test tube simultaneously. In a multiplex, it is essential that the primers work specifically and accurately on the intended reactions without hindering the other reactions. The primers, which are very specific, also can be used to probe single nucleotide polymorphisms (SNPs) in a DNA sequence of interest by single base extension. Primers are often designed using one of many available automated software packages. Here the process of manually designing PCR primers for forensic biology using no-cost software is described.

  2. [The concept of "forensic medicine"].

    Science.gov (United States)

    Popov, V L

    2013-01-01

    The analysis of the definition of forensic medicine and its evolution during the past 300 years is presented. The special character of forensic medicine, its subject-matter, scope of research, procedures, goals and targeted application of forensic medical knowledge are discussed. The original definition of the notion of "forensic medicine" is proposed.

  3. A Novel Forensic Computing Model

    Institute of Scientific and Technical Information of China (English)

    XU Yunfeng; LU Yansheng

    2006-01-01

    According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.

  4. Forensic DNA profiling and database.

    Science.gov (United States)

    Panneerchelvam, S; Norazmi, M N

    2003-07-01

    The incredible power of DNA technology as an identification tool had brought a tremendous change in crimnal justice . DNA data base is an information resource for the forensic DNA typing community with details on commonly used short tandem repeat (STR) DNA markers. This article discusses the essential steps in compilation of COmbined DNA Index System (CODIS) on validated polymerase chain amplified STRs and their use in crime detection.

  5. Forensic DNA Profiling and Database

    OpenAIRE

    Panneerchelvam, S.; Norazmi, M. N.

    2003-01-01

    The incredible power of DNA technology as an identification tool had brought a tremendous change in crimnal justice . DNA data base is an information resource for the forensic DNA typing community with details on commonly used short tandem repeat (STR) DNA markers. This article discusses the essential steps in compilation of COmbined DNA Index System (CODIS) on validated polymerase chain amplified STRs and their use in crime detection.

  6. Use of dendrochronology and dendrochemistry in environmental forensics: Does it meet the Daubert criteria?

    Science.gov (United States)

    Balouet, J.-C.; Smith, K.T.; Vroblesky, D.; Oudijk, G.

    2009-01-01

    Dendrochronological methods have been in use for more than 100 years, providing us a record of climate, human activities (archaeology), floods, fire, mudslides and other geological and biological events. More recently, dendrochemisty has been used to assess the time frames of the onset and existence of environmental contamination. This article assesses the scientific status of dendrochronology and dendrochemistry with respect to the admissibility of expert testimony and Daubert legal criteria. The purpose of this article is to identify the crucial scientific aspects of dendrochronology and dendrochemistry that address the Daubert criteria and Rule 702 as amended in 2000. To clarify terminology, dendrochronology is the precise and reliable assignment of the year of formation of tree rings. Dendroecology is the use of dendrochronology to understand ecological and environmental processes (Schweingruber, 1996). Dendrochemistry is a subdiscipline of dendrochronology that analyzes and interprets the wood chemistry of precisely dated tree rings. Forensic dendrochemistry applies dendrochemistry to resolve environmental disputes and generally deal with questions regarding the timing and/or the source of environmental incidents. One significant application of forensic dendrochemistry to expert testimony is to address issues of anthropogenic contamination. Forensic dendroecology is a similar term to forensic dendrochemistry, but forensic dendrochemistry will be used in this discussion as the latter term emphasizes the use of chemical detection methods. Because dendrochemistry is based on the foundation of dendrochronology, both the former specialty and the latter broader discipline will be discussed. ?? Taylor & Francis Group, LLC.

  7. FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW

    Directory of Open Access Journals (Sweden)

    Gulshan Shrivastava

    2012-05-01

    Full Text Available In this paper, we deal with introducing a technique of digital forensics for reconstruction of events or evidences after the commitment of a crime through any of the digital devices. It shows a clear transparency between Computer Forensics and Digital Forensics and gives a brief description about the classification of Digital Forensics. It has also been described that how the emergences of various digital forensic models help digital forensic practitioners and examiners in doing digital forensics. Further, discussed Merits and Demerits of the required models and review of every major model.

  8. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    procedures and training to meet these initial challenges so as minimize disturbance of the evidence. While epidemiology and forensics are similar sciences with similar goals when applied to biocrimes, forensics has additional and more stringent requirements. Maintaining a chain of custody on evidentiary samples is one example of an extra requirement imposed on an investigation of a biocrime. Another issue is the intent in microbial forensics to identify a bioattack organism in greatest detail. If possible, forensic investigations will strive to identify the precise strain and substrain, rather than just to the species level, which might be sufficient in an epidemiological investigation. Although multiple groups have developed lists of bioterrorism target pathogens, these lists are too narrow. An expansion of microorganisms relevant to food and water threats should be considered. Computerized networks should be established to track infectious disease outbreaks in real time. These systems could alert public health and agricultural officials to the existence of a potential bioattack earlier than simply waiting for a report of a suspicious cluster of similar patients. Once a biocrime is suspected, a wide variety of methods are available to identify the microorganism used in the bioattack and to analyze features that might lead to the source of the event. A multi-pronged approach to such an investigation may be preferable, using many available methods-ranging from genomics to sequencing to physiology to analysis of substances in the sample. Microbial forensics will be most effective if there is sufficient basic scientific information concerning microbial genetics, evolution, physiology, and ecology. Strain subtyping analysis will be difficult to interpret if we do not understand some of the basic evolutionary mechanisms and population diversity of pathogens. Phenotypic features associated with evidentiary pathogens also may provide investigative leads, but full exploitation of

  9. Computer Forensics Education - the Open Source Approach

    Science.gov (United States)

    Huebner, Ewa; Bem, Derek; Cheung, Hon

    In this chapter we discuss the application of the open source software tools in computer forensics education at tertiary level. We argue that open source tools are more suitable than commercial tools, as they provide the opportunity for students to gain in-depth understanding and appreciation of the computer forensic process as opposed to familiarity with one software product, however complex and multi-functional. With the access to all source programs the students become more than just the consumers of the tools as future forensic investigators. They can also examine the code, understand the relationship between the binary images and relevant data structures, and in the process gain necessary background to become the future creators of new and improved forensic software tools. As a case study we present an advanced subject, Computer Forensics Workshop, which we designed for the Bachelor's degree in computer science at the University of Western Sydney. We based all laboratory work and the main take-home project in this subject on open source software tools. We found that without exception more than one suitable tool can be found to cover each topic in the curriculum adequately. We argue that this approach prepares students better for forensic field work, as they gain confidence to use a variety of tools, not just a single product they are familiar with.

  10. Plants & Perpetrators: Forensic Investigation in the Botany Classroom

    Science.gov (United States)

    Boyd, Amy E.

    2006-01-01

    Applying botanical knowledge to a simulated forensic investigation provides inquiry-based and problem-based learning in the botany classroom. This paper details one such forensic investigation in which students use what they have learned about plant morphology and anatomy to analyze evidence and solve a murder mystery. (Contains 1 table.)

  11. Forensic Mass Spectrometry

    Science.gov (United States)

    Hoffmann, William D.; Jackson, Glen P.

    2015-07-01

    Developments in forensic mass spectrometry tend to follow, rather than lead, the developments in other disciplines. Examples of techniques having forensic potential born independently of forensic applications include ambient ionization, imaging mass spectrometry, isotope ratio mass spectrometry, portable mass spectrometers, and hyphenated chromatography-mass spectrometry instruments, to name a few. Forensic science has the potential to benefit enormously from developments that are funded by other means, if only the infrastructure and personnel existed to adopt, validate, and implement the new technologies into casework. Perhaps one unique area in which forensic science is at the cutting edge is in the area of chemometrics and the determination of likelihood ratios for the evaluation of the weight of evidence. Such statistical techniques have been developed most extensively for ignitable-liquid residue analyses and isotope ratio analysis. This review attempts to capture the trends, motivating forces, and likely impact of developing areas of forensic mass spectrometry, with the caveat that none of this research is likely to have any real impact in the forensic community unless: (a) The instruments developed are turned into robust black boxes with red and green lights for positives and negatives, respectively, or (b) there are PhD graduates in the workforce who can help adopt these sophisticated techniques.

  12. Forensic science, genetics and wildlife biology: getting the right mix for a wildlife DNA forensics lab.

    Science.gov (United States)

    Ogden, Rob

    2010-09-01

    Wildlife DNA forensics is receiving increasing coverage in the popular press and has begun to appear in the scientific literature in relation to several different fields. Recognized as an applied subject, it rests on top of very diverse scientific pillars ranging from biochemistry through to evolutionary genetics, all embedded within the context of modern forensic science. This breadth of scope, combined with typically limited resources, has often left wildlife DNA forensics hanging precariously between human DNA forensics and academics keen to seek novel applications for biological research. How best to bridge this gap is a matter for regular debate among the relatively few full-time practitioners in the field. The decisions involved in establishing forensic genetic services to investigate wildlife crime can be complex, particularly where crimes involve a wide range of species and evidential questions. This paper examines some of the issues relevant to setting up a wildlife DNA forensics laboratory based on experiences of working in this area over the past 7 years. It includes a discussion of various models for operating individual laboratories as well as options for organizing forensic testing at higher national and international levels.

  13. Methods in Logic Based Control

    DEFF Research Database (Denmark)

    Christensen, Georg Kronborg

    1999-01-01

    Desing and theory of Logic Based Control systems.Boolean Algebra, Karnaugh Map, Quine McClusky's algorithm. Sequential control design. Logic Based Control Method, Cascade Control Method. Implementation techniques: relay, pneumatic, TTL/CMOS,PAL and PLC- and Soft_PLC implementation. PLC-design met......Desing and theory of Logic Based Control systems.Boolean Algebra, Karnaugh Map, Quine McClusky's algorithm. Sequential control design. Logic Based Control Method, Cascade Control Method. Implementation techniques: relay, pneumatic, TTL/CMOS,PAL and PLC- and Soft_PLC implementation. PLC...

  14. The transfer of diatoms from freshwater to footwear materials: An experimental study assessing transfer, persistence, and extraction methods for forensic reconstruction.

    Science.gov (United States)

    Levin, E A; Morgan, R M; Scott, K R; Jones, V J

    2017-09-01

    In recent years there has been growing interest in environmental forms of trace evidence, and ecological trace evidence collected from footwear has proved valuable within casework. Simultaneously, there has been growing awareness of the need for empirical experimentation to underpin forensic inferences. Diatoms are unicellular algae, and each cell (or 'frustule') consists of two valves which are made of silica, a robust material that favours their preservation both in sediments and within forensic scenarios. A series of experiments were carried out to investigate the transfer and persistence of diatoms upon common footwear materials, a recipient surface that has historically been overlooked by studies of persistence. The effectiveness of two novel extraction techniques (jet rinsing, and heating and agitation with distilled water) was compared to the established extraction technique of hydrogen peroxide digestion, for a suite of five common footwear materials: canvas, leather, and 'suede' (representing upper materials), and rubber and polyurethane (representing sole materials). It was observed that the novel extraction technique of heating and agitation with distilled water did not extract fewer diatom valves, or cause increased fragmentation of valves, when compared to peroxide digestion, suggesting that the method may be viable where potentially hazardous chemical reactions may be encountered with the peroxide digestion method. Valves could be extracted from all five footwear materials after 3min of immersion, and more valves were extracted from the rougher, woven upper materials than the smoother sole materials. Canvas yielded the most valves (a mean of 2511/cm(2)) and polyurethane the fewest (a mean of 15/cm(2)). The persistence of diatoms on the three upper materials was addressed with a preliminary pilot investigation, with ten intervals sampled between 0 and 168h. Valves were seen to persist in detectable quantities after 168h on all three upper materials

  15. Discrimination of forensic trace evidence using laser induced breakdown spectroscopy

    Science.gov (United States)

    Bridge, Candice Mae

    Elemental analysis in forensic laboratories can be tedious and many trace evidence items are not analyzed to determine their elemental composition. Presently, scanning electron microscopy-energy dispersive x-ray spectroscopy (SEM-EDS) is the primary analytical tool for determining the elemental composition of trace evidence items. However, due to the time it takes to obtain the required vacuum and the limited number of samples that can be analyzed at any one time, SEM-EDS can be impractical for a high volume of evidence items. An alternative instrument that can be used for this type of analysis is laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS). While LA-ICP-MS is a very precise and quantitative analytical method that determines elemental composition based on isotopic mass measurements; however, the instrumentation is relatively expensive and therefore is budgetarily prohibitive for many forensic laboratories. It is the purpose of this research to evaluate an inexpensive instrument that can potentially provide rapid elemental analysis for many forensic laboratories. Laser induced breakdown spectroscopy (LIBS) is an analytical method that meets these requirements and offers information about the elemental composition based on ionic, atomic and diatomic molecular emissions.

  16. Role of prosthodontist in forensic odontology. A literature review

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Mishra

    2014-01-01

    Full Text Available Dental identification assumes a primary role in the identification of remains when postmortem changes, traumatic tissue injury, or lack of a fingerprint record invalidate the use of visual or fingerprint methods. The most common role of the forensic dentist is the identification of deceased individuals. Forensic identification based on assessment of prosthodontic appliances is assuming greater significance, as labeling of dentures and other prosthetic appliance could provide vital clues for patient identification. Various recommendations have been made concerning the importance of denture identification. This paper presents a review of available literature highlighting the fact that how a prosthodontist can play a key role in identification of a deceased individual if trained to do so.

  17. A Thorn in the Flesh? Forensic Inpatients in General Psychiatry

    DEFF Research Database (Denmark)

    Møllerhøj, Jette; Stølan, Liv Os; Brandt-Christensen, Anne Mette

    2016-01-01

    of staff identify the care of mentally disordered offenders in general psychiatric units as either "a parking space" or a very difficult or frightening course, where staff members tend to behave like pleasers in order to avoid risks of conflict or physical violence. Either way, it seems hard to provide......PURPOSE: To illuminate whether and how taking care of forensic inpatients is experienced as a burden among staff and managers in general psychiatry. DESIGN AND METHODS: Qualitative analytical strategies based on interviews and questionnaires. FINDINGS: The interplay between physical environment...... sufficient mental health care. PRACTICE IMPLICATIONS: Nationwide training and teaching as well as knowledge exchange between specialized forensic psychiatry and general psychiatry are recommended. Further exploration is needed on patient perspectives and on avenues to increase efficiency and decrease...

  18. Palatal rugae and their role in forensic odontology.

    Science.gov (United States)

    Jain, Anoop; Chowdhary, Ramesh

    2014-08-01

    Establishing a person's identity can be a difficult task in cases of traffic accidents or in mass disaster situations. The records collected to identify a decedent should be accurate and totally inclusive of objective findings. When a victim has no teeth, information for use in personal identification based on methods available in forensic odontology is much more limited than in the case of dentate victims. Palatal rugae have been considered relevant for human identification due to its stability, which is equivalent to the fingerprint, in that it is unique for each ruga pattern. Palatal rugae appear to possess the features of an ideal forensic identification parameter, that is, uniqueness, postmortem resistance, and stability. The purpose of this article was to review the literature, in order to determine if there is enough evidence to establish the use of palatal rugae in dental identification.

  19. Role of prosthodontist in forensic odontology. A literature review.

    Science.gov (United States)

    Mishra, Sunil Kumar; Mahajan, Harsh; Sakorikar, Rupal; Jain, Anoop

    2014-09-01

    Dental identification assumes a primary role in the identification of remains when postmortem changes, traumatic tissue injury, or lack of a fingerprint record invalidate the use of visual or fingerprint methods. The most common role of the forensic dentist is the identification of deceased individuals. Forensic identification based on assessment of prosthodontic appliances is assuming greater significance, as labeling of dentures and other prosthetic appliance could provide vital clues for patient identification. Various recommendations have been made concerning the importance of denture identification. This paper presents a review of available literature highlighting the fact that how a prosthodontist can play a key role in identification of a deceased individual if trained to do so.

  20. Awareness of forensic odontology among police personnel: A new ray of hope in forensic odontology

    Directory of Open Access Journals (Sweden)

    Siddharth Pandit

    2016-01-01

    Full Text Available Background: Police personnel play an important role in collecting and producing evidence. Knowledge about the various aspects of forensic as well as dental sciences and related evidence in them provide a golden opportunity to forensic odontologists to actively participate in the identification of the accused or victim. They can also act as an expert witness in court to produce forensic dental evidence. Aim: To evaluate the awareness and knowledge about the utilization of forensic odontology during evidence collection by the crime scene investigation (CSI officers. Materials and Methods: Four hundred police officers were included in this survey. A questionnaire was designed to assess the awareness and knowledge about forensic odontology and application of the known knowledge in identifying and considering the dental evidences. Data were analyzed using the software Statistical Package for Social Sciences (SPSS, Chicago, Il, USA version 17.0 by comparing the overall awareness of forensic odontology among the trained SI officers and trainee police personnel. Results: The collected results showed that there is a requirement for changes in the current practice of evidence collection and highlighted the need for better communication between the police personnel and forensic odontologists. A significantly higher number of police officers in both the trained and trainee groups reported knowledge about the subject (P < 0.001 through newspapers and mass media as the sources of knowledge. Conclusion: Even though the respondents have knowledge about forensic odontology, there is a lack of communication and facilities in their system; hence, steps must be taken to educate the police personnel about the application of forensic odontology.

  1. Awareness of forensic odontology among police personnel: A new ray of hope in forensic odontology

    Science.gov (United States)

    Pandit, Siddharth; Desai, Dinkar; Jeergal, Prabhakar; Venkatesh, Sowmya

    2016-01-01

    Background: Police personnel play an important role in collecting and producing evidence. Knowledge about the various aspects of forensic as well as dental sciences and related evidence in them provide a golden opportunity to forensic odontologists to actively participate in the identification of the accused or victim. They can also act as an expert witness in court to produce forensic dental evidence. Aim: To evaluate the awareness and knowledge about the utilization of forensic odontology during evidence collection by the crime scene investigation (CSI) officers. Materials and Methods: Four hundred police officers were included in this survey. A questionnaire was designed to assess the awareness and knowledge about forensic odontology and application of the known knowledge in identifying and considering the dental evidences. Data were analyzed using the software Statistical Package for Social Sciences (SPSS, Chicago, Il, USA) version 17.0 by comparing the overall awareness of forensic odontology among the trained SI officers and trainee police personnel. Results: The collected results showed that there is a requirement for changes in the current practice of evidence collection and highlighted the need for better communication between the police personnel and forensic odontologists. A significantly higher number of police officers in both the trained and trainee groups reported knowledge about the subject (P < 0.001) through newspapers and mass media as the sources of knowledge. Conclusion: Even though the respondents have knowledge about forensic odontology, there is a lack of communication and facilities in their system; hence, steps must be taken to educate the police personnel about the application of forensic odontology. PMID:27051225

  2. Forensic botany: usability of bryophyte material in forensic studies.

    Science.gov (United States)

    Virtanen, Viivi; Korpelainen, Helena; Kostamo, Kirsi

    2007-10-25

    Two experiments were performed to test the relevance of bryophyte (Plantae, Bryophyta) material for forensic studies. The first experiment was conducted to reveal if, and how well, plant fragments attach to footwear in general. In the test, 16 persons walked outdoors wearing rubber boots or hiking boots. After 24h of use outdoors the boots were carefully cleaned, and all plant fragments were collected. Afterwards, all plant material was examined to identify the species. In the second experiment, fresh material of nine bryophyte species was kept in a shed in adverse conditions for 18 months, after which DNA was extracted and subjected to genotyping to test the quality of the material. Both experiments give support for the usability of bryophyte material in forensic studies. The bryophyte fragments become attached to shoes, where they remain even after the wearer walks on a dry road for several hours. Bryophyte DNA stays intact, allowing DNA profiling after lengthy periods following detachment from the original plant source. Based on these experiments, and considering the fact that many bryophytes are clonal plants, we propose that bryophytes are among the most usable plants to provide botanical evidence for forensic investigations.

  3. Undergraduate teaching of forensic medicine in Saudi Arabia.

    Science.gov (United States)

    Madadin, Mohammed; Al-Saif, Dalia M; Khamis, Amar Hassan; Taha, Attia Z; Kharoshah, Magdy A; Alsayyah, Ahmed; Alfehaid, Suha; Yaghmour, Khalid; Hakami, Ahmad Yahia; Bamousa, Manal S; Menezes, Ritesh G; Almadani, Osama M

    2016-07-01

    Medico-legal tasks are not exclusive to forensic medical experts -any physician may face medico-legal issues in his career. Hence, the practice of medicine requires education in legal issues. In Saudi Arabia, there are 30 universities with medical colleges, but we do not know how they teach undergraduate forensic medicine and medico-legal issues. The aim of this study was to discover undergraduate training courses in forensic medicine in Saudi universities. We conducted a cross-sectional study involving all colleges of medicine in Saudi Arabia. A structured, self-administered questionnaire containing 13 items relating to the undergraduate forensic medicine course was distributed. Out of a total of 30 universities, 27 universities responded. Of these 27 universities, 16 (59.26%) teach forensic medicine to undergraduate medical students, and 11 (40.74%) do not teach forensic medicine in their undergraduate curriculum. Of the 27 universities that responded, none has a department of forensic medicine. Eleven universities that do not teach forensic medicine have no forensic medicine unit/division or faculty at all. Forensic medicine belongs to the pathology department in 11 universities, while it belongs to different departments in five universities. There is variation in teaching methods, years where the course is taught and length of the course. Practical and morgue visits take place in 7/16 (43.8%) universities, while 9/16 (56.3%) universities only teach the theoretical aspects of forensic medicine. All 16 universities teach forensic medicine only to medical students and do not teach it to students in other colleges such as dentistry and nursing.

  4. Forensic anthropology and mortuary archaeology in Lithuania.

    Science.gov (United States)

    Jankauskas, Rimantas

    2009-12-01

    Forensic anthropology (in Lithuania, as everywhere in Eastern Europe, traditionally considered as a narrower field--forensic osteology) has a long history, experience being gained both during exhumations of mass killings during the Second World War and the subsequent totalitarian regime, investigations of historical mass graves, identification of historical personalities and routine forensic work. Experts of this field (usually a branch of forensic medicine) routinely are solving "technical" questions of crime investigation, particularly identification of (usually dead) individuals. Practical implementation of the mission of forensic anthropology is not an easy task due to interdisciplinary character of the field. On one hand, physical anthropology has in its disposition numerous scientifically tested methods, however, their practical value in particular legal processes is limited. Reasons for these discrepancies can be related both to insufficient understanding of possibilities and limitations of forensic anthropology and archaeology by officials representing legal institutions that perform investigations, and sometimes too "academic" research, that is conducted at anthropological laboratories, when methods developed are not completely relevant to practical needs. Besides of answering to direct questions (number of individuals, sex, age, stature, population affinity, individual traits, evidence of violence), important humanitarian aspects--the individual's right for identity, the right of the relatives to know the fate of their beloved ones--should not be neglected. Practical use of other identification methods faces difficulties of their own (e.g., odontology--lack of regular dental registration system and compatible database). Two examples of forensic anthropological work of mass graves, even when the results were much influenced by the questions raised by investigators, can serve as an illustration of the above-mentioned issues.

  5. A Reverse Forensic Algorithms Based on the Carrier Check Mark Area%基于载体痕迹区域校验的反取证算法研究

    Institute of Scientific and Technical Information of China (English)

    闫洁

    2013-01-01

    All current single forensics technology cannot be inspected images are comprehensive, determine, precise con-clusion, and has proposed some forensics method is aimed at a certain way of digital image manipulation, and it USES a particular occasion, but not to image background of the widely used a variety of applications, therefore proposes a reverse forensics algorithm based on carrier check mark area, first extract principal component characteristics of pixels, using the image carrier in the fraud of traces of the principal component of a distinguish area, characteristics of traces of the area of the solution for optimization calculation, the information after making fraud has relatively dominant feature. Design steps, the algorithm has low computing complexity, and has higher security. Algorithms based on the experimental results show that the cost information in the image carrier to realize the efficient extraction and optimization effect is obvious..%当前所有的单一取证技术都不能对待检图像给出全面的、确定的、精确的结论,而目前已提出的一些取证方法都是针对某些特定的数字图像篡改方式以及它所使用的特定场合,却不能够普遍适用多种应用的图像背景,为此提出了一种基于载体痕迹区域校验的反取证算法,首先提取像素的主成份特征,利用图像载体在造假中留下的主成份痕迹组成一个辨别区域,对区域中的痕迹特征解进行最优化计算,从而使得造假后的信息具有相对显性的特性。该算法设计步骤明了,计算复杂度低,并具有较高的安全性。实验结果表明,该算法在图像载体中的造假信息实现了高效提取,优化效果较为明显。

  6. Computer Forensic Using Lazy Local Bagging Predictors

    Institute of Scientific and Technical Information of China (English)

    QIU Wei-dong; BAO Cheng-yi; ZHU Xing-quan

    2009-01-01

    In this paper, we study the problem of employ ensemble learning for computer forensic. We propose a Lazy Local Learning based bagging (L3B) approach, where base learners are trained from a small instance subset surrounding each test instance. More specifically, given a test instance x, L3B first discovers x's k nearest neighbours, and then applies progressive sampling to the selected neighbours to train a set of base classifiers, by using a given very weak (VW) learner. At the last stage, x is labeled as the most frequently voted class of all base classifiers. Finally, we apply the proposed L3B to computer forensic.

  7. Identification of organ tissue types and skin from forensic samples by microRNA expression analysis.

    Science.gov (United States)

    Sauer, Eva; Extra, Antje; Cachée, Philipp; Courts, Cornelius

    2017-05-01

    The identification of organ tissues in traces recovered from scenes and objects with regard to violent crimes involving serious injuries can be of considerable relevance in forensic investigations. Molecular genetic approaches are provably superior to histological and immunological assays in characterizing organ tissues, and micro-RNAs (miRNAs), due to their cell type specific expression patterns and stability against degradation, emerged as a promising molecular species for forensic analyses, with a range of tried and tested indicative markers. Thus, herein we present the first miRNA based approach for the forensic identification of organ tissues. Using quantitative PCR employing an empirically derived strategy for data normalization and unbiased statistical decision making, we assessed the differential expression of 15 preselected miRNAs in tissues of brain, kidney, lung, liver, heart muscle, skeletal muscle and skin. We show that not only can miRNA expression profiling be used to reliably differentiate between organ tissues but also that this method, which is compatible with and complementary to forensic DNA analysis, is applicable to realistic forensic samples e.g. mixtures, aged and degraded material as well as traces generated by mock stabbings and experimental shootings at ballistic models.

  8. Generating a Corpus of Mobile Forensic Images for Masquerading user Experimentation.

    Science.gov (United States)

    Guido, Mark; Brooks, Marc; Grover, Justin; Katz, Eric; Ondricek, Jared; Rogers, Marcus; Sharpe, Lauren

    2016-11-01

    The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on-device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud-based queuing service, relational database, and analytical framework for running forensic processes. During a 3-month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50-fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis. © 2016 American Academy of Forensic Sciences.

  9. Principles, Practice, and Evolution of Capillary Electrophoresis as a Tool for Forensic DNA Analysis.

    Science.gov (United States)

    Shewale, J G; Qi, L; Calandro, L M

    2012-07-01

    Capillary electrophoresis (CE) is a versatile and widely used analysis platform with application in diverse areas such as analytical chemistry, chiral separations, clinical, forensics, molecular biology, natural products, organic chemistry, and the pharmaceutical industry. Forensic applications of CE include fragment analysis, DNA sequencing, SNP typing, and analysis of gunshot residues, explosive residues, and drugs. Fragment analysis is a widely used method for short tandem repeat (STR) profiling for human identification (HID) due to the single-base resolution capability of CE. This approach circumvents the tedious and expensive approach of DNA sequencing for STR typing. The high sizing precision, ability to detect fluorescence emitted from multiple dyes, automated electrophoretic runs, and data collection software are key factors in the worldwide adoption of CE as the preferred platform for forensic DNA analysis. The most common CE systems used in forensic DNA analysis include the ABI PRISM® 310, 3100, 3100 Avant, 3130, 3130xl, 3500, and 3500xL Genetic Analyzers (GAs). The 3500 series GAs are developed with features useful for forensic scientists, including a normalization feature for analysis of the data designed to reduce the variation in peak height from instrument to instrument and injection to injection. Other hardware and software features include improved temperature control, radio frequency identification (RFID) tags for monitoring instrument consumables, HID-focused software features, and security and maintenance.

  10. Differences between British and Japanese perspectives on forensic mental health systems: A preliminary study

    Science.gov (United States)

    Shiina, Akihiro; Tomoto, Aika; Omiya, Soichiro; Sato, Aiko; Iyo, Masaomi; Igarashi, Yoshito

    2017-01-01

    AIM To clarify the differences in views on forensic mental health (FMH) systems between the United Kingdom and Japan. METHODS We conducted a series of semi-structured interviews with six leading forensic psychiatrists. Based on a discussion by the research team, we created an interview form. After we finished conducting all the interviews, we qualitatively analyzed their content. RESULTS In the United Kingdom the core domain of FMH was risk assessment and management; however, in Japan, the core domain of FMH was psychiatric testimony. In the United Kingdom, forensic psychiatrists were responsible for ensuring public safety, and psychopathy was identified as a disease but deemed as not suitable for medical treatment. On the other hand, in Japan, psychopathy was not considered a mental illness. CONCLUSION In conclusion, there are considerable differences between the United Kingdom and Japan with regard to the concepts of FMH. Some ideas taken from both cultures for better FMH practice were suggested.

  11. Methods in Logic Based Control

    DEFF Research Database (Denmark)

    Christensen, Georg Kronborg

    1999-01-01

    Desing and theory of Logic Based Control systems.Boolean Algebra, Karnaugh Map, Quine McClusky's algorithm. Sequential control design. Logic Based Control Method, Cascade Control Method. Implementation techniques: relay, pneumatic, TTL/CMOS,PAL and PLC- and Soft_PLC implementation. PLC...

  12. Forensic entomology: applications and limitations.

    Science.gov (United States)

    Amendt, J; Richards, C S; Campobasso, C P; Zehner, R; Hall, M J R

    2011-12-01

    Forensic entomology is the science of collecting and analysing insect evidence to aid in forensic investigations. Its main application is in the determination of the minimum time since death in cases of suspicious death, either by estimating the age of the oldest necrophagous insects that developed on the corpse, or by analysing the insect species composition on the corpse. In addition, toxicological and molecular examinations of these insects may help reveal the cause of death or even the identity of a victim, by associating a larva with its last meal, for example, in cases where insect evidence is left at a scene after human remains have been deliberately removed. Some fly species can develop not only on corpses but on living bodies too, causing myiasis. Analysis of larvae in such cases can demonstrate the period of neglect of humans or animals. Without the appropriate professional collection of insect evidence, an accurate and convincing presentation of such evidence in court will be hampered or even impossible. The present paper describes the principles and methods of forensic entomology and the optimal techniques for collecting insect evidence.

  13. Developing digital forensic governance

    CSIR Research Space (South Africa)

    Grobler, M

    2010-03-01

    Full Text Available This paper presents a Digital Forensic (DF) governance framework and its mapping on the SANS ISO/IEC 38500:2009 Corporate governance of information technology structure. DF governance assists organisations in guiding the management team...

  14. Forensic odontology, historical perspective.

    Science.gov (United States)

    Sansare, K

    1995-01-01

    According to the old testament Adam was convinced by eve to put a "Bite Mark" on the apple. Interest in Forensic Odontology was heightened in the latter part of 19th Century. The first formal instructional programme was given at the Armed Forces Institute of Pathology, U.S. Since then the number of cases reported has played a significant role in expanding the role of Forensic Odontology. The earliest reported case was of Lollia Paulina in the year 49 A. D. One of the early reported case is also found in India in the year 1193. In the last few decades, the basic pattern of Forensic Odontology has changed quite a lot. Advances in dental material and laboratory techniques, with improvements in scientific and photographic technology, have made the proof of presentation much to forensic science.

  15. Entropy-based benchmarking methods

    OpenAIRE

    2012-01-01

    We argue that benchmarking sign-volatile series should be based on the principle of movement and sign preservation, which states that a bench-marked series should reproduce the movement and signs in the original series. We show that the widely used variants of Denton (1971) method and the growth preservation method of Causey and Trager (1981) may violate this principle, while its requirements are explicitly taken into account in the pro-posed entropy-based benchmarking methods. Our illustrati...

  16. Activity based costing (ABC Method

    Directory of Open Access Journals (Sweden)

    Prof. Ph.D. Saveta Tudorache

    2008-05-01

    Full Text Available In the present paper the need and advantages are presented of using the Activity BasedCosting method, need arising from the need of solving the information pertinence issue. This issue has occurreddue to the limitation of classic methods in this field, limitation also reflected by the disadvantages ofsuch classic methods in establishing complete costs.

  17. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  18. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  19. Professionalism in Computer Forensics

    Science.gov (United States)

    Irons, Alastair D.; Konstadopoulou, Anastasia

    The paper seeks to address the need to consider issues regarding professionalism in computer forensics in order to allow the discipline to develop and to ensure the credibility of the discipline from the differing perspectives of practitioners, the criminal justice system and in the eyes of the public. There is a need to examine and develop professionalism in computer forensics in order to promote the discipline and maintain the credibility of the discipline.

  20. Column: File Cabinet Forensics

    OpenAIRE

    Simson Garfinkel

    2011-01-01

    Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and ph...

  1. A Survey of Graduate Training Programs and Coursework in Forensic Psychology

    Science.gov (United States)

    Burl, Jeffrey; Shah, Sanjay; Filone, Sarah; Foster, Elizabeth; DeMatteo, David

    2012-01-01

    An increasing number of graduate programs are available to students interested in the study of forensic psychology. The growth of forensic training opportunities is reflective of the wider development of forensic psychology as a discrete specialty area. An Internet-based survey was conducted to provide descriptive information to academic advisors…

  2. A Survey of Graduate Training Programs and Coursework in Forensic Psychology

    Science.gov (United States)

    Burl, Jeffrey; Shah, Sanjay; Filone, Sarah; Foster, Elizabeth; DeMatteo, David

    2012-01-01

    An increasing number of graduate programs are available to students interested in the study of forensic psychology. The growth of forensic training opportunities is reflective of the wider development of forensic psychology as a discrete specialty area. An Internet-based survey was conducted to provide descriptive information to academic advisors…

  3. Optimized mtDNA Control Region Primer Extension Capture Analysis for Forensically Relevant Samples and Highly Compromised mtDNA of Different Age and Origin

    Directory of Open Access Journals (Sweden)

    Mayra Eduardoff

    2017-09-01

    Full Text Available The analysis of mitochondrial DNA (mtDNA has proven useful in forensic genetics and ancient DNA (aDNA studies, where specimens are often highly compromised and DNA quality and quantity are low. In forensic genetics, the mtDNA control region (CR is commonly sequenced using established Sanger-type Sequencing (STS protocols involving fragment sizes down to approximately 150 base pairs (bp. Recent developments include Massively Parallel Sequencing (MPS of (multiplex PCR-generated libraries using the same amplicon sizes. Molecular genetic studies on archaeological remains that harbor more degraded aDNA have pioneered alternative approaches to target mtDNA, such as capture hybridization and primer extension capture (PEC methods followed by MPS. These assays target smaller mtDNA fragment sizes (down to 50 bp or less, and have proven to be substantially more successful in obtaining useful mtDNA sequences from these samples compared to electrophoretic methods. Here, we present the modification and optimization of a PEC method, earlier developed for sequencing the Neanderthal mitochondrial genome, with forensic applications in mind. Our approach was designed for a more sensitive enrichment of the mtDNA CR in a single tube assay and short laboratory turnaround times, thus complying with forensic practices. We characterized the method using sheared, high quantity mtDNA (six samples, and tested challenging forensic samples (n = 2 as well as compromised solid tissue samples (n = 15 up to 8 kyrs of age. The PEC MPS method produced reliable and plausible mtDNA haplotypes that were useful in the forensic context. It yielded plausible data in samples that did not provide results with STS and other MPS techniques. We addressed the issue of contamination by including four generations of negative controls, and discuss the results in the forensic context. We finally offer perspectives for future research to enable the validation and accreditation of the PEC MPS

  4. Genetic Approaches to Appearance and Ancestry : Improving Forensic DNA Analysis

    NARCIS (Netherlands)

    L.C. Chaitanya (Lakshmi)

    2016-01-01

    textabstractTraditionally, routine forensic casework is based on comparative grounds. DNA profiles obtained from crime-scenes are compared with those of potential suspects or DNA profiles deposited in forensic DNA databases. The principal limitation of such comparative approach is that trace donors

  5. [Research progress on the phenotype informative SNP in forensic science].

    Science.gov (United States)

    Liu, Yu-Xuan; Hu, Qing-Qing; Ma, Hong-Du; Huang, Dai-Xin

    2014-10-01

    Single nucleotide polymorphism (SNP) refers to the single base sequence variation in specific location of the human genome. Phenotype informative SNP has gradually become one of the research hot spots in forensic science. In this paper, the forensic research situation and application prospect of phenotype informative SNP in the characteristics of hair, eye and skin color, height, and facial feature are reviewed.

  6. Fear and Loathing in Forensics: The View from Postmodern Suburbia.

    Science.gov (United States)

    Murphy, B. Keith

    This report attempts to construct a postmodern framework to provide for an analysis of Intercollegiate Forensics. It isolates the major theoretical constructs of postmodernism, applies them to Intercollegiate Forensics, and draws conclusions. The paper maintains that linguistic-based postmodernism consists of four theoretical areas: (1)…

  7. Forensic human identification in the United States and Canada: a review of the law, admissible techniques, and the legal implications of their application in forensic cases.

    Science.gov (United States)

    Holobinko, Anastasia

    2012-10-10

    Forensic human identification techniques are successful if they lead to positive personal identification. However, the strongest personal identification is of no use in the prosecution--or vindication--of an accused if the associated evidence and testimony is ruled inadmissible in a court of law. This review examines the U.S. and Canadian legal rulings regarding the admissibility of expert evidence and testimony, and subsequently explores four established methods of human identification (i.e., DNA profiling, forensic anthropology, forensic radiography, forensic odontology) and one complementary technique useful in determining identity, and the legal implications of their application in forensic cases. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  8. Accuracy Rates of Ancestry Estimation by Forensic Anthropologists Using Identified Forensic Cases.

    Science.gov (United States)

    Thomas, Richard M; Parks, Connie L; Richard, Adam H

    2017-01-30

    A common task in forensic anthropology involves the estimation of the ancestry of a decedent by comparing their skeletal morphology and measurements to skeletons of individuals from known geographic groups. However, the accuracy rates of ancestry estimation methods in actual forensic casework have rarely been studied. This article uses 99 forensic cases with identified skeletal remains to develop accuracy rates for ancestry estimations conducted by forensic anthropologists. The overall rate of correct ancestry estimation from these cases is 90.9%, which is comparable to most research-derived rates and those reported by individual practitioners. Statistical tests showed no significant difference in accuracy rates depending on examiner education level or on the estimated or identified ancestry. More recent cases showed a significantly higher accuracy rate. The incorporation of metric analyses into the ancestry estimate in these cases led to a higher accuracy rate.

  9. Applying Machine Trust Models to Forensic Investigations

    Science.gov (United States)

    Wojcik, Marika; Venter, Hein; Eloff, Jan; Olivier, Martin

    Digital forensics involves the identification, preservation, analysis and presentation of electronic evidence for use in legal proceedings. In the presence of contradictory evidence, forensic investigators need a means to determine which evidence can be trusted. This is particularly true in a trust model environment where computerised agents may make trust-based decisions that influence interactions within the system. This paper focuses on the analysis of evidence in trust-based environments and the determination of the degree to which evidence can be trusted. The trust model proposed in this work may be implemented in a tool for conducting trust-based forensic investigations. The model takes into account the trust environment and parameters that influence interactions in a computer network being investigated. Also, it allows for crimes to be reenacted to create more substantial evidentiary proof.

  10. FORENSIC-CLINICAL INTERVIEW: RELIABILITY AND VALIDITY FOR THE EVALUATION OF PSYCHOLOGICAL INJURY

    Directory of Open Access Journals (Sweden)

    Francisca Fariña

    2013-01-01

    Full Text Available Forensic evaluation of psychological injury involves the use of a multimethod approximation i.e., a psychometric instrument, normally the MMPI-2, and a clinical interview. In terms of the clinical interview, the traditional clinical interview (e.g., SCID is not valid for forensic settings as it does not fulfil the triple objective of forensic evaluation: diagnosis of psychological injury in terms of Post Traumatic Stress Disorder (PTSD, a differential diagnosis of feigning, and establishing a causal relationship between allegations of intimate partner violence (IPV and psychological injury. To meet this requirement, Arce and Fariña (2001 created the forensic-clinical interview based on two techniques that do not contaminate the contents i.e., reinstating the contexts and free recall, and a methodic categorical system of contents analysis for the diagnosis of psychological injury and a differential diagnosis of feigning. The reliability and validity of the forensic-clinical interview designed for the forensic evaluation of psychological injury was assessed in 51 genuine cases of (IPV and 54 mock victims of IPV who were evaluated using a forensic-clinical interview and the MMPI-2. The result revealed that the forensic-clinical interview was a reliable instrument (α = .85 for diagnostic criteria of psychological injury, and α = .744 for feigning strategies. Moreover, the results corroborated the predictive validity (the diagnosis of PTSD was similar to the expected rate; the convergence validity (the diagnosis of PTSD in the interview strongly correlated with the Pk Scale of the MMPI-2, and discriminant validity (the diagnosis of PTSD in the interview did not correlate with the Pk Scale in feigners. The feigning strategies (differential diagnosis also showed convergent validity (high correlation with the Scales and indices of the MMPI2 for the measure of feigning and discriminant validity (no genuine victim was classified as a feigner

  11. Computational intelligence in digital forensics forensic investigation and applications

    CERN Document Server

    Choo, Yun-Huoy; Abraham, Ajith; Srihari, Sargur

    2014-01-01

    Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts.   This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement ...

  12. Role of the forensic psychiatric nurse.

    Science.gov (United States)

    Lyons, Tamsen

    2009-01-01

    Abstract The article clarifies the role of the forensic psychiatric nurse (FPN) and challenges interchangeable terms confusing forensic and correctional nursing. It addresses the varied venues where the FPN may assess the patient (victim or perpetrator) and gather evidence that may influence conviction, sentencing, recidivism, treatment, and prevention. In depth knowledge of medical and psychiatric nursing as well as the criminal justice system is germane to competent advanced practice forensic nursing. An analogy is drawn between the forensic assessment for risk of violence which is commonly performed by psychiatric nurses in Emergency Departments and the collection and preservation of evidence by medical nurses in Emergency Departments. Both instances require evidence-based techniques and a familiarity with forensic procedures and are often performed by nurses who are not specifically trained in these areas. A case analysis demonstrates the value of an in depth and broad assessment of victim and perpetrator. Evidence based training and the application of structured clinical judgment used in the evaluation of victims and perpetrators make it possible for the FNP to provide expert testimony and to make recommendations for treatment.

  13. Best practice in forensic entomology--standards and guidelines.

    Science.gov (United States)

    Amendt, Jens; Campobasso, Carlo P; Gaudry, Emmanuel; Reiter, Christian; LeBlanc, Hélène N; Hall, Martin J R

    2007-03-01

    Forensic entomology, the use of insects and other arthropods in forensic investigations, is becoming increasingly more important in such investigations. To ensure its optimal use by a diverse group of professionals including pathologists, entomologists and police officers, a common frame of guidelines and standards is essential. Therefore, the European Association for Forensic Entomology has developed a protocol document for best practice in forensic entomology, which includes an overview of equipment used for collection of entomological evidence and a detailed description of the methods applied. Together with the definitions of key terms and a short introduction to the most important methods for the estimation of the minimum postmortem interval, the present paper aims to encourage a high level of competency in the field of forensic entomology.

  14. From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate

    OpenAIRE

    Dewald, Andreas; Freiling, Felix C.

    2014-01-01

    This paper draws a comparison of fundamental theories in traditional forensic science and the state of the art in current computer forensics, thereby identifying a certain disproportion between the perception of central aspects in common theory and the digital forensics reality. We propose a separation of what is currently demanded of practitioners in digital forensics into a rigorous scientific part on the one hand, and a more general methodology of searching and seizing digital evidence an...

  15. Forensic identification of skeletal remains from members of Ernesto Che Guevara's guerrillas in Bolivia based on DNA typing.

    Science.gov (United States)

    Lleonart, R; Riego, E; Saínz de la Peña, M V; Bacallao, K; Amaro, F; Santiesteban, M; Blanco, M; Currenti, H; Puentes, A; Rolo, F; Herrera, L; de la Fuente, J

    2000-01-01

    We report the positive identification of several members of the guerrillas led by Ernesto "Che" Guevara on the 1960 s in Bolivia by means of DNA fingerprinting. Successful DNA typing of both short tandem repeat loci and the hypervariable region of the human mitochondrial DNA was achieved after extracting total DNA from bones obtained from two burial sites. Given the size of the Cuban database for the STR allele frequencies, a conservative approach was followed to estimate the statistical significance of the genetic evidence. The estimated probabilities of paternity for the two cases in which the paternity logic was applied were higher than 99%. One case was analyzed using mitochondrial DNA and could not be excluded from the identity proposed by the forensic anthropology team. A fourth case was identified by exclusion, on the basis of the positive identification of the other remains, the historical and other anthropological evidence.

  16. [Double ritual murder by the Satanist cult members based on the casuistry of the Forensic Medicine Department in Katowice].

    Science.gov (United States)

    Chowaniec, Czesław; Jałfoński, Christian; Kabiesz-Neniczka, Stanisława; Kobek, Mariusz; Rygol, Krystian

    2006-01-01

    In recent years, an increased activity of various sects, especially Satanist ones, has been observed in Poland. This is associated with an increase in the number of various crimes, including offences against life and health. The ideology of Satanism came to Poland in the early eighties of the last century, along with heavy metal music and its variants. In 1999, two cases of the murders of a 21-year-old woman and a 19-year-old man committed by Satanist cult members during their ritual mass were reported at the Forensic Medicine Department in Katowice. In the report, the authors present some issues associated with Satanism, the circumstances of these two murders and the results of medico-legal examinations of the victims.

  17. Dental maturity in Belgian children using Demirjian's method and polynomial functions: new standard curves for forensic and clinical use.

    Science.gov (United States)

    Chaillet, N; Willems, G; Demirjian, A

    2004-12-01

    Dental maturity was studied from dental panoramic radiographs of 2523 Belgian children (1255 girls and 1268 boys) aged 2 to 18 years. The aim was to compare the efficiency of two methods of age prediction: Demirjian's method, using differently weighted scores, and polynomial functions. The two methods present some differences: Demirjian is used to determine the maturity score as a function of age and polynomial functions are used to determine age as a function of the maturity score. We present, for each method, gender-specific dental maturity tables and curves for Belgian children. Girls always present advanced dental maturity compared with boys. The polynomial functions are highly reliable (0.21% of incorrect classifications) and the percentile method, using Belgian weighted scores, is very accurate (+/- 2.08 years on average, between 2 and 16 years of age).

  18. Use of images for human identification in forensic dentistry; A utilizacao de imagens na identificacao humana em odontologia legal

    Energy Technology Data Exchange (ETDEWEB)

    Carvalho, Suzana Papile Maciel; Lopes-Junior, Cesar [Universidade de Sao Paulo (USP), Bauru, SP (Brazil). Faculdade de Odontologia], e-mail: sumaciel@uol.com.br; Silva, Ricardo Henrique Alves da [Universidade de Sao Paulo (USP), Ribeirao Preto, SP (Brazil). Faculdade de Odontologia; Peres, Arsenio Sales [Universidade de Sao Paulo (USP), Bauru, SP (Brazil). Faculdade de Odontologia. Dept. de Saude Coletiva

    2009-03-15

    The present systematic review article is aimed at describing radiological methods utilized for human identification in forensic dentistry. For this purpose, a literature review was undertaken, and out of 45 papers, 19 were selected in accordance with inclusion criteria. Several radiological techniques can be used to assist in both individual and general identification, including determination of gender, ethnic group and, mainly, age. The analysis of ante-mortem and post-mortem radiographic and tomographic images has become an essential tool for human identification in forensic dentistry, particularly with the refinement of techniques resulting from developments in the field of the radiology itself as well as the incorporation of information technology resources to the technique. It can be concluded that, based on an appropriate knowledge on the available methods, forensic dentists can choose the best method to achieve a successful identification with a careful application of the technique and accurate interpretation of data. (author)

  19. 基于网络的浏览器内容取证还原技术%Browser forensic and reconstruction based on network

    Institute of Scientific and Technical Information of China (English)

    王文奇; 潘恒; 郑秋生; 关云云

    2015-01-01

    For network data properties,the integrity rule of network forensic was specified.Based on the principles of browser accessing server,a forensic framework was proposed which collected evidence during a browser accessing the networks.In that framework,Hash function was designed,and a keyword match algorithm based on the Windows multi-cores mechanism was de-signed,which were used to collected crime evidence.A network data restoring and Web page restructuring algorithm was imple-mented using the regular expression.Results of the test show the proposed algorithms can restore complex Web pages.%针对网络数据的特点,定义网络数据取证的完整性规则;在分析浏览器访问服务器原理的基础上,提出针对浏览器访问网络过程取证的系统框架;设计哈希函数,利用 Windows 系统的多核机制设计关键词取证高效分析算法;根据TCP/IP 协议将网络数据还原到应用层,采用正则表达式搜索技术实现网页重构的算法。实测结果表明,该算法能够有效获取并还原用户的访问内容。

  20. Lip prints: Role in forensic odontology.

    Science.gov (United States)

    Dineshshankar, Janardhanam; Ganapathi, Nalliappan; Yoithapprabhunath, Thukanaykanpalayam Ragunathan; Maheswaran, Thangadurai; Kumar, Muniapillai Siva; Aravindhan, Ravi

    2013-06-01

    Identification plays a major role in any crime investigation. The pattern of wrinkles on the lips has individual characteristics like fingerprints. Cheiloscopy is a forensic investigation technique that deals with identification of humans based on lips traces. In the past decades, lip-print studies attracted the attention of many scientists as a new tool for human identification in both civil and criminal issues. The lip crease pattern is on the vermilion border of the lip, which is quite mobile and lip prints may vary in appearance according to the pressure, direction and method used in making the print. It concludes by enlightening the readers with the fact that the possibilities to use the red part of lips to identify a human being are wider than it is commonly thought.

  1. Lip prints: Role in forensic odontology

    Directory of Open Access Journals (Sweden)

    Janardhanam Dineshshankar

    2013-01-01

    Full Text Available Identification plays a major role in any crime investigation. The pattern of wrinkles on the lips has individual characteristics like fingerprints. Cheiloscopy is a forensic investigation technique that deals with identification of humans based on lips traces. In the past decades, lip-print studies attracted the attention of many scientists as a new tool for human identification in both civil and criminal issues. The lip crease pattern is on the vermilion border of the lip, which is quite mobile and lip prints may vary in appearance according to the pressure, direction and method used in making the print. It concludes by enlightening the readers with the fact that the possibilities to use the red part of lips to identify a human being are wider than it is commonly thought.

  2. Study of lip prints: A forensic study

    Directory of Open Access Journals (Sweden)

    Vikash Ranjan

    2014-01-01

    Full Text Available Background: Although several studies have been done on lip prints for human identification in forensic science, there is a doubt about their use in gender determination. Aims: The present study was designed to study the lip groove patterns in all the quadrants of both male and female subjects to identify the sex, based on the patterns of the grooves of the lip prints. Study Design: 300 lip prints were collected from volunteers of D. J. College of Dental Sciences and Research, Modinagar (UP. Materials and Methods: Lip prints were recorded with lip stick and transferred on to a glass slide. Statistical Analysis: Pearson chi-square test was adopted for statistical analysis and probability value (P value was calculated. Conclusion: In our study, none of the lip prints were identical, thus confirming the role of lip prints in individual identification. According to Suzuki′s classification, Type I, II, III and IV patterns were significant in gender determination.

  3. Digital forensic standards: international progress

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management has...

  4. World of Forensic Laboratory Testing

    Science.gov (United States)

    ... Global Sites Search Help? The World of Forensic Laboratory Testing Share this page: Was this page helpful? ... made-for-television lab scenario, real-life forensic laboratories' analyses of evidence are much slower. For example, ...

  5. Forensic microbiology and the bioterrorism risk (Part I

    Directory of Open Access Journals (Sweden)

    Maria Nasso

    2007-02-01

    Full Text Available The letters containing anthrax, sent in 2001 in USA, showed that pathogens and toxins can be effectively used for terrorist purposes. A new subfield of forensic science, called “microbial forensics”, has been developed. It is a new scientific discipline dedicated to collect and analyze microbiological evidence from a scene of crime. In addition to collecting and analyzing traditional forensic evidences, the microbial forensic investigation will attempt to determine the identity of the causal agent, as so as epidemiologic investigation, but with higher-resolution characterization. The tools for a successful attribution include genetically based-assays to determine the exact strain of isolate, aiming the individualization of the source of the pathogen used in a biological weapon. Following the 2001 anthrax attacks, genotyping of B. anthracis was done on 8 variable number tandem repeats loci (VNTR polymorphisms, with multilocus variable number tandem repeats (MLVA method. In recent years some research groups have increased the VNTR markers number to 25 loci, while other groups have identified single nucleotide repeat (SNR polymorphisms, which display very high mutation rates. SNR marker system allows the distinguishing of isolates with extremely low levels of genetic diversity within the same MLVA genotype.

  6. Analysis of transferred fragrance and its forensic implications.

    Science.gov (United States)

    Gherghel, Simona; Morgan, Ruth M; Blackman, Christopher S; Karu, Kersti; Parkin, Ivan P

    2016-12-01

    Perfumes are widely used by many people in developed countries, and a large number of both men and women wear perfumes on a daily basis. Analysis of perfume trace materials from clothing is not commonly employed within forensic casework, yet as a form of trace evidence it has the potential to provide valuable intelligence. In order to appreciate the value of trace evidence there is a fundamental need for an evidence base that can both offer insight into how a trace material behaves under different scenarios and activities, and from which inferences can be made. With this purpose a gas chromatography-mass spectrometry method for trace analysis of perfumes was developed. This paper presents two different series of experiments that investigate the dynamics of perfume transfer as a factor of perfume ageing time, and as a factor of perfume contact time. Empirical data showed that both perfume ageing time, and perfume contact time play a key role in the number of perfume components transferred. These studies have implication for forensic protocols, specifically for perfume trace evidence collection, analysis, interpretation, and presentation, and there is potentially great value in analysing perfumes from clothing exhibits in forensic enquiries that involve close contact between individuals, such as sexual assaults. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  7. 基于云模式的媒体取证服务体系研究%Cloud-based Architecture for Media Forensics

    Institute of Scientific and Technical Information of China (English)

    惠雯; 林闯; 赵海英; 杨扬

    2011-01-01

    Current researches about media forensics face the following key challenges: heterogeneity,scalability,and efficiency. We proposed a new computing paradigm for media forensics,called "Media Forensics Cloud", which integrates the concept of cloud computing to handle large-scale media forensics service effectively. To address the above challenges, first, we presented a layered architecture of Media Forensics Cloud, which can provide efficient and scalable media forensics service. Then we presented the key technologies of Media Forensics Cloud, namely resource virtualization, forensic task parallelization,and service adaptation, by which users can efficiently access media forensics service from different terminals at anytime anywhere. Lastly, we presented a key study of Media Forensics Cloud to demonstrate the feasibility of our design.%根据现有媒体取证系统所面临的问题,结合云计算的思想,提出了基于云模式的媒体取证服务体系.针对大规模媒体取证服务所面临的异构性、可扩展性和效率问题等几大挑战,利用层次结构模型方法,创造性地提出了三层媒体取证服务体系架构模型,详细阐述了该模型所涉及的关键技术,即资源虚拟化、系统任务并行化和自适应能力,最后给出了应用实例及分析.

  8. Forensic entomology and main challenges in Brazil.

    Science.gov (United States)

    Gomes, Leonardo; Von Zuben, Cláudio J

    2006-01-01

    Apart from an early case report from China (13th century), the first observations on insects and other arthropods as forensic indicators were documented in Germany and France during mass exhumations in the 1880s by Reinhard, who is considered a co-founder of the discipline. After the French publication of Mégnin's popular book on the applied aspects of forensic entomology, the concept quickly spread to Canada and United States. At that time, researchers recognized that the lack of systematic observations of insects of forensic importance jeopardized their use as indicators of postmortem interval. General advances in insect taxonomy and ecology helped to fill this gap over the following decades. After World Wars, few forensic entomology cases were reported in the scientific literature. From 1960s to the 1980s, Leclercq and Nuorteva were primarily responsible for maintaining the method in Central Europe, reporting isolated cases. Since then, basic research in the USA, Russia and Canada opened the way to the routine use of Entomology in forensic investigations. Identifications of insects associated with human cadavers are relatively few in the literature of the Neotropical region and have received little attention in Brazil. This article brings an overview of historic developments in this field, the recent studies and the main problems and challenges in South America and mainly in Brazil.

  9. Molecular Forensic Profiling of Cryptosporidium Species and Genotypes in Raw Water

    OpenAIRE

    Ruecker, Norma J.; Bounsombath, Niravanh; Wallis, Peter; Ong, Corinne S.L.; Isaac-Renton, Judith L.; Neumann, Norman F.

    2005-01-01

    The emerging concept of host specificity of Cryptosporidium spp. was exploited to characterize sources of fecal contamination in a watershed. A method of molecular forensic profiling of Cryptosporidium oocysts on microscope slides prepared from raw water samples processed by U.S. Environmental Protection Agency Method 1623 was developed. The method was based on a repetitive nested PCR-restriction fragment length polymorphism-DNA sequencing approach that permitted the resolution of multiple sp...

  10. Molecular forensic profiling of Cryptosporidium species and genotypes in raw water.

    Science.gov (United States)

    Ruecker, Norma J; Bounsombath, Niravanh; Wallis, Peter; Ong, Corinne S L; Isaac-Renton, Judith L; Neumann, Norman F

    2005-12-01

    The emerging concept of host specificity of Cryptosporidium spp. was exploited to characterize sources of fecal contamination in a watershed. A method of molecular forensic profiling of Cryptosporidium oocysts on microscope slides prepared from raw water samples processed by U.S. Environmental Protection Agency Method 1623 was developed. The method was based on a repetitive nested PCR-restriction fragment length polymorphism-DNA sequencing approach that permitted the resolution of multiple species/genotypes of Cryptosporidium in a single water sample.

  11. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large.

  12. Molecular forensic science analysis of nuclear materials

    Science.gov (United States)

    Reilly, Dallas David

    Concerns over the proliferation and instances of nuclear material in the environment have increased interest in the expansion of nuclear forensics analysis and attribution programs. A new related field, molecular forensic science (MFS) has helped meet this expansion by applying common scientific analyses to nuclear forensics scenarios. In this work, MFS was applied to three scenarios related to nuclear forensics analysis. In the first, uranium dioxide was synthesized and aged at four sets of static environmental conditions and studied for changes in chemical speciation. The second highlighted the importance of bulk versus particle characterizations by analyzing a heterogeneous industrially prepared sample with similar techniques. In the third, mixed uranium/plutonium hot particles were collected from the McGuire Air Force Base BOMARC Site and analyzed for chemical speciation and elemental surface composition. This work has identified new signatures and has indicated unexpected chemical behavior under various conditions. These findings have lead to an expansion of basic actinide understanding, proof of MFS as a tool for nuclear forensic science, and new areas for expansion in these fields.

  13. Forensic bitemark identification: weak foundations, exaggerated claims

    Science.gov (United States)

    Saks, Michael J.; Albright, Thomas; Bohan, Thomas L.; Bierer, Barbara E.; Bowers, C. Michael; Bush, Mary A.; Bush, Peter J.; Casadevall, Arturo; Cole, Simon A.; Denton, M. Bonner; Diamond, Shari Seidman; Dioso-Villa, Rachel; Epstein, Jules; Faigman, David; Faigman, Lisa; Fienberg, Stephen E.; Garrett, Brandon L.; Giannelli, Paul C.; Greely, Henry T.; Imwinkelried, Edward; Jamieson, Allan; Kafadar, Karen; Kassirer, Jerome P.; Koehler, Jonathan ‘Jay’; Korn, David; Mnookin, Jennifer; Morrison, Alan B.; Murphy, Erin; Peerwani, Nizam; Peterson, Joseph L.; Risinger, D. Michael; Sensabaugh, George F.; Spiegelman, Clifford; Stern, Hal; Thompson, William C.; Wayman, James L.; Zabell, Sandy; Zumwalt, Ross E.

    2016-01-01

    Abstract Several forensic sciences, especially of the pattern-matching kind, are increasingly seen to lack the scientific foundation needed to justify continuing admission as trial evidence. Indeed, several have been abolished in the recent past. A likely next candidate for elimination is bitemark identification. A number of DNA exonerations have occurred in recent years for individuals convicted based on erroneous bitemark identifications. Intense scientific and legal scrutiny has resulted. An important National Academies review found little scientific support for the field. The Texas Forensic Science Commission recently recommended a moratorium on the admission of bitemark expert testimony. The California Supreme Court has a case before it that could start a national dismantling of forensic odontology. This article describes the (legal) basis for the rise of bitemark identification and the (scientific) basis for its impending fall. The article explains the general logic of forensic identification, the claims of bitemark identification, and reviews relevant empirical research on bitemark identification—highlighting both the lack of research and the lack of support provided by what research does exist. The rise and possible fall of bitemark identification evidence has broader implications—highlighting the weak scientific culture of forensic science and the law's difficulty in evaluating and responding to unreliable and unscientific evidence. PMID:28852538

  14. Eponyms in forensic pathology.

    Science.gov (United States)

    Nečas, Pavel; Hejna, Petr

    2012-12-01

    The phenomenon of eponymous terms in forensic pathology is described in this paper. The authors analyzed representative textbooks (monographs) dealing with forensic pathology in both English and German and identified several eponymous terms. The paper aims to present to the reader the most important eponymous terms in forensic pathology. Included in the paper are the following terms: Beckwith's Sign, Casper's Rule, Krönlein's Shot, Lichtenberg's Figures, Nysten's Law, Paltauf's Spots, Puppe's Rule, Sehrt's Sign, Simon's Sign, Sveshnikov's Sign, Tardieu's Spots, Wischnewski Spots, Wydler's Sign. The spread of eponymous terms throughout various languages is mentioned. The linguistic basis of such terms as well as their advantages and disadvantages in specialist fields, and indeed in even wider circles, is discussed. The authors state that the main function of these terms is to facilitate the open flow of unambiguous information among scholars. Eponymous terms in forensic pathology are characteristic for the German speaking countries and for all countries influenced by the German school of forensic pathology. Their usage in the Anglo-Saxon world is much less widespread, meaning they do not occur very often in English monographs and textbooks.

  15. Next-Generation STR Genotyping Kits for Forensic Applications.

    Science.gov (United States)

    Mulero, J J; Hennessy, L K

    2012-01-01

    Forensic DNA typing has been a constantly evolving field driven by innovations from academic laboratories as well as kit manufacturers. Central to these technological advances has been the transition from multilocus-probe restriction fragment length polymorphism (RFLP) methods to short tandem repeat (STR) PCR-based assays. STRs are now the markers of choice for forensic DNA typing and a wide variety of commercial STR kits have been designed to meet the various needs of a forensic lab. This review provides an overview of the commercial STR kits made available since the year 2000 and explains the rationale for creating these kits. Substantial progress has been made in key areas such as sample throughput, speed, and sensitivity. For example, a significant advancement for databasing labs was the capability of direct amplification from a blood or buccal sample without need for DNA extraction or purification, enabling increased throughput. Other key improvements are greater tolerance for inhibitors (e.g., humic acid, hematin, and tannic acid) present in evidence samples, PCR cycling times decreased by 1-1.5 h, and greater sensitivity with improved buffer components and thermal cycling conditions. These improvements that have been made over the last 11 years have enhanced the ability of forensic laboratories to obtain a DNA profile from more challenging samples. However, with the proliferation of kits from different vendors the primer binding sequences of the loci vary, which could result in discordant events that would need to be resolved either via a database-driven software solution or simply by evaluating discordant samples with multiple kits.

  16. Specialty Guidelines for Forensic Psychology

    Science.gov (United States)

    American Psychologist, 2013

    2013-01-01

    In the past 50 years forensic psychological practice has expanded dramatically. Because the practice of forensic psychology differs in important ways from more traditional practice areas (Monahan, 1980) the "Specialty Guidelines for Forensic Psychologists" were developed and published in 1991 (Committee on Ethical Guidelines for Forensic…

  17. Specialty Guidelines for Forensic Psychology

    Science.gov (United States)

    American Psychologist, 2013

    2013-01-01

    In the past 50 years forensic psychological practice has expanded dramatically. Because the practice of forensic psychology differs in important ways from more traditional practice areas (Monahan, 1980) the "Specialty Guidelines for Forensic Psychologists" were developed and published in 1991 (Committee on Ethical Guidelines for Forensic…

  18. Forensics on a Shoestring Budget

    Science.gov (United States)

    Greco, Joseph A.

    2005-01-01

    In recent years, forensic science has gained popularity thanks in part to high-profile court cases and television programs. Although the cost of forensic equipment and supplies may initially seem too expensive for the typical high school classroom, the author developed an activity that incorporates forensics into her 10th-grade biology curriculum…

  19. Detached Concern of Forensic Mental Health Nurses in Therapeutic Relationships With Patients: The Application of the Early Recognition Method Related to Detached Concern

    NARCIS (Netherlands)

    Fluttert, F.A.J.; Meijel, B.K.G. van; Nijman, H.L.I.; Björkly, S.; Grypdonck, M.H.F.

    2010-01-01

    Objective - Improvement of the interaction between forensic mental health nurses and patients may lead to a reduction of inpatient violence. The concept under study is detached concern, which refers to nurses' skills to neutralize the emotional appeal of patients by a balanced attitude between objec

  20. Detached Concern of Forensic Mental Health Nurses in Therapeutic Relationships With Patients: The Application of the Early Recognition Method Related to Detached Concern

    NARCIS (Netherlands)

    Fluttert, F.A.J.; Meijel, B.K.G. van; Nijman, H.L.I.; Björkly, S.; Grypdonck, M.H.F.

    2010-01-01

    Objective - Improvement of the interaction between forensic mental health nurses and patients may lead to a reduction of inpatient violence. The concept under study is detached concern, which refers to nurses' skills to neutralize the emotional appeal of patients by a balanced attitude between

  1. A High-Performance Liquid Chromatographic–Tandem Mass Spectrometric Method for the Determination of Ethyl Glucuronide and Ethyl Sulfate in Urine Validated According to Forensic Guidelines

    Science.gov (United States)

    Albermann, M.E.; Musshoff, F.; Madea, B.

    2012-01-01

    Ethyl glucuronide (EtG) and ethyl sulfate (EtS) are powerful markers for alcohol intake and abuse. Several analytical procedures for the quantification of EtG and EtG in serum and urine have been developed so far. Many of the published methods show limits of detections (LODs) or limits of quantifications (LOQs) for EtG in urine within the range of 0.1 mg/L or higher. Since this is the actual cutoff value for proving abstinence in Germany, problems may occur if urine samples are highly diluted. In this paper, the validation of a highly sensitive, fast and simple LC–MS–MS for the determination of EtG and EtS in urine is described. The calibration curves for EtG and EtS is linear over the whole range (0.025–2.0 mg/L). Very low detection limits can be achieved (LOD: EtG 0.005 mg/L, EtS 0.005 mg/L; and LOQ: EtG 0.019 mg/L, EtS 0.015 mg/L). All data for selectivity, precision and accuracy, recovery, as well as for the processed sample and the freeze/thaw stability, comply with the guidelines of the German Society of Toxicological and Forensic Chemistry. Strong matrix-related effects can be compensated for by using an internal standard. Finally, the applicability of the procedure is proven by analysis of 87 human urine samples and by successful participation in interlaboratory comparison tests. PMID:22291056

  2. The evaluation of forensic cases reported due to food poisoning

    Directory of Open Access Journals (Sweden)

    Beyza Urazel

    2014-03-01

    Full Text Available Objective: In this study it is aimed to examine forensic food poisoning cases and to evaluate the clinical presentation of food poisoning in people within the context of forensic medicine. Methods: In the study, 215 food poisoning cases are evaluated, which applied to the forensic medicine branch office in our city between 01.01.2007 and 31.12.2011. The forensic reports and forensic investigations of these cases are analyzed retrospectively. The cases are examined in terms of gender, age, the type of food consumed, the treatment applied and the result of the forensic report. Results: It is determined that in 83 cases (38.6% food poisoning was caused by chicken products, and in 178 cases (82.8% the poisoned people were students. In 3 cases (1.4% the poisoning was life threatening. For 75 cases (34.9% no forensic report was prepared in emergency service and among the 140 cases for which a forensic report was prepared, only 3 of the reports were prepared in a correct manner. Conclusions: It is determined that the demographic data of the cases complies with the city where the study was conducted. It is found out that in emergency services the food poisoning cases are usually misevaluated.

  3. History, research and practice of forensic anthropology in Thailand.

    Science.gov (United States)

    Traithepchanapai, Pongpon; Mahakkanukrauh, Pasuk; Kranioti, Elena F

    2016-04-01

    Forensic anthropology is an increasingly developing discipline born about a century ago in the United States with the objective to contribute the knowledge of bone biology and physical anthropology to the emerging needs of the court of law. The development of research in biological and forensic anthropology has made rapid progress worldwide in the past few years, however, in most countries--with the exception of the United States--forensic anthropology work is still considered within the duties of the forensic pathologist. This paper attempts to summarise the history and development of forensic anthropology in Thailand by providing information on past and current research and practice that can help forensic practitioners to apply existing methods in forensic cases and mass disasters. It is hoped that the lessons learned from the tsunami catastrophe and the emerging need for positive identification in medicolegal settings will lead to rapid advances in education, training and professional engagement of anthropologists from the forensic departments and the law enforcement agencies in Thailand.

  4. The Veterinary Forensic Necropsy: A Review of Procedures and Protocols.

    Science.gov (United States)

    Brownlie, H W Brooks; Munro, R

    2016-09-01

    Investigation of animal-related crime, and therefore submission of forensic cases to veterinary pathology facilities, is increasing, yet many veterinary pathologists are unfamiliar and often uncomfortable with involvement in the forensic necropsy. This article discusses various aspects of the forensic necropsy without specific attention to any particular species group or crime. General advice is given on procedures, documentation, and recording of the examination, and the article indicates how these features may differ from those used in investigation of natural disease. It also discusses evidence management, including recordkeeping, identification of evidence, labeling of photographs, and use of standard operating procedures and protocols. Various written and visual methods for documentation of the forensic necropsy are covered, and adjunctive topics such as sample collection, assessment, and description of wounds and taphonomy are included. Cause, mechanism, and manner of death are defined, and guidance to the use of these terms is given. The aim of this article is to offer guidance on procedural aspects of the forensic necropsy that will help those developing their forensic services, contribute to standardization of the provision of forensic veterinary pathology, and build the confidence of the "uncomfortable" forensic veterinary pathologist.

  5. A status report on the practice of forensic neuropsychology.

    Science.gov (United States)

    Heilbronner, Robert L

    2004-05-01

    The practice of forensic neuropsychology has experienced tremendous growth over the past two decades, becoming perhaps the most rapidly expanding area of practice within the field of clinical neuropsychology. Indeed, there have been many important advancements in the field that have helped to position neuropsychologists as instrumental participants within the forensic arena. Yet, there is currently no consensus in our field regarding what constitutes competency in forensic neuropsychology and also no specific guidelines or standards of practice to inform neuropsychologists about how to operate in the forensic arena. There are even fewer safeguards to protect the public from questionable methods of practice. This article provides a status report on the practice of forensic neuropsychology. It employs a framework emphasized by Otto and Heilbrun (2002) in their assessment of the field of forensic psychology. Emphasis is directed toward identifying recent advances in the field and documenting some of the inherent flaws and weaknesses in forensic practice to help advance the practice of forensic neuropsychology toward a more established specialty area.

  6. Evaluating genetic traceability methods for captive-bred marine fish and their applications in fisheries management and wildlife forensics

    DEFF Research Database (Denmark)

    Bylemans, Jonas; Maes, Gregory E.; Diopere, Eveline

    2016-01-01

    Growing demands for marine fish products is leading to increased pressure on already depleted wild populations and a rise in aquaculture production. Consequently, more captive-bred fish are released into the wild through accidental escape or deliberate releases. The increased mixing of captive...... the implementation of a case-by-case strategy when choosing the best method....

  7. A fast and reliable method for GHB quantitation in whole blood by GC-MS/MS (TQD) for forensic purposes.

    Science.gov (United States)

    Castro, André L; Tarelho, Sónia; Dias, Mário; Reis, Flávio; Teixeira, Helena M

    2016-02-01

    Gamma-hydroxybutyric acid (GHB) is an endogenous compound with a story of clinical use since the 1960s. However, due to its secondary effects, it has become a controlled substance, entering the illicit market. A fully validated, sensitive and reproducible method for the quantification of GHB by methanolic precipitation and GC-MS/MS (TQD) in whole blood is presented. Using 100μL of whole blood, obtained results included a LOD and LLOQ of 0.1mg/L and a recovery of 86% in a working range between 0.1 and 100mg/L. This method is sensitive and specific to detect the presence of GHB in small amounts of whole blood (both ante-mortem or post-mortem), and is, to the authors' knowledge, the first GC-MS-MS TQD method that uses different precursor ions and product ions for the identification of GHB and GHB-D6 (internal standard). Hence, this method may be especially useful for the study of endogenous values in this biological sample.

  8. Biosensors in forensic analysis. A review.

    Science.gov (United States)

    Yáñez-Sedeño, P; Agüí, L; Villalonga, R; Pingarrón, J M

    2014-05-01

    Forensic analysis is an important branch of modern Analytical Chemistry with many legal and socially relevant implications. Biosensors can play an important role as efficient tools in this field considering their well known advantages of sensitivity, selectivity, easy functioning, affordability and capability of miniaturization and automation. This article reviews the latest advances in the use of biosensors for forensic analysis. The different methodologies for the transduction of the produced biological events are considered and the applications to forensic toxicological analysis, classified by the nature of the target analytes, as well as those related with chemical and biological weapons critically commented. The article provides several Tables where the more relevant analytical characteristics of the selected reported methods are gathered. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Developing a Forensic Continuous Audit Model

    Directory of Open Access Journals (Sweden)

    Grover S. Kearns

    2011-06-01

    Full Text Available Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as an effective tool to support the audit function, meet management’s regulatory objectives, and to combat fraud. An approach to developing such a system is presented.

  10. Forensic terrestrial photogrammetry from a single image.

    Science.gov (United States)

    Gonzalez-Aguilera, Diego; Gomez-Lahoz, Javier

    2009-11-01

    Forensic terrestrial photogrammetry is one of the most valuable and low-cost resources of spatial data available today. Due to the ephemeral crime scene characteristics, these photographs can often capture information that is never to be seen again. This paper presents a novelty approach for the documentation, analysis, and visualization of crime scenes for which only a single perspective image is available. The photogrammetric process consists of a few well-known steps in close-range photogrammetry: features extraction, vanishing points computation, camera self-calibration, 3D metric reconstruction, dimensional analysis, and interactive visualization. Likewise, the method incorporates a quality control of the different steps accomplished sequentially. As a result, several cases of study are presented in the experimental results section in order to test their viability. The full approach can be applied easily through the free software, sv3DVision, which has been evaluated by a number of police officers, forensic scientists, and forensic educators satisfactorily.

  11. Research about Computer Forensics Technology'based on System Log%基于系统日志的计算机取证技术的分析研究

    Institute of Scientific and Technical Information of China (English)

    马玉龙; 赵太祥; 周雨

    2012-01-01

    With the development of computer network technology, people pay more and more attention on computer network security. Computer forensics technology develops in this context. It's goal is the forensic analysis of criminal acts that occurred in the computer systems and computer networks, and access to the invasion of electronic evidence. This paper describes the computer forensics technology, focusing on computer forensics technology that is based on the system log.%随着计算机网络技术的发展,计算机网络安全越来越受到人们的关注和重视。计算机取证技术正是在这种背景下发展起来的,它的目标就是对计算机系统和计算机网络中发生的犯罪行为进行取证分析,获取入侵事件的电子证据。本文主要介绍了计算机取证技术,重点研究了基于系统日志的计算机取证技术。

  12. [Incest--forensic genetic approach].

    Science.gov (United States)

    Raczek, Ewa

    2012-01-01

    The paper presents intimate relationships between biologically and legally close relatives, complicated in the social, culture and religion perspective. (art. 201 of the Penal Code), but it chiefly addresses problems associated with giving opinion on the fatherhood towards the incestuous child. The report calls for a broader interest in this issue from expert witnesses in forensic genetics, as well as encourages them to publish examples taken from their own professional experience that may unquestionably be helpful to other practitioners in this field and above all will lead to extending educational methods related to widely understood DNA analysis in giving an opinion on arguable fatherhood.

  13. Forensic 3D documentation of skin injuries

    DEFF Research Database (Denmark)

    Villa, Chiara

    2017-01-01

    An accurate and precise documentation of injuries is fundamental in a forensic pathological context. Photographs and manual measurements are taken of all injuries during autopsies, but ordinary photography projects a 3D wound on a 2D space. Using technologies such as photogrammetry, it is possible...... methods (p > 0.05). The results of intra- and inter-observer tests indicated perfect agreement between the observers with mean value differences of ≤ 0.02 cm. This study demonstrated the validity of using photogrammetry for documentation of injuries in a forensic pathological context. Importantly...

  14. Forensic SNP genotyping with SNaPshot

    DEFF Research Database (Denmark)

    Fondevila, M; Børsting, C; Phillips, C

    2017-01-01

    This review explores the key factors that influence the optimization, routine use, and profile interpretation of the SNaPshot single-base extension (SBE) system applied to forensic single-nucleotide polymorphism (SNP) genotyping. Despite being a mainly complimentary DNA genotyping technique...... to routine STR profiling, use of SNaPshot is an important part of the development of SNP sets for a wide range of forensic applications with these markers, from genotyping highly degraded DNA with very short amplicons to the introduction of SNPs to ascertain the ancestry and physical characteristics...... of an unidentified contact trace donor. However, this technology, as resourceful as it is, displays several features that depart from the usual STR genotyping far enough to demand a certain degree of expertise from the forensic analyst before tackling the complex casework on which SNaPshot application provides...

  15. Column: File Cabinet Forensics

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2011-12-01

    Full Text Available Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky, the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering.(see PDF for full column

  16. Development of a computer-assisted forensic radiographic identification method using the lateral cervical and lumbar spine.

    Science.gov (United States)

    Derrick, Sharon M; Raxter, Michelle H; Hipp, John A; Goel, Priya; Chan, Elaine F; Love, Jennifer C; Wiersema, Jason M; Akella, N Shastry

    2015-01-01

    Medical examiners and coroners (ME/C) in the United States hold statutory responsibility to identify deceased individuals who fall under their jurisdiction. The computer-assisted decedent identification (CADI) project was designed to modify software used in diagnosis and treatment of spinal injuries into a mathematically validated tool for ME/C identification of fleshed decedents. CADI software analyzes the shapes of targeted vertebral bodies imaged in an array of standard radiographs and quantifies the likelihood that any two of the radiographs contain matching vertebral bodies. Six validation tests measured the repeatability, reliability, and sensitivity of the method, and the effects of age, sex, and number of radiographs in array composition. CADI returned a 92-100% success rate in identifying the true matching pair of vertebrae within arrays of five to 30 radiographs. Further development of CADI is expected to produce a novel identification method for use in ME/C offices that is reliable, timely, and cost-effective.

  17. Nuclear Forensic Inferences Using Iterative Multidimensional Statistics

    Energy Technology Data Exchange (ETDEWEB)

    Robel, M; Kristo, M J; Heller, M A

    2009-06-09

    Nuclear forensics involves the analysis of interdicted nuclear material for specific material characteristics (referred to as 'signatures') that imply specific geographical locations, production processes, culprit intentions, etc. Predictive signatures rely on expert knowledge of physics, chemistry, and engineering to develop inferences from these material characteristics. Comparative signatures, on the other hand, rely on comparison of the material characteristics of the interdicted sample (the 'questioned sample' in FBI parlance) with those of a set of known samples. In the ideal case, the set of known samples would be a comprehensive nuclear forensics database, a database which does not currently exist. In fact, our ability to analyze interdicted samples and produce an extensive list of precise materials characteristics far exceeds our ability to interpret the results. Therefore, as we seek to develop the extensive databases necessary for nuclear forensics, we must also develop the methods necessary to produce the necessary inferences from comparison of our analytical results with these large, multidimensional sets of data. In the work reported here, we used a large, multidimensional dataset of results from quality control analyses of uranium ore concentrate (UOC, sometimes called 'yellowcake'). We have found that traditional multidimensional techniques, such as principal components analysis (PCA), are especially useful for understanding such datasets and drawing relevant conclusions. In particular, we have developed an iterative partial least squares-discriminant analysis (PLS-DA) procedure that has proven especially adept at identifying the production location of unknown UOC samples. By removing classes which fell far outside the initial decision boundary, and then rebuilding the PLS-DA model, we have consistently produced better and more definitive attributions than with a single pass classification approach. Performance of the

  18. Forensic perioperative nursing. Advocates for justice.

    Science.gov (United States)

    Carrigan, M; Collington, P; Tyndall, J

    2000-12-01

    Facts and evidence have been negated or lost by the inexperience of health care professionals who are not cognizant of the legal requirements concerning potential criminal cases. In the perioperative setting, policy and procedure should provide guidelines for potential criminal cases based on the key concepts and principles of forensic science. Potential forensic cases and traumatic injuries are not limited to major health care centres. All hospitals should have policies and procedures which outline: traumatic injuries/death, staff responsibilities, details of collecting evidence, documentation, chain of custody. The procedure should also include care of victims, suspected perpetrators as well as family/persons accompanying patient.

  19. 3D imaging in forensic odontology.

    Science.gov (United States)

    Evans, Sam; Jones, Carl; Plassmann, Peter

    2010-06-16

    This paper describes the investigation of a new 3D capture method for acquiring and subsequent forensic analysis of bite mark injuries on human skin. When documenting bite marks with standard 2D cameras errors in photographic technique can occur if best practice is not followed. Subsequent forensic analysis of the mark is problematic when a 3D structure is recorded into a 2D space. Although strict guidelines (BAFO) exist, these are time-consuming to follow and, due to their complexity, may produce errors. A 3D image capture and processing system might avoid the problems resulting from the 2D reduction process, simplifying the guidelines and reducing errors. Proposed Solution: a series of experiments are described in this paper to demonstrate that the potential of a 3D system might produce suitable results. The experiments tested precision and accuracy of the traditional 2D and 3D methods. A 3D image capture device minimises the amount of angular distortion, therefore such a system has the potential to create more robust forensic evidence for use in courts. A first set of experiments tested and demonstrated which method of forensic analysis creates the least amount of intra-operator error. A second set tested and demonstrated which method of image capture creates the least amount of inter-operator error and visual distortion. In a third set the effects of angular distortion on 2D and 3D methods of image capture were evaluated.

  20. Method for gesture based modeling

    DEFF Research Database (Denmark)

    2006-01-01

    A computer program based method is described for creating models using gestures. On an input device, such as an electronic whiteboard, a user draws a gesture which is recognized by a computer program and interpreted relative to a predetermined meta-model. Based on the interpretation, an algorithm...... is assigned to the gesture drawn by the user. The executed algorithm may, for example, consist in creating a new model element, modifying an existing model element, or deleting an existing model element....

  1. [Gunshot wounds: forensic pathology].

    Science.gov (United States)

    Lorin de la Grandmaison, Geoffroy

    2012-02-01

    Gunshot wounds are among the most complex traumatic lesions encountered in forensic pathology. At the time of autopsy, careful scrutiny of the wounds is essential for correct interpretation of the lesions. Complementary pathological analysis has many interests: differentiation between entrance and exit wounds, estimation of firing distance, differentiation between vital and post mortem wounds and wounds dating. In case of multiple headshots, neuropathological examination can provide arguments for or against suicide. Sampling of gunshot wounds at autopsy must be systematic. Pathological data should be confronted respectively to autopsy and death scene investigation data and also ballistic studies. Forensic pathologist must be aware of the limits of optic microscopy.

  2. An Analysis of Forensic Imaging in the Absence of Write-Blockers

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2014-09-01

    Full Text Available Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker are immediate suspect for integrity. This paper describes a research framework to examine what occurs when a forensic image is acquired without benefit of a write-blocker in order to understand the true impact of such an eventuality. The initial tests document the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.

  3. La geomatica forense e il Forensic GIS

    Directory of Open Access Journals (Sweden)

    Renzo Carlucci

    2013-03-01

    Full Text Available La Conferenza ASITA 2012, tenutasi lo scorso novembre a Vicenza, ha rivelato una piacevole sorpresa con unasessione speciale che ha visto magistrati, avvocati e geomatici coinvolti per discutere l'aspetto relativo all’impattodella determinazione scientifica in iter giudiziari quali i contesti investigativi e processuali.AbstractIn the ASITA Conference 2012, held last November in Vicenza,a special session on “Forensic geomatics”, with judges and lawyers involved to discuss a very important aspect about the impact of scientific geomatics determinations arising during the judicial process of contexts analysis and investigative proceedings. 

  4. Towards a consensus Y-chromosomal phylogeny and Y-SNP set in forensics in the next-generation sequencing era.

    Science.gov (United States)

    Larmuseau, Maarten H D; Van Geystelen, Anneleen; Kayser, Manfred; van Oven, Mannis; Decorte, Ronny

    2015-03-01

    Currently, several different Y-chromosomal phylogenies and haplogroup nomenclatures are presented in scientific literature and at conferences demonstrating the present diversity in Y-chromosomal phylogenetic trees and Y-SNP sets used within forensic and anthropological research. This situation can be ascribed to the exponential growth of the number of Y-SNPs discovered due to mostly next-generation sequencing (NGS) studies. As Y-SNPs and their respective phylogenetic positions are important in forensics, such as for male lineage characterization and paternal bio-geographic ancestry inference, there is a need for forensic geneticists to know how to deal with these newly identified Y-SNPs and phylogenies, especially since these phylogenies are often created with other aims than to carry out forensic genetic research. Therefore, we give here an overview of four categories of currently used Y-chromosomal phylogenies and the associated Y-SNP sets in scientific research in the current NGS era. We compare these categories based on the construction method, their advantages and disadvantages, the disciplines wherein the phylogenetic tree can be used, and their specific relevance for forensic geneticists. Based on this overview, it is clear that an up-to-date reduced tree with a consensus Y-SNP set and a stable nomenclature will be the most appropriate reference resource for forensic research. Initiatives to reach such an international consensus are therefore highly recommended.

  5. A simple and inexpensive molecular method for sexing and identification of the forensic samples of elephant origin.

    Science.gov (United States)

    Gupta, Sandeep K; Thangaraj, Kumarasamy; Singh, Lalji

    2006-07-01

    The population of the Asian elephant is being dramatically reduced due to poaching of the ivory from the male. As poaching occurs in remote forests, it often takes weeks or longer for it to be discovered and it is therefore often very difficult to determine the sex of the decomposed body. Data suggest that in the recent past, over 2000 male elephants have been poached in South India. We have developed a technique based on molecular markers to determine that the carcass is an elephant and that it is a male. Using DNA sequence information from Genbank, we have developed two primer pairs: one for the mitochondrial DNA (mtDNA) and the other for the sex-determining region of Y chromosome (SRY) gene of the Indian elephant. After PCR amplification of known elephant DNA, we found that the mtDNA was common in both males and females, whereas the SRY-specific amplicon was observed only in the male.

  6. Entropy-based benchmarking methods

    NARCIS (Netherlands)

    Temurshoev, Umed

    2012-01-01

    We argue that benchmarking sign-volatile series should be based on the principle of movement and sign preservation, which states that a bench-marked series should reproduce the movement and signs in the original series. We show that the widely used variants of Denton (1971) method and the growth pre

  7. [Development of a method for estimation of citalopram and desmethylcitalopram in nails and hair and its usefulness in forensic toxicology].

    Science.gov (United States)

    Pufal, Ewa; Sykutera, Marzena; Nowacka, Teresa; Stefanowicz, Anna; Sliwka, Karol

    2010-01-01

    The report presents the possibility of using an alternative material of determining citalopram and its metabolite (desmethylcitalopram) in hair and nails. Citalopram (Cipramil, Citaratio, Citaxin, Oropram, Cital, Cilon, Aurex) is an antidepressant drug of the selective serotonin reuptake inhibitor (SSRI) class, employed in treatment of depression, prevention of depressive disorders recurrence and in some anxiety disorders. The investigations were performed using liquid chromatography coupled with electrospray-ionization mass spectrophotometry (LC-ESI-MS). In the course of the study, the authors developed a method for isolation and identification of Citaprolam and its metabolite (desmethylcitaprolam) from hair and nails. Determination were performed in hair and nail samples collected from individuals who had been administered citalopram in therapeutic doses at least for 12 months before sample collection. Hair and nail samples were obtained 4, 6, 9 and 15 months after discontinuing drug administration. The concentration of citalopram in nails was 0.40-10.49 ng/mg and the concentration of desmethylcitalopram was 0.32-3.70 ng/mg. In hair, citalopram concentration was 1.04-8.69 ng/mg and for desmethylcitalopram, the concentration range was 0.07-1.27 ng/mg.

  8. 移动数字取证技术%Mobile Forensics Technology

    Institute of Scientific and Technical Information of China (English)

    丁丽萍; 岳晓萌; 李彦峰

    2015-01-01

    In this paper, we suggest that current smart mobile digital forensics technology can be categorized as: mobile device forensics technology, mobile systems forensics technology, mobile network forensics, technology, and mobile application forensics technology. In terms of mobile device forensics, we propose the procedure and technology of mobile devices forensics. In terms of mobile systems forensics, we propose the digital forensics technology and features of iOS and Android mobile system. In terms of mobile network forensics, we propose the basic digital forensics method and technology under mobile network. In terms of mobile applications forensics, we propose the basic features of mobile applications forensics. According to the article, with more and more new concepts and new technology development, in the future, the smart mobile terminal digital forensics technology wil be one of the mainstream of digital forensics.%对应移动数字取证技术的4个方面:移动设备取证、移动系统取证、移动网络取证和移动应用取证,给出了移动设备取证的步骤和手段,基于iOS和Android系统的数字取证技术及其特点,移动网络下数字取证的基本手段和技术,移动应用取证的基本特征;认为随着越来越多的新概念和新技术的发展,未来智能移动终端数字取证技术将成为数字取证的主流之一。

  9. Computer Forensics Field Triage Process Model

    Directory of Open Access Journals (Sweden)

    Marcus K. Rogers

    2006-06-01

    Full Text Available With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s/media, transporting it to the lab, making a forensic image(s, and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s. The Cyber Forensic Field Triage Process Model (CFFTPM proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s/media back to the lab for an in-depth examination or acquiring a complete forensic image(s. The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations.

  10. Forensic radiology in dentistry.

    Science.gov (United States)

    Manigandan, T; Sumathy, C; Elumalai, M; Sathasivasubramanian, S; Kannan, A

    2015-04-01

    Radiography can play an important part in forensic odontology, mainly to establish identification. This may take the precise form of comparison between antemortem and postmortem radiographs. Radiographs may also be taken to determine the age of a minor victim and even help in the assessment of the sex and ethnic group. Comparable radiographs are an essential factor to confirm identification in a mass disaster.

  11. Forensic science in medicine:

    African Journals Online (AJOL)

    laboratory in the beginning of the twentieth ... rendering clinical forensic medical and medico-legal ... rates of interpersonal violence, in all its forms, in the world ... the total spectrum of scientific analysis .... fingerprinting) are complex and labour.

  12. Application of the forensic Luminol for blood in infection control.

    Science.gov (United States)

    Bergervoet, P W M; van Riessen, N; Sebens, F W; van der Zwet, W C

    2008-04-01

    Transmission of hepatitis C virus occurs frequently in haemodialysis units. A possible route of transmission is indirectly via the hospital environment although this has never been recorded. We investigated the haemodialysis unit in Deventer Hospital, Deventer, The Netherlands, with the forensic Luminol test. With this test, invisible traces of blood can be visualised based on the principle of biochemiluminescence. We demonstrated extensive contamination of the environment with traces of blood. The aim of this article is to introduce this method to infection control professionals, so it can be used to monitor cleaning and disinfection procedures, and alert healthcare workers to the possibility of contamination of the hospital environment with blood.

  13. Developmental validation of the HIrisPlex system: DNA-based eye and hair colour prediction for forensic and anthropological usage

    NARCIS (Netherlands)

    S. Walsh (Susan); L.C. Chaitanya (Lakshmi); L. Clarisse (Lindy); L. Wirken (Laura); J. Draus-Barini (Jolanta); L. Kovatsi (Leda); H. Maeda (Hitoshi); T. Ishikawa (Takaki); T. Sijen (Titia); P. de Knijff (Peter); W. Branicki (Wojciech); F. Liu (Fan); M.H. Kayser (Manfred)

    2014-01-01

    textabstractForensic DNA Phenotyping or 'DNA intelligence' tools are expected to aid police investigations and find unknown individuals by providing information on externally visible characteristics of unknown suspects, perpetrators and missing persons from biological samples. This is especially use

  14. Forensic Fiber Examination and Analysis.

    Science.gov (United States)

    Hauck, M M

    2005-01-01

    Fiber evidence suffers from the same misperception as many other types of trace evidence, that it is weak in its significance. Despite this pejorative perception, textiles make excellent evidence because of their presence in our daily lives and the variations they demonstrate. Fibers from the textiles in our and others' environments transfer from surface to surface and variously persist. Textile fibers are produced with specific raw materials, production methods, and postproduction alterations that create this variety. The distribution and use of the fibers add to their distinctive significance. The number of methods used in analysis helps to define and identify the fibers. Millions of color shades are possible in textiles and yet color analysis is not a universal technique in forensic laboratories. Transfer study after transfer study demonstrates the rarity of finding unrelated fibers at random that exhibit the same microscopic characteristics and optical properties. Examples from casework also demonstrate the usefulness of forensic textile fiber analysis in demonstrating probative associations in criminal investigations. Additional work needs to be done to fortify and support these conclusions and provide the verification necessary to remove the taint of "could have".

  15. Forensic learning disability nursing skills and competencies: a study of forensic and non-forensic nurses.

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne

    2010-11-01

    This paper reports on an investigation into the skills and competencies of forensic learning disability nurses in the United Kingdom. The two sample populations were forensic learning disability nurses from the high, medium, and low secure psychiatric services and non-forensic learning disability nurses from generic services. An information gathering schedule was used to collect the data; of 1200 schedules, 643 were returned for a response rate of 53.5%. The data identified the "top ten" problems that forensic learning disability nurses may encounter, the skills and competencies necessary to overcome them, and the areas that need to be developed in the future. The results indicated that the forensic learning disability nurses tended to focus on the physical aspects to the role whilst the non-forensic learning disability nurses tended to perceive the forensic role in relational terms. This has implications for practice, policy, and procedures.

  16. ACHIEVING BUSINESS EXCELLENCE BY OPTIMIZING CORPORATE FORENSIC READINESS

    National Research Council Canada - National Science Library

    Gojko Grubor; Ivan Barac; Natasa Simeunovic; Nenad Ristic

    2017-01-01

    ... incident digital forensic investigation (CCIDFI) by using adopted mathematic model of the greed MCDM - multi-criteria decision-making method and the Expert Choice software tool for multi-criteria optimization of the CCIDFI readiness...

  17. GRAPH-BASED POST INCIDENT INTERNAL AUDIT METHOD OF COMPUTER EQUIPMENT

    Directory of Open Access Journals (Sweden)

    I. S. Pantiukhin

    2016-05-01

    Full Text Available Graph-based post incident internal audit method of computer equipment is proposed. The essence of the proposed solution consists in the establishing of relationships among hard disk damps (image, RAM and network. This method is intended for description of information security incident properties during the internal post incident audit of computer equipment. Hard disk damps receiving and formation process takes place at the first step. It is followed by separation of these damps into the set of components. The set of components includes a large set of attributes that forms the basis for the formation of the graph. Separated data is recorded into the non-relational database management system (NoSQL that is adapted for graph storage, fast access and processing. Damps linking application method is applied at the final step. The presented method gives the possibility to human expert in information security or computer forensics for more precise, informative internal audit of computer equipment. The proposed method allows reducing the time spent on internal audit of computer equipment, increasing accuracy and informativeness of such audit. The method has a development potential and can be applied along with the other components in the tasks of users’ identification and computer forensics.

  18. Location tracking forensics on mobile devices

    Science.gov (United States)

    Sack, Stefan; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the

  19. Forensic Assertive Community Treatment in a Continuum of Care for Male Internees in Belgium: Results After 33 Months.

    Science.gov (United States)

    Marquant, Thomas; Sabbe, Bernard; Van Nuffel, Meike; Verelst, Rudy; Goethals, Kris

    2017-08-08

    Non-forensic or regular assertive community treatment (ACT) has positive effects on non-forensic outcomes but has poor effects on forensic outcome measures. In this study, we examined non-forensic and forensic outcome measures of a forensic adaptation of ACT (ForACT) within a continuum of care for internees. Data were collected retrospectively from files of 70 participants in the ForACT group who had been released from a forensic hospital. The control group comprised internees who had left prison and entered community-based care (n = 56). The ForACT group demonstrated significantly better outcomes on forensic measures, such as arrests and incarcerations, and had better community tenure. However, this group showed high hospitalization rates. The findings indicate that this type of community-based care can be beneficial for such internees; however, internees continue to experience difficulties reintegrating into society.

  20. Forensic medicine in South Africa: associations between medical practice and legal case progression and outcomes in female murders.

    Directory of Open Access Journals (Sweden)

    Naeemah Abrahams

    Full Text Available BACKGROUND: Forensic medicine has been largely by-passed by the tide of health systems research and evidence based medicine. Murder victims form a central part of forensic medical examiners' case load, and women murdered by intimate partners are an important subgroup, representing the most severe form and consequence of intimate partner violence. Our aim was to describe the epidemiology of female murder in South Africa (by intimate and non-intimate partners; and to describe and compare autopsy findings, forensic medical management of cases and the contribution of these to legal outcomes. METHODS: We did a retrospective national study in a proportionate random sample of 25 medico-legal laboratories to identify all homicides in 1999 of women aged 14 years and over. Data were abstracted from the mortuary file and autopsy report, and collected from a police interview. FINDINGS: In 21.5% of cases the perpetrator was convicted. Factors associated with a conviction for the female murders included having a history of intimate partner violence 1.18 (95%CI: 0.16-2.20, weapon recovered 1.36 (95% CI:0.58-2.15 and a detective visiting the crime scene 1.57 (95% CI:0.14-3.00. None of the forensic medical activities increased the likelihood of a conviction. CONCLUSION: The findings raise important questions about the role of forensic medicine in these cases.

  1. POST-MORTEM CHANGES IN TEETH- FORENSIC ISSUES

    Directory of Open Access Journals (Sweden)

    Irina MANOILESCU

    2015-12-01

    Full Text Available Teeth have an increased resistance to environmental factors and decomposition processes, which makes them highly valuable in forensic investigations. The either physical (wind, water, sun, soil type or biological (plant roots, insects, animals environmental factors and the decomposition processes induce post-mortem changes in teeth, which are relevant to forensic investigation in terms of estimating the post-mortem interval or of elucidating the conditions in which the body stood after death. In this paper, based on the data provided in the literature, the authors present the main changes induced by environmental factors and decomposition processes in teeth and refer to their relevance in forensic activity.

  2. Distinguishing between forensic science and forensic pseudoscience: testing of validity and reliability, and approaches to forensic voice comparison.

    Science.gov (United States)

    Morrison, Geoffrey Stewart

    2014-05-01

    In this paper it is argued that one should not attempt to directly assess whether a forensic analysis technique is scientifically acceptable. Rather one should first specify what one considers to be appropriate principles governing acceptable practice, then consider any particular approach in light of those principles. This paper focuses on one principle: the validity and reliability of an approach should be empirically tested under conditions reflecting those of the case under investigation using test data drawn from the relevant population. Versions of this principle have been key elements in several reports on forensic science, including forensic voice comparison, published over the last four-and-a-half decades. The aural-spectrographic approach to forensic voice comparison (also known as "voiceprint" or "voicegram" examination) and the currently widely practiced auditory-acoustic-phonetic approach are considered in light of this principle (these two approaches do not appear to be mutually exclusive). Approaches based on data, quantitative measurements, and statistical models are also considered in light of this principle.

  3. Activity – based costing method

    Directory of Open Access Journals (Sweden)

    Èuchranová Katarína

    2001-06-01

    Full Text Available Activity based costing is a method of identifying and tracking the operating costs directly associated with processing items. It is the practice of focusing on some unit of output, such as a purchase order or an assembled automobile and attempting to determine its total as precisely as poccible based on the fixed and variable costs of the inputs.You use ABC to identify, quantify and analyze the various cost drivers (such as labor, materials, administrative overhead, rework. and to determine which ones are candidates for reduction.A processes any activity that accepts inputs, adds value to these inputs for customers and produces outputs for these customers. The customer may be either internal or external to the organization. Every activity within an organization comprimes one or more processes. Inputs, controls and resources are all supplied to the process.A process owner is the person responsible for performing and or controlling the activity.The direction of cost through their contact to partial activity and processes is a new modern theme today. Beginning of this method is connected with very important changes in the firm processes.ABC method is a instrument , that bring a competitive advantages for the firm.

  4. [Authentication of Trace Material Evidence in Forensic Science Field with Infrared Microscopic Technique].

    Science.gov (United States)

    Jiang, Zhi-quan; Hu, Ke-liang

    2016-03-01

    In the field of forensic science, conventional infrared spectral analysis technique is usually unable to meet the detection requirements, because only very a few trace material evidence with diverse shapes and complex compositions, can be extracted from the crime scene. Infrared microscopic technique is developed based on a combination of Fourier-transform infrared spectroscopic technique and microscopic technique. Infrared microscopic technique has a lot of advantages over conventional infrared spectroscopic technique, such as high detection sensitivity, micro-area analysisand nondestructive examination. It has effectively solved the problem of authentication of trace material evidence in the field of forensic science. Additionally, almost no external interference is introduced during measurements by infrared microscopic technique. It can satisfy the special need that the trace material evidence must be reserved for witness in court. It is illustrated in detail through real case analysis in this experimental center that, infrared microscopic technique has advantages in authentication of trace material evidence in forensic science field. In this paper, the vibration features in infrared spectra of material evidences, including paints, plastics, rubbers, fibers, drugs and toxicants, can be comparatively analyzed by means of infrared microscopic technique, in an attempt to provide powerful spectroscopic evidence for qualitative diagnosis of various criminal and traffic accident cases. The experimental results clearly suggest that infrared microscopic technique has an incomparable advantage and it has become an effective method for authentication of trace material evidence in the field of forensic science.

  5. A NORTHWEST DATABASE MODEL OF SHORT TANDEM REPEAT LOCI IN FORENSIC MEDICINE

    Institute of Scientific and Technical Information of China (English)

    王振原; 朱波峰; 刘雅诚; 严江伟; 霍振义; 金天博; 李涛; 樊拴良; 方杰

    2003-01-01

    Objective To establish the northwest database of short tandem repeat(STR) loci in forensic medicine. Methods Bloodstains or whole blood samples were collected from the unrelated prisoners in Xi'an city. Genetic distribution for 13 STR loci and amelogenin locus were determined in prisons based on GeneScan. One primer for each locus was labeled with the fluorescent by 5-FAM, JOE, or NED. The forensic database were generated by using multiple amplification, GeneScan, genotype, and genetic distribution analysis. Results 113 alleles and 302 genotypes were observed, with the corresponding frequency between 0.0050-0.5250 and 0.0100-0.4100. The mean H was 0.7667. The accumulative DP was 0.9999999,. The accumulative EPP was 0.9999999. The scope of PIC was 0.6036-0.8562. PM was less than 10-11. The observed and expected genotype frequencies were evaluated using χ2-test and all were in accordance with Hardy-Weinberg equilibrium (P>0.05). Conclusion STR loci is an ideal genetic marker with powerful polymorphism and stable heredity. It can be used for individual identification and paternity in forensic medicine. The forensic DNA database model can be established successfully.

  6. Molecular characterisation of the nucleic acids recovered from aged forensic samples.

    Science.gov (United States)

    Previderè, Carlo; Micheletti, Piero; Perossa, Romina; Grignani, Pierangela; Fattorini, Paolo

    2002-12-01

    The molecular composition of the genetic substrate recovered from seven aged forensic samples has been extensively investigated. A simple enzymatic test based on DNAseI incubation of the extracts showed that the UV-fluorescent material from the forensic specimens is composed of nucleic acids, with the DNA fraction representing at least 90% of the total amount. Since spectrophotometric determinations of the extracts showed unreliable results due to anomalous OD(260)/OD(280) ratios, quantification of the nuclease-sensitive genetic material was performed by a slightly modified agarose plate method. The first quantitative data on exogenous contamination in aged forensic samples are provided by slot-blot hybridisation of the extracts to human, bacterial and fungal probes. Only limited amounts of human and contaminant DNA were detected in the samples. The molecular integrity of the primary structure of these aged DNA samples was analysed by reversed-phase HPLC/MS. The data show a good correlation between the degree of chemical damage and the ability to hybridise to molecular probes. The ability to achieve specific genetic profiles was assessed by multiplex PCR amplification of STR loci. Our data show that accurate determination of the molecular composition of the DNA recovered from forensic samples can be extremely useful for a reliable evaluation of the PCR typing results.

  7. Analytical and Radiochemistry for Nuclear Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-26

    Information about nonproliferation nuclear forensics, activities in forensics at Los Alamos National Laboratory, radio analytical work at LANL, radiochemical characterization capabilities, bulk chemical and materials analysis capabilities, and future interests in forensics interactions.

  8. Multifarious applications of atomic force microscopy in forensic science investigations.

    Science.gov (United States)

    Pandey, Gaurav; Tharmavaram, Maithri; Rawtani, Deepak; Kumar, Sumit; Agrawal, Y

    2017-04-01

    Forensic science is a wide field comprising of several subspecialties and uses methods derived from natural sciences for finding criminals and other evidence valid in a legal court. A relatively new area; Nano-forensics brings a new era of investigation in forensic science in which instantaneous results can be produced that determine various agents such as explosive gasses, biological agents and residues in different crime scenes and terrorist activity investigations. This can be achieved by applying Nanotechnology and its associated characterization techniques in forensic sciences. Several characterization techniques exist in Nanotechnology and nano-analysis is one such technique that is used in forensic science which includes Electron microscopes (EM) like Transmission (TEM) and Scanning (SEM), Raman microscopy (Micro -Raman) and Scanning Probe Microscopes (SPMs) like Atomic Force Microscope (AFM). Atomic force microscopy enables surface characterization of different materials by examining their morphology and mechanical properties. Materials that are immeasurable such as hair, body fluids, textile fibers, documents, polymers, pressure sensitive adhesives (PSAs), etc. are often encountered during forensic investigations. This review article will mainly focus on the use of AFM in the examination of different evidence such as blood stains, forged documents, human hair samples, ammunitions, explosives, and other such applications in the field of Forensic Science. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. A method for estimating age of medieval sub-adults from infancy to adulthood based on long bone length

    DEFF Research Database (Denmark)

    Primeau, Charlotte; Friis, Laila Saidane; Sejrsen, Birgitte;

    2016-01-01

    on a modern population (Maresh: Human growth and development () pp 155-200), and, lastly, based on archeological data with known ages (Rissech et al.: Forensic Sci Int 180 () 1-9). As growth of long bones is known to be non-linear it was tested if the regression model could be improved by applying a quadratic...... model. RESULTS: Comparison between estimated ages revealed that the modern data result in lower estimated ages when compared to the Danish regression equations. The estimated ages using the Danish regression equations and the regression equations developed by Rissech et al. (Forensic Sci Int 180 () 1......OBJECTIVES: To develop a series of regression equations for estimating age from length of long bones for archaeological sub-adults when aging from dental development cannot be performed. Further, to compare derived ages when using these regression equations, and two other methods. MATERIAL...

  10. 基于云的计算机取证系统研究%Research on Computer Forensics System Based on Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    武鲁; 王连海; 顾卫东

    2012-01-01

    Cloud computing is the most popular computing mode of Internet, which features clastic computing,resource virtualization and on-demand service,etc. In this environment,resources such as infrastructures, development platforms and applications are directly provided by could computing center. Users no longer own infrastructures, software and data themselves, but share entire cloud computing resources. This will affects security and availability of could computing environment, and leave it tremendous risks. Security flaws and threats of cloud computing were analyzed in this paper,and a design of computer forensic system based on cloud computing was presented, which resolves security problems of cloud computing using computer forensic techniques, and meets the need of high-performance computing using cloud computing and super computing techniques.%云计算是目前最流行的互联网计算模式,它具有弹性计算、资源虚拟化、按需服务等特点.在云计算的环境中,云计算中心直接提供由基础设施、平台、应用等组成的各种服务,用户不再拥有自己的基础设施、软件和数据,而是共享整个云基础架构.这种方式直接影响了云计算环境的安全性和可用性,给云计算带来了巨大的隐患.在分析和研究云计算环境下的安全缺陷和安全威胁的前提下,提出了一种基于云的计算机取证系统的设计方案——利用计算机取证技术解决云计算环境的安全问题,同时利用云计算技术和超算技术满足传统取证对高性能计算的需求.

  11. Development of the Australian Society of Forensic Odontology disaster victim identification forensic odontology guide.

    Science.gov (United States)

    Taylor, J

    2009-12-01

    The need for documented procedures and protocols are important in every specialist group to ensure a consistent service to the community. They provide guidance to members of the specialist group about responsibilities and appropriate practices, and confidence to the community that the services are of the highest possible standard. In a Disaster Victim Identification (DVI) incident, by enabling the process to be audited, they also serve to ensure that identifications are reliable. Following the Bali Bombings of 2002 and the 2004 Asian Tsunami the Australian Society of Forensic Odontology recognised the need for a practice guide to assist the management of their members in DVI incidents. 31 members of the Australian Society of Forensic Odontology participated in the development of a guideline document for Disaster Victim Identification using a Delphi based model. The advantage of using the iterative Delphi process is that it encouraged participants to think about the processes used in the forensic odontology aspects of a DVI incident and their expectations of a guiding document. The document developed as a result of this project is comprehensive in coverage and places the Australian Society of Forensic Odontology at the vanguard of professionalism in the forensic odontology and DVI community.

  12. Practice of forensic medicine and pathology in Sri Lanka.

    Science.gov (United States)

    Balachandra, A Thambirajah; Vadysinghe, Amal N; William, Anita L

    2011-02-01

    The practice of forensic medicine and pathology in Sri Lanka is based on the British model. Medical students during their third and fourth years receive approximately 50 hours of lectures and tutorials in forensic medicine and pathology and then undergo an examination. After completing an internship, these doctors are sent to various hospitals throughout Sri Lanka where they may be asked to perform medicolegal examinations on victims and suspects in rape cases, persons suspected of being under the influence of drugs and/or alcohol, and, injured live patients. As well, they may be asked to perform medicolegal autopsies. Depending upon their experience, some medical officers may be designated as judicial medical officers and appointed full time to do medicolegal work. Up until 1980, judicial medical officers with at least 2 years of work experience were allowed to obtain their postgraduate qualifications in the United Kingdom. However, since 1981 and the establishment of its own Postgraduate Institute of Medicine in Colombo, Sri Lanka, medical officers are offered 2 postgraduate programs in forensic medicine and pathology, a diploma in legal medicine and a doctorate in medicine (forensic medicine). After completing the doctorate in forensic medicine, doctors are allowed to train abroad for a further year in an approved center. Upon return they can then be appointed as consultant judicial medical officers. The practice of forensic medicine and pathology in Sri Lanka is unique and vibrant. However, due to the country's prevailing civil war, the practice of forensic medicine and pathology is suboptimal.

  13. Forensic Metrology: Its Importance and Evolution in the United States

    Science.gov (United States)

    Vosk, JD Ted

    2016-11-01

    Forensic measurements play a significant role in the U.S. criminal justice system. Guilt or innocence, or the severity of a sentence, may depend upon the results of such measurements. Until recently, however, forensic disciplines were largely unaware of the field of metrology. Accordingly, proper measurement practices were often, and widely, neglected. These include failure to adopt proper calibration techniques, establish the traceability of results and determine measurement uncertainty. These failures undermine confidence in verdicts based upon forensic measurements. Over the past decade, though, the forensic sciences have been introduced to metrology and its principles leading to more reliable measurement practices. The impetus for this change was driven by many forces. Pressure came initially from criminal defense lawyers challenging metrologically unsound practices and results relied upon by government prosecutions. Litigation in the State of Washington led this movement spurring action by attorneys in other jurisdictions and eventually reform in the measurement practices of forensic labs around the country. Since then, the greater scientific community, other forensic scientists and even prosecutors have joined the fight. This paper describes the fight to improve the quality of justice by the application of metrological principles and the evolution of the field of forensic metrology.

  14. Molecular Advancements in Forensic Odontology.

    Science.gov (United States)

    Babu Rs, A; Rose, D

    2015-05-11

    Forensic odontology explores the field of human identification through dental tissues in cases where there is destruction of body tissues in criminal investigations and mass disasters. Forensic odontology involves dentists participating in legal and criminal issues. Parameters such as age and gender identification are important in identifying the person or persons. Over the last two decades, the molecular aspect of forensic sciences has increased, and these molecular techniques now provide a novel approach to forensic odontology. Molecular advancements in science like DNA analysis has extended the range of forensic dentistry as teeth possess the character of resistance toward physical or chemical aggressions. Teeth provide the abundant space for DNA, and hence teeth represent an excellent source of genomic DNA. The present paper focusses on molecular advancements in the field of forensic odontology.

  15. Chemical and Physical Signatures for Microbial Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Cliff, John B.; Kreuzer, Helen W.; Ehrhardt, Christopher J.; Wunschel, David S.

    2012-01-03

    Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special considerations for the forensic arena - quality control, sample integrity, etc. Mark Wilson (retired FBI): Western Carolina University Chapter 4. Physical signatures: Light and electron microscopy, atomic force microscopy, gravimetry etc. Joseph Michael, Sandia National Laboratory Chapter 5. Lipids: FAME, PLFA, steroids, LPS, etc. James Robertson, Federal Bureau of Investigation Chapter 6. Carbohydrates: Cell wall components, cytoplasm components, methods Alvin Fox, University of South Carolina School of Medicine David Wunschel, Pacific Northwest National Laboratory Chapter 7. Peptides: Peptides, proteins, lipoproteins David Wunschel, Pacific Northwest National Laboratory Chapter 8. Elemental content: CNOHPS (treated in passing), metals, prospective cell types John Cliff, International Atomic Energy Agency Chapter 9. Isotopic signatures: Stable isotopes C,N,H,O,S, 14C dating, potential for heavy elements. Helen Kreuzer-Martin, Pacific Northwest National Laboratory Michaele Kashgarian, Lawrence Livermore National Laboratory Chapter 10. Extracellular signatures: Cellular debris, heme, agar, headspace, spent media, etc Karen Wahl, Pacific Northwest National Laboratory Chapter 11. Data Reduction and Integrated Microbial Forensics: Statistical concepts, parametric and multivariate statistics, integrating signatures Kristin Jarman, Pacific Northwest National Laboratory

  16. Identical twins in forensic genetics

    DEFF Research Database (Denmark)

    Tvedebrink, Torben; Morling, Niels

    2015-01-01

    The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where...... published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator...

  17. Perceptual expertise in forensic facial image comparison.

    Science.gov (United States)

    White, David; Phillips, P Jonathon; Hahn, Carina A; Hill, Matthew; O'Toole, Alice J

    2015-09-07

    Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and outcome of criminal investigations and convictions. Despite calls for research on sources of human error in forensic examination, existing scientific knowledge of face matching accuracy is based, almost exclusively, on people without formal training. Here, we administered three challenging face matching tests to a group of forensic examiners with many years' experience of comparing face images for law enforcement and government agencies. Examiners outperformed untrained participants and computer algorithms, thereby providing the first evidence that these examiners are experts at this task. Notably, computationally fusing responses of multiple experts produced near-perfect performance. Results also revealed qualitative differences between expert and non-expert performance. First, examiners' superiority was greatest at longer exposure durations, suggestive of more entailed comparison in forensic examiners. Second, experts were less impaired by image inversion than non-expert students, contrasting with face memory studies that show larger face inversion effects in high performers. We conclude that expertise in matching identity across unfamiliar face images is supported by processes that differ qualitatively from those supporting memory for individual faces.

  18. Quantitative filter forensics for indoor particle sampling.

    Science.gov (United States)

    Haaland, D; Siegel, J A

    2017-03-01

    Filter forensics is a promising indoor air investigation technique involving the analysis of dust which has collected on filters in central forced-air heating, ventilation, and air conditioning (HVAC) or portable systems to determine the presence of indoor particle-bound contaminants. In this study, we summarize past filter forensics research to explore what it reveals about the sampling technique and the indoor environment. There are 60 investigations in the literature that have used this sampling technique for a variety of biotic and abiotic contaminants. Many studies identified differences between contaminant concentrations in different buildings using this technique. Based on this literature review, we identified a lack of quantification as a gap in the past literature. Accordingly, we propose an approach to quantitatively link contaminants extracted from HVAC filter dust to time-averaged integrated air concentrations. This quantitative filter forensics approach has great potential to measure indoor air concentrations of a wide variety of particle-bound contaminants. Future studies directly comparing quantitative filter forensics to alternative sampling techniques are required to fully assess this approach, but analysis of past research suggests the enormous possibility of this approach. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  19. Veterinary Forensic Toxicology.

    Science.gov (United States)

    Gwaltney-Brant, S M

    2016-09-01

    Veterinary pathologists working in diagnostic laboratories are sometimes presented with cases involving animal poisonings that become the object of criminal or civil litigation. Forensic veterinary toxicology cases can include cases involving animal cruelty (malicious poisoning), regulatory issues (eg, contamination of the food supply), insurance litigation, or poisoning of wildlife. An understanding of the appropriate approach to these types of cases, including proper sample collection, handling, and transport, is essential so that chain of custody rules are followed and proper samples are obtained for toxicological analysis. Consultation with veterinary toxicologists at the diagnostic laboratory that will be processing the samples before, during, and after the forensic necropsy can help to ensure that the analytical tests performed are appropriate for the circumstances and findings surrounding the individual case. © The Author(s) 2016.

  20. Investigating forensic nursing.

    Science.gov (United States)

    Barton, S

    1995-01-01

    Forensic nurses are making a positive impact in our society today. They are reaching out to aid victims of violence by not only attending to their injuries and emotional distress, but also by identifying, collecting, and preserving vital evidence that will be needed to assist their patients to seek justice through the legal system. Misinterpretation or failure to properly obtain evidence may result in a miscarriage of justice. Helping victims obtain validation of their injustice is crucial to their healing process and may be of critical importance in the effort to avoid further victimization. Forensic nurses work with victims of child abuse, elder abuse, domestic violence, sexual assault, and persons involved with violence or imminent death. This area includes psychiatric specialists who intervene not only with victims but also with perpetrators of violent and/or sexual acts.