WorldWideScience

Sample records for network forensic analysis

  1. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  2. Forensic analysis of social networking application on iOS devices

    Science.gov (United States)

    Zhang, Shuhui; Wang, Lianhai

    2013-12-01

    The increased use of social networking application on iPhone and iPad make these devices a goldmine for forensic investigators. Besides, QQ, Wechat, Sina Weibo and skype applications are very popular in China and didn't draw attention to researchers. These social networking applications are used not only on computers, but also mobile phones and tablets. This paper focuses on conducting forensic analysis on these four social networking applications on iPhone and iPad devices. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application and correlation analysis with other activities. Advices to the forensic investigators are also given. It could help the investigators to describe the crime behavior and reconstruct the crime venue.

  3. RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis

    OpenAIRE

    Moustafa, Nour; Slay, Jill

    2017-01-01

    Network forensic techniques help in tracking different types of cyber attack by monitoring and inspecting network traffic. However, with the high speed and large sizes of current networks, and the sophisticated philosophy of attackers, in particular mimicking normal behaviour and/or erasing traces to avoid detection, investigating such crimes demands intelligent network forensic techniques. This paper suggests a real-time collaborative network Forensic scheme (RCNF) that can monitor and inves...

  4. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection

    Directory of Open Access Journals (Sweden)

    Gabriel Arquelau Pimenta Rodrigues

    2017-10-01

    Full Text Available Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its normal operation, thus increasing the cybersecurity of the networked environment. This paper addresses the use of a forensic approach with Deep Packet Inspection to detect anomalies in the network traffic. As cyber attacks may occur on any layer of the TCP/IP networking model, Deep Packet Inspection is an effective way to reveal suspicious content in the headers or the payloads in any packet processing layer, excepting of course situations where the payload is encrypted. Although being efficient, this technique still faces big challenges. The contributions of this paper rely on the association of Deep Packet Inspection with forensics analysis to evaluate different attacks towards a Honeynet operating in a network laboratory at the University of Brasilia. In this perspective, this work could identify and map the content and behavior of attacks such as the Mirai botnet and brute-force attacks targeting various different network services. Obtained results demonstrate the behavior of automated attacks (such as worms and bots and non-automated attacks (brute-force conducted with different tools. The data collected and analyzed is then used to generate statistics of used usernames and passwords, IP and services distribution, among other elements. This paper also discusses the importance of network forensics and Chain of Custody procedures to conduct investigations and shows the effectiveness of the mentioned techniques in evaluating different attacks in networks.

  5. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection

    OpenAIRE

    Gabriel Arquelau Pimenta Rodrigues; Robson de Oliveira Albuquerque; Flávio Elias Gomes de Deus; Rafael Timóteo de Sousa Jr.; Gildásio Antônio de Oliveira Júnior; Luis Javier García Villalba; Tai-Hoon Kim

    2017-01-01

    Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its normal operation, thus increasing the cybersecurity of the networked environment. This paper addresses the use of a forensic approach with Deep Packet Inspection to detect anomalies in the network traffic. As cyber attacks may occur on any laye...

  6. Bipartisanship Breakdown, Functional Networks, and Forensic Analysis in Spanish 2015 and 2016 National Elections

    Directory of Open Access Journals (Sweden)

    Juan Fernández-Gracia

    2018-01-01

    Full Text Available We present a social network and forensic analysis of the vote counts of Spanish national elections that took place in December 2015 and their sequel in June 2016. We initially consider the phenomenon of bipartisanship breakdown by analyzing spatial distributions of several bipartisanship indices. We find that such breakdown is more prominently close to cosmopolite and largely populated areas and less important in rural areas where bipartisanship still prevails, and its evolution mildly consolidates in the 2016 round, with some evidence of bipartisanship reinforcement which we hypothesize to be due to psychological mechanisms of risk aversion. Subsequently, a functional network analysis detects an effective partition of municipalities which remarkably coincides with the first-level political and administrative division of autonomous communities. Finally, we explore to which extent vote data are faithful by applying forensic techniques to vote statistics. Results based on deviation from Benford’s law are mixed and vary across different levels of aggregation. As a complementary metric, we further explore the cooccurring statistics of vote share and turnout, finding a mild tendency in the clusters of the conservative party to smear out towards the area of high turnout and vote share, what has been previously interpreted as a possible sign of incremental fraud.

  7. Active Traffic Capture for Network Forensics

    Science.gov (United States)

    Slaviero, Marco; Granova, Anna; Olivier, Martin

    Network traffic capture is an integral part of network forensics, but current traffic capture techniques are typically passive in nature. Under heavy loads, it is possible for a sniffer to miss packets, which affects the quality of forensic evidence.

  8. Nuclear forensic analysis

    International Nuclear Information System (INIS)

    Tomar, B.S.

    2016-01-01

    In the present talk the fundamentals of the nuclear forensic investigations will be discussed followed by the detailed standard operating procedure (SOP) for the nuclear forensic analysis. The characteristics, such as, dimensions, particle size, elemental and isotopic composition help the nuclear forensic analyst in source attribution of the interdicted material, as the specifications of the nuclear materials used by different countries are different. The analysis of elemental composition could be done by SEM-EDS, XRF, CHNS analyser, etc. depending upon the type of the material. Often the trace constituents (analysed by ICP-AES, ICP-MS, AAS, etc) provide valuable information about the processes followed during the production of the material. Likewise the isotopic composition determined by thermal ionization mass spectrometry provides useful information about the enrichment of the nuclear fuel and hence its intended use

  9. Kindle Forensics: Acquisition & Analysis

    Directory of Open Access Journals (Sweden)

    Peter Hannay

    2011-06-01

    Full Text Available The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

  10. Forensic neutron activation analysis

    International Nuclear Information System (INIS)

    Kishi, T.

    1987-01-01

    The progress of forensic neutron activation analysis (FNAA) in Japan is described. FNAA began in 1965 and during the past 20 years many cases have been handled; these include determination of toxic materials, comparison examination of physical evidences (e.g., paints, metal fragments, plastics and inks) and drug sample differentiation. Neutron activation analysis is applied routinely to the scientific criminal investigation as one of multielement analytical techniques. This paper also discusses these routine works. (author) 14 refs

  11. Particle Analysis in Forensic Science.

    Science.gov (United States)

    Bisbing, R E; Schneck, W M

    2006-07-01

    Microscopic trace evidence includes particles from many sources such as biologicals, soil, building materials, metals, explosives, gunshot residues, and cosmetics. The particles are identified by morphological analysis, microscopy, and chemical analysis. Their identity is confirmed by comparison with reference materials or other comparison samples. The probative value of particles of forensic interest depends on their nature and the circumstances of their presence. Copyright © 2006 Central Police University.

  12. Nuclear forensic analysis of thorium

    International Nuclear Information System (INIS)

    Moody, K.J.; Grant, P.M.

    1999-01-01

    A comprehensive radiochemical isolation procedure and data analysis/interpretation method for the nuclear forensic investigation of Th has been developed. The protocol includes sample dissolution, chemical separation, nuclear counting techniques, consideration of isotopic parent-daughter equilibria, and data interpretation tactics. Practical application of the technology was demonstrated by analyses of a questioned specimen confiscated at an illegal drug synthesis laboratory by law enforcement authorities. (author)

  13. Bovine and equine forensic DNA analysis

    NARCIS (Netherlands)

    van de Goor, L.H.P.

    2011-01-01

    Animal forensic DNA analysis is being used for human criminal investigations (e.g traces from cats and dogs), wildlife management, breeding and food safety. The most common DNA markers used for such forensic casework are short tandem repeats (STR). Rules and guidelines concerning quality assurance

  14. Detangling complex relationships in forensic data: principles and use of causal networks and their application to clinical forensic science.

    Science.gov (United States)

    Lefèvre, Thomas; Lepresle, Aude; Chariot, Patrick

    2015-09-01

    The search for complex, nonlinear relationships and causality in data is hindered by the availability of techniques in many domains, including forensic science. Linear multivariable techniques are useful but present some shortcomings. In the past decade, Bayesian approaches have been introduced in forensic science. To date, authors have mainly focused on providing an alternative to classical techniques for quantifying effects and dealing with uncertainty. Causal networks, including Bayesian networks, can help detangle complex relationships in data. A Bayesian network estimates the joint probability distribution of data and graphically displays dependencies between variables and the circulation of information between these variables. In this study, we illustrate the interest in utilizing Bayesian networks for dealing with complex data through an application in clinical forensic science. Evaluating the functional impairment of assault survivors is a complex task for which few determinants are known. As routinely estimated in France, the duration of this impairment can be quantified by days of 'Total Incapacity to Work' ('Incapacité totale de travail,' ITT). In this study, we used a Bayesian network approach to identify the injury type, victim category and time to evaluation as the main determinants of the 'Total Incapacity to Work' (TIW). We computed the conditional probabilities associated with the TIW node and its parents. We compared this approach with a multivariable analysis, and the results of both techniques were converging. Thus, Bayesian networks should be considered a reliable means to detangle complex relationships in data.

  15. Bayesian networks for evaluation of evidence from forensic entomology.

    Science.gov (United States)

    Andersson, M Gunnar; Sundström, Anders; Lindström, Anders

    2013-09-01

    In the aftermath of a CBRN incident, there is an urgent need to reconstruct events in order to bring the perpetrators to court and to take preventive actions for the future. The challenge is to discriminate, based on available information, between alternative scenarios. Forensic interpretation is used to evaluate to what extent results from the forensic investigation favor the prosecutors' or the defendants' arguments, using the framework of Bayesian hypothesis testing. Recently, several new scientific disciplines have been used in a forensic context. In the AniBioThreat project, the framework was applied to veterinary forensic pathology, tracing of pathogenic microorganisms, and forensic entomology. Forensic entomology is an important tool for estimating the postmortem interval in, for example, homicide investigations as a complement to more traditional methods. In this article we demonstrate the applicability of the Bayesian framework for evaluating entomological evidence in a forensic investigation through the analysis of a hypothetical scenario involving suspect movement of carcasses from a clandestine laboratory. Probabilities of different findings under the alternative hypotheses were estimated using a combination of statistical analysis of data, expert knowledge, and simulation, and entomological findings are used to update the beliefs about the prosecutors' and defendants' hypotheses and to calculate the value of evidence. The Bayesian framework proved useful for evaluating complex hypotheses using findings from several insect species, accounting for uncertainty about development rate, temperature, and precolonization. The applicability of the forensic statistic approach to evaluating forensic results from a CBRN incident is discussed.

  16. PIXE and ion beam analysis in forensics

    International Nuclear Information System (INIS)

    Bailey, Melanie; Warmenhoven, John; Chrislopher, Matt; Kirkby, Karen; Palitsin, Vladimir; Grime, Geoff; Jeynes, Chris; Jones, Brian; Wenn, Roger

    2013-01-01

    Full text: University of Surrey has, for the past four years, collaborated with police institutions from across Europe and the rest of the world lo scope potential applications of ion beam analysis (IBA) in forensic science. In doing this we have consulted practitioners across a range of forensic disciplines, and critically compared IBA with conventional characterisation techniques to investigate the areas in which IBA can add evidential value. In this talk, the results of this feasibility study will be presented, showing the types of sample for which IBA shows considerable promise. We will show how a combination of PIXE with other IBA techniques (EBS, PIGE, MeV-SIMS) can be used to give unprecedented characterisation of forensic samples and comment on the significance of these results for forensic casework. We will also show cases where IBA not appear to add any significant improvement over conventional techniques. (author)

  17. Molecular DNA Analysis in Forensic Identification.

    Science.gov (United States)

    Dumache, Raluca; Ciocan, Veronica; Muresan, Camelia; Enache, Alexandra

    2016-01-01

    Serological and biochemical identification methods used in forensics have several major disadvantages, such as: long time in processing biological sample and lack of sensitivity and specificity. In the last 30 years, DNA molecular analysis has become an important tool in forensic investigations. DNA profiling is based on the short tandem repeats (STR) and aids in human identification from biological samples. Forensic genetics, can provide information on the events which occurred at the crime scene or to supplement other methods of forensic identification. Currently, the methods used in identification are based on polymerase chain reaction (PCR) analyses. This method analyses the autosomal STRs, the Y-chromosome, and the mitochondrial DNA. Correlation of biological samples present at the crime scene with identification, selection, and the probative value factor is therefore the first aspect to be taken into consideration in the forensic genetic analysis. In the last decade, because of the advances in the field of molecular biology, new biomarkers such as: microRNAs (miR), messenger RNA (mRNA), and DNA methylation have been studied and proposed to be used in the forensic identifications of body fluids.

  18. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2016-11-01

    Full Text Available As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.

  19. VALIDATION GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...

  20. Microfluidic chips for clinical and forensic analysis

    NARCIS (Netherlands)

    Verpoorte, Elisabeth

    2002-01-01

    This review gives an overview of developments in the field of microchip analysis for clinical diagnostic and forensic applications. The approach chosen to review the literature is different from that in most microchip reviews to date, in that the information is presented in terms of analytes tested

  1. A forensic application of PIXE analysis

    International Nuclear Information System (INIS)

    Kravchenko, I.I.; Dunnam, F.E.; Rinsvelt, H.A. van; Warren, M.W.; Falsetti, A.B.

    2001-01-01

    PIXE measurements were performed on various calcareous materials including identified bone residues, human cremains, and samples of disputed origin. In a forensic application, the elemental analysis suggests that the origin of a sample suspectly classified as human cremains can tentatively be identified as a mixture of sandy soil and dolomitic limestone

  2. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  3. [New discoveries in forensic medicine. Hair analysis].

    Science.gov (United States)

    Kaempe, B

    1999-03-29

    A review of forensic chemical drug testing in hair is given. Applications for analysis of hair are described. The special problems linked to the determination of drugs in hair such as contamination, differences in sex and ethnic groups and cosmetic pretreatment of the hair are outlined. It is concluded that greater knowledge of hair analysis is needed before the results can be used for toxicological evaluation at the same level as blood. On the other hand, a chemical hair analysis might expose a (mis)use of drugs and follow it step by step up to half a year back in time. In this way, it may supplement a systematic toxicological analysis (STA) for 'a general unknown' for use by police and forensic pathologists.

  4. Forensic neutron activation analysis - the Japanese scene

    International Nuclear Information System (INIS)

    Kishi, Tohru.

    1986-01-01

    The progress of forensic neutron activation analysis/FNAA/ in Japan is described. FNAA began in 1965 and during the past 20 years many cases have been handled; these include determination of toxic materials, comparison examination of physical evidences /e.g.,paints, metal fragments, plastics and inks/ and drug sample differenciation. Neutron activation analysis is applied routinely to the scientific criminal investigation as one of multielement analytical techniques. This paper also discusses these routine works. (author)

  5. Cleaning Puparia for Forensic Analysis.

    Science.gov (United States)

    Higley, Leon G; Brosius, Tierney R; Reinhard, Karl J; Carter, David

    2016-09-01

    We tested procedures for removing adipocere from insect samples to allow identification. An acceptable procedure was determined: (i) Samples were sorted in petri dishes with 75% alcohol to remove any larvae, adult insects, or other soft-bodied material. (ii) Samples of up to 24 puparia were placed in a vial with 15 mL of 95% acetone, capped, and vortexed for a total of 30-90 sec in 10- to 15-sec bursts. This step removed large masses of adipocere or soil from specimen. (iii) Specimens were removed from acetone and placed in a vial of 15 mL of 2% potassium hydroxide (KOH) and vortexed in 10- to 15-sec bursts until all puparia appeared clean (with our samples this required a total of 60-120 sec). (iv) Specimens were removed from the 2% KOH, placed in 75% ethanol, and examined microscopically. (v) Material was stored in 75% ethanol for identification and long-term preservation. © 2016 American Academy of Forensic Sciences.

  6. Spectroscopic analysis of bones for forensic studies

    Energy Technology Data Exchange (ETDEWEB)

    Tofanelli, Mirko [Applied and Laser Spectroscopy Laboratory, Institute of Chemistry of Organometallic Compounds, Research Area of CNR, Via G. Moruzzi, 1, 56124 Pisa (Italy); Pardini, Lorenzo [Institut für Physik und IRIS Adlershof, Humboldt-Universität zu Berlin, Zum Großen Windkanal 6, 12489 Berlin (Germany); Borrini, Matteo [Research Centre in Evolutionary Anthropology and Palaeoecology, School of Natural Sciences and Psychology, Liverpool John Moores University, Byrom Street, Liverpool (United Kingdom); Bartoli, Fulvio; Bacci, Alessandra [Department of Biology, University of Pisa, Via A. Volta, 4, 56126 Pisa (Italy); D’Ulivo, Alessandro; Pitzalis, Emanuela; Mascherpa, Marco Carlo; Legnaioli, Stefano; Lorenzetti, Giulia; Pagnotta, Stefano [Applied and Laser Spectroscopy Laboratory, Institute of Chemistry of Organometallic Compounds, Research Area of CNR, Via G. Moruzzi, 1, 56124 Pisa (Italy); Holanda Cavalcanti, Gildo de [Instituto de Fìsica, Universidade Federal Fluminense, Av. Gal. Milton Tavares de Souza, s/no Campus da Praia Vermelha, CEP 24210-346, Niterói, Rio de Janeiro (Brazil); Lezzerini, Marco [Department of Earth Sciences, University of Pisa, Via Santa Maria, 53, 56126 Pisa (Italy); Palleschi, Vincenzo, E-mail: vincenzo.palleschi@cnr.it [Applied and Laser Spectroscopy Laboratory, Institute of Chemistry of Organometallic Compounds, Research Area of CNR, Via G. Moruzzi, 1, 56124 Pisa (Italy)

    2014-09-01

    The elemental analysis of human bones can give information about the dietary habits of the deceased, especially in the last years of their lives, which can be useful for forensic studies. The most important requirement that must be satisfied for this kind of analysis is that the concentrations of analyzed elements are the same as ante mortem. In this work, a set of bones was analyzed using Laser-Induced Breakdown Spectroscopy (LIBS) and validated using Inductively Coupled Plasma–Optical Emission Spectroscopy (ICP-OES), in order to compare those two techniques and to investigate the effect of possible alterations in the elemental concentrations' proportion resulting from the treatment usually applied for preparing the bones for traditional forensic analysis. The possibility that elemental concentrations' changes would occur after accidental or intentional burning of the bones was also studied. - Highlights: • The LIBS analysis of (animal) bones is presented, to establish its feasibility for forensic studies. • Untreated bones and bones subjected to high temperatures (boiled, burned) were analyzed. • A simple calibration, using a single reference sample, gave reasonable quantitative results. • The comparison of the results demonstrates that LIBS analysis can provide nutritional information. • The nutritional information obtained are the same on untreated, boiled and burned bones.

  7. Spectroscopic analysis of bones for forensic studies

    International Nuclear Information System (INIS)

    Tofanelli, Mirko; Pardini, Lorenzo; Borrini, Matteo; Bartoli, Fulvio; Bacci, Alessandra; D’Ulivo, Alessandro; Pitzalis, Emanuela; Mascherpa, Marco Carlo; Legnaioli, Stefano; Lorenzetti, Giulia; Pagnotta, Stefano; Holanda Cavalcanti, Gildo de; Lezzerini, Marco; Palleschi, Vincenzo

    2014-01-01

    The elemental analysis of human bones can give information about the dietary habits of the deceased, especially in the last years of their lives, which can be useful for forensic studies. The most important requirement that must be satisfied for this kind of analysis is that the concentrations of analyzed elements are the same as ante mortem. In this work, a set of bones was analyzed using Laser-Induced Breakdown Spectroscopy (LIBS) and validated using Inductively Coupled Plasma–Optical Emission Spectroscopy (ICP-OES), in order to compare those two techniques and to investigate the effect of possible alterations in the elemental concentrations' proportion resulting from the treatment usually applied for preparing the bones for traditional forensic analysis. The possibility that elemental concentrations' changes would occur after accidental or intentional burning of the bones was also studied. - Highlights: • The LIBS analysis of (animal) bones is presented, to establish its feasibility for forensic studies. • Untreated bones and bones subjected to high temperatures (boiled, burned) were analyzed. • A simple calibration, using a single reference sample, gave reasonable quantitative results. • The comparison of the results demonstrates that LIBS analysis can provide nutritional information. • The nutritional information obtained are the same on untreated, boiled and burned bones

  8. Nondestructive assay methodologies in nuclear forensics analysis

    International Nuclear Information System (INIS)

    Tomar, B.S.

    2016-01-01

    In the present chapter, the nondestructive assay (NDA) methodologies used for analysis of nuclear materials as a part of nuclear forensic investigation have been described. These NDA methodologies are based on (i) measurement of passive gamma and neutrons emitted by the radioisotopes present in the nuclear materials, (ii) measurement of gamma rays and neutrons emitted after the active interrogation of the nuclear materials with a source of X-rays, gamma rays or neutrons

  9. A SURVEY ON DOCUMENT CLUSTERING APPROACH FOR COMPUTER FORENSIC ANALYSIS

    OpenAIRE

    Monika Raghuvanshi*, Rahul Patel

    2016-01-01

    In a forensic analysis, large numbers of files are examined. Much of the information comprises of in unstructured format, so it’s quite difficult task for computer forensic to perform such analysis. That’s why to do the forensic analysis of document within a limited period of time require a special approach such as document clustering. This paper review different document clustering algorithms methodologies for example K-mean, K-medoid, single link, complete link, average link in accorandance...

  10. Nuclear Forensics and Radiochemistry: Reaction Networks

    Energy Technology Data Exchange (ETDEWEB)

    Rundberg, Robert S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-11-22

    In the intense neutron flux of a nuclear explosion the production of isotopes may occur through successive neutron induced reactions. The pathway to these isotopes illustrates both the complexity of the problem and the need for high quality nuclear data. The growth and decay of radioactive isotopes can follow a similarly complex network. The Bateman equation will be described and modified to apply to the transmutation of isotopes in a high flux reactor. A alternative model of growth and decay, the GD code, that can be applied to fission products will also be described.

  11. Activation Analysis in Forensic Science. Survey Paper

    Energy Technology Data Exchange (ETDEWEB)

    Jervis, R. E. [University of Toronto, Toronto (Canada)

    1967-10-15

    Recently the unique features of the activation analysis method have been utilized to advantage to meet some specialized needs in the scientific investigation of crime. A review of the principal forensic activation analysis applications to biological materials to date indicates that they may be roughly classified as: (i) the detection and determination of residues of toxic materials in foodstuffs, human tissues, sera and excreta; (ii) the 'individualization' of hair, fibres, narcotics and drugs; and (iii) investigation of the transference of ballistic material to bone, cloth or paper. Analyses of these materials in some actual forensic investigations have been perfected to the point of acceptance in the law courts of several countries. Additional and broader areas of application are under development in a number of nuclear and forensic laboratories. (i) The determination of sub microgram quantities of phosphorus compounds, arsenic, mercury, selenium and thallium in specimens from post-mortem examinations and from living persons showing symptoms of toxicity has revealed certain ingestion of abnormal amount of toxic substances by comparison with similar specimens from healthy persons. In some cases, with tissues such as hair and nails, the time scale of the ingestion of arsenic or mercury has been revealed through the distribution of the deposited element with distance from the growing end or edge. (ii) A series of feasibility studies on the possibility of distinguishing similar materials through their characteristic trace-element patterns have resulted from observations of the wide range or variation in trace impurity content in specimens which come from different individuals or different natural sources. For example, extensive activation analyses for more than twenty elements in human head hair from many people have been carried out and a statistical analysis of the results indicate that activation hair comparisons in forensic investigations may be quite definitive

  12. Photogrammetry Tool for Forensic Analysis

    Science.gov (United States)

    Lane, John

    2012-01-01

    A system allows crime scene and accident scene investigators the ability to acquire visual scene data using cameras for processing at a later time. This system uses a COTS digital camera, a photogrammetry calibration cube, and 3D photogrammetry processing software. In a previous instrument developed by NASA, the laser scaling device made use of parallel laser beams to provide a photogrammetry solution in 2D. This device and associated software work well under certain conditions. In order to make use of a full 3D photogrammetry system, a different approach was needed. When using multiple cubes, whose locations relative to each other are unknown, a procedure that would merge the data from each cube would be as follows: 1. One marks a reference point on cube 1, then marks points on cube 2 as unknowns. This locates cube 2 in cube 1 s coordinate system. 2. One marks reference points on cube 2, then marks points on cube 1 as unknowns. This locates cube 1 in cube 2 s coordinate system. 3. This procedure is continued for all combinations of cubes. 4. The coordinate of all of the found coordinate systems is then merged into a single global coordinate system. In order to achieve maximum accuracy, measurements are done in one of two ways, depending on scale: when measuring the size of objects, the coordinate system corresponding to the nearest cube is used, or when measuring the location of objects relative to a global coordinate system, a merged coordinate system is used. Presently, traffic accident analysis is time-consuming and not very accurate. Using cubes with differential GPS would give absolute positions of cubes in the accident area, so that individual cubes would provide local photogrammetry calibration to objects near a cube.

  13. Real-time Forensic Disaster Analysis

    Science.gov (United States)

    Wenzel, F.; Daniell, J.; Khazai, B.; Mühr, B.; Kunz-Plapp, T.; Markus, M.; Vervaeck, A.

    2012-04-01

    The Center for Disaster Management and Risk Reduction Technology (CEDIM, www.cedim.de) - an interdisciplinary research center founded by the German Research Centre for Geoscience (GFZ) and Karlsruhe Institute of Technology (KIT) - has embarked on a new style of disaster research known as Forensic Disaster Analysis. The notion has been coined by the Integrated Research on Disaster Risk initiative (IRDR, www.irdrinternational.org) launched by ICSU in 2010. It has been defined as an approach to studying natural disasters that aims at uncovering the root causes of disasters through in-depth investigations that go beyond the reconnaissance reports and case studies typically conducted after disasters. In adopting this comprehensive understanding of disasters CEDIM adds a real-time component to the assessment and evaluation process. By comprehensive we mean that most if not all relevant aspects of disasters are considered and jointly analysed. This includes the impact (human, economy, and infrastructure), comparisons with recent historic events, social vulnerability, reconstruction and long-term impacts on livelihood issues. The forensic disaster analysis research mode is thus best characterized as "event-based research" through systematic investigation of critical issues arising after a disaster across various inter-related areas. The forensic approach requires (a) availability of global data bases regarding previous earthquake losses, socio-economic parameters, building stock information, etc.; (b) leveraging platforms such as the EERI clearing house, relief-web, and the many sources of local and international sources where information is organized; and (c) rapid access to critical information (e.g., crowd sourcing techniques) to improve our understanding of the complex dynamics of disasters. The main scientific questions being addressed are: What are critical factors that control loss of life, of infrastructure, and for economy? What are the critical interactions

  14. Forensic analysis of rockfall scars

    Science.gov (United States)

    de Vilder, Saskia J.; Rosser, Nick J.; Brain, Matthew J.

    2017-10-01

    We characterise and analyse the detachment (scar) surfaces of rockfalls to understand the mechanisms that underpin their failure. Rockfall scars are variously weathered and comprised of both discontinuity release surfaces and surfaces indicative of fracturing through zones of previously intact rock, known as rock bridges. The presence of rock bridges and pre-existing discontinuities is challenging to quantify due to the difficulty in determining discontinuity persistence below the surface of a rock slope. Rock bridges form an important control in holding blocks onto rockslopes, with their frequency, extent and location commonly modelled from the surface exposure of daylighting discontinuities. We explore an alternative approach to assessing their role, by characterising failure scars. We analyse a database of multiple rockfall scar surfaces detailing the areal extent, shape, and location of broken rock bridges and weathered surfaces. Terrestrial laser scanning and gigapixel imagery were combined to record the detailed texture and surface morphology. From this, scar surfaces were mapped via automated classification based on RGB pixel values. Our analysis of the resulting data from scars on the North Yorkshire coast (UK) indicates a wide variation in both weathering and rock bridge properties, controlled by lithology and associated rock mass structure. Importantly, the proportion of rock bridges in a rockfall failure surface does not increase with failure size. Rather larger failures display fracturing through multiple rock bridges, and in contrast smaller failures fracture occurs only through a single critical rock bridge. This holds implications for how failure mechanisms change with rockfall size and shape. Additionally, the location of rock bridges with respect to the geometry of an incipient rockfall is shown to determine failure mode. Weathering can occur both along discontinuity surfaces and previously broken rock bridges, indicating the sequential stages of

  15. Analysis of forensic odontological examinations at the National Forensic Service of Korea from 2011 to 2015.

    Science.gov (United States)

    Roh, Byung-Yoon; Lee, Won-Joon; Seo, Jeong-Uk; Lee, U-Young; Lee, Sang-Seob

    2018-03-02

    The National Forensic Service (NFS) of Korea is a government agency responsible for examining and evaluating evidence obtained at crime scenes. The Section of Forensic Odontology of the Medical Examiner's Office conducts forensic odontological analyses of human remains, and mainly criminal cases are handled. In this study, 588 forensic odontological cases referred to NFS during 2011-2015 were analyzed for referral pattern, evidence material, examination criteria, and other factors and were compared with respective data from 2007 to 2010. Majority of the requests were internal (further dental examinations after autopsy) rather than external (direct requests from other agencies such as police departments). Regarding evidence materials, "Teeth" (including teeth and resected jaws) were dominant evidences. Due to the seasonal effects in Korea, the highest number of requests was in September of each year, but the number of requests in April has recently increased. Evidence materials were mostly found in suburban and rural area, especially in mountainous area due to the geographic characteristics of Korea. Regarding specific examinations, profiling, including age estimation, accounted for majority of the requests; this number had increased relative to the findings of a previous study, whereas the number of requests for dental identification and bite mark analysis had decreased. With this analysis, trends in forensic odontology can be observed, and we expect that these trends would be served as a reference for designing study and making training protocol for forensic odontology. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Semantic Linking and Contextualization for Social Forensic Text Analysis

    NARCIS (Netherlands)

    Ren, Z.; van Dijk, D.; Graus, D.; van der Knaap, N.; Henseler, H.; de Rijke, M.; Brynielsson, J.; Johansson, F.

    2013-01-01

    With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity

  17. Forensic image analysis - CCTV distortion and artefacts.

    Science.gov (United States)

    Seckiner, Dilan; Mallett, Xanthé; Roux, Claude; Meuwly, Didier; Maynard, Philip

    2018-04-01

    As a result of the worldwide deployment of surveillance cameras, authorities have gained a powerful tool that captures footage of activities of people in public areas. Surveillance cameras allow continuous monitoring of the area and allow footage to be obtained for later use, if a criminal or other act of interest occurs. Following this, a forensic practitioner, or expert witness can be required to analyse the footage of the Person of Interest. The examination ultimately aims at evaluating the strength of evidence at source and activity levels. In this paper, both source and activity levels are inferred from the trace, obtained in the form of CCTV footage. The source level alludes to features observed within the anatomy and gait of an individual, whilst the activity level relates to activity undertaken by the individual within the footage. The strength of evidence depends on the value of the information recorded, where the activity level is robust, yet source level requires further development. It is therefore suggested that the camera and the associated distortions should be assessed first and foremost and, where possible, quantified, to determine the level of each type of distortion present within the footage. A review of the 'forensic image analysis' review is presented here. It will outline the image distortion types and detail the limitations of differing surveillance camera systems. The aim is to highlight various types of distortion present particularly from surveillance footage, as well as address gaps in current literature in relation to assessment of CCTV distortions in tandem with gait analysis. Future work will consider the anatomical assessment from surveillance footage. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  19. Forensic Learning Disability Nursing Role Analysis

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne; Melling, Kat

    2011-01-01

    This article reports on a study carried out on the role constructs of forensic and nonforensic Learning Disability Nursing in relation to six binary themes. The aims were to identify if there were differences in perceptions of forensic learning disability nurses and nonforensic learning disability nurses in relation to the six binary themes of the…

  20. Uses of software in digital image analysis: a forensic report

    Science.gov (United States)

    Sharma, Mukesh; Jha, Shailendra

    2010-02-01

    Forensic image analysis is required an expertise to interpret the content of an image or the image itself in legal matters. Major sub-disciplines of forensic image analysis with law enforcement applications include photo-grammetry, photographic comparison, content analysis and image authentication. It has wide applications in forensic science range from documenting crime scenes to enhancing faint or indistinct patterns such as partial fingerprints. The process of forensic image analysis can involve several different tasks, regardless of the type of image analysis performed. Through this paper authors have tried to explain these tasks, which are described in to three categories: Image Compression, Image Enhancement & Restoration and Measurement Extraction. With the help of examples like signature comparison, counterfeit currency comparison and foot-wear sole impression using the software Canvas and Corel Draw.

  1. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Suleman Khan

    2014-01-01

    Full Text Available Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  2. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.

    Science.gov (United States)

    Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  3. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Science.gov (United States)

    Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880

  4. Forensic analysis of online marketing for electronic nicotine delivery systems.

    Science.gov (United States)

    Cobb, Nathan K; Brookover, Jody; Cobb, Caroline O

    2015-03-01

    Electronic nicotine delivery systems (ENDS) are growing in awareness and use in the USA. They are currently unregulated as the Food and Drug Administration has yet to assert jurisdiction under its tobacco authority over these products, and a US Court of Appeals held they cannot be regulated as drugs/delivery devices if they are not marketed for a therapeutic purpose. Observation of the current online marketplace suggests ENDS, like some nutraceutical products, are being promoted using affiliate marketing techniques using claims concerning purported health benefits. This study performed a forensic analysis to characterise the relationships between online ENDS affiliate advertisements and ENDS sellers, and evaluated descriptive content on advertisements and websites to inform future policy and regulatory efforts. A purposive sampling strategy was used to identify three forms of ENDS advertising. Web proxy software recorded identifiable objects and their ties to each other. Network analysis of these ties followed, as well as analysis of descriptive content on advertisements and websites identified. The forensic analysis included four ENDS advertisements, two linked affiliate websites, and two linked seller websites, and demonstrated a multilevel relationship between advertisements and sellers with multiple layers of redirection. Descriptive analysis indicated that advertisements and affiliates, but not linked sellers, included smoking cessation claims. Results suggest that ENDS sellers may be trying to distance marketing efforts containing unsubstantiated claims from sales. A separate descriptive analysis of 20 ENDS seller web pages indicated that the use of affiliate marketing by sellers may be widespread. These findings support increased monitoring and regulation of ENDS marketing to prevent deceptive marketing tactics and ensure consumer safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please

  5. Windows forensic analysis toolkit advanced analysis techniques for Windows 7

    CERN Document Server

    Carvey, Harlan

    2012-01-01

    Now in its third edition, Harlan Carvey has updated "Windows Forensic Analysis Toolkit" to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements "Windows Forensic Analysis Toolkit, 2nd Edition", (ISBN: 9781597494229), which focuses primarily on XP. It includes complete coverage and examples on Windows 7 systems. It contains Lessons from the Field, Case Studies, and War Stories. It features companion online material, including electronic printable checklists, cheat sheets, free custom tools, ...

  6. Estimating the measurement uncertainty in forensic blood alcohol analysis.

    Science.gov (United States)

    Gullberg, Rod G

    2012-04-01

    For many reasons, forensic toxicologists are being asked to determine and report their measurement uncertainty in blood alcohol analysis. While understood conceptually, the elements and computations involved in determining measurement uncertainty are generally foreign to most forensic toxicologists. Several established and well-documented methods are available to determine and report the uncertainty in blood alcohol measurement. A straightforward bottom-up approach is presented that includes: (1) specifying the measurand, (2) identifying the major components of uncertainty, (3) quantifying the components, (4) statistically combining the components and (5) reporting the results. A hypothetical example is presented that employs reasonable estimates for forensic blood alcohol analysis assuming headspace gas chromatography. These computations are easily employed in spreadsheet programs as well. Determining and reporting measurement uncertainty is an important element in establishing fitness-for-purpose. Indeed, the demand for such computations and information from the forensic toxicologist will continue to increase.

  7. Guidelines for procedures of a harmonised digital forensic process in network forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-08-01

    Full Text Available Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can...

  8. [Forensic analysis of injuries in dentistry].

    Science.gov (United States)

    Heltai, Nóra; Baráth, Zoltán; Kereszty, Éva M

    2016-03-13

    Documentation and evaluation of dental injuries in forensic medicine are rather problematic. It needs a professional work up why dental injuries are out of focus, and how the diagnosis, pattern and treatment are influenced by novel approaches of dentistry. The aims of the authors were to characterize dental injuries, to compare their own findings to literature data concerning the type and characteristics of injuries, and propose a diagnostic workflow. Expert's reports between 2009 and 2013 at the Department of Forensic Medicine, University of Szeged were reviewed. Review of about 7000 reports revealed only 20 cases with dental injury, which is in contrast with literature data indicating a significantly higher frequency of dental injuries. Although the number of "dental cases" was low, there were several additional cases where the trauma probably affected the teeth but the injury was not documented. In future more attention is needed in forensic evaluation of the mechanism, therapeutic strategy and prognosis of dental injuries.

  9. The future of forensic DNA analysis

    Science.gov (United States)

    Butler, John M.

    2015-01-01

    The author's thoughts and opinions on where the field of forensic DNA testing is headed for the next decade are provided in the context of where the field has come over the past 30 years. Similar to the Olympic motto of ‘faster, higher, stronger’, forensic DNA protocols can be expected to become more rapid and sensitive and provide stronger investigative potential. New short tandem repeat (STR) loci have expanded the core set of genetic markers used for human identification in Europe and the USA. Rapid DNA testing is on the verge of enabling new applications. Next-generation sequencing has the potential to provide greater depth of coverage for information on STR alleles. Familial DNA searching has expanded capabilities of DNA databases in parts of the world where it is allowed. Challenges and opportunities that will impact the future of forensic DNA are explored including the need for education and training to improve interpretation of complex DNA profiles. PMID:26101278

  10. Extraction and Forensic Analysis of wearables

    NARCIS (Netherlands)

    Rongen, J.; Geradts, Z.

    2017-01-01

    Wearables are an increasingly big item in mobile forensics, in large part due to the ever increasing popularity of social media. A device that falls into this category is Google Glass. A big part of the Google Glass interface is dedicated to social media functions. A side-effect of these functions

  11. Web Content Management Systems: An Analysis of Forensic Investigatory Challenges.

    Science.gov (United States)

    Horsman, Graeme

    2018-02-26

    With an increase in the creation and maintenance of personal websites, web content management systems are now frequently utilized. Such systems offer a low cost and simple solution for those seeking to develop an online presence, and subsequently, a platform from which reported defamatory content, abuse, and copyright infringement has been witnessed. This article provides an introductory forensic analysis of the three current most popular web content management systems available, WordPress, Drupal, and Joomla! Test platforms have been created, and their site structures have been examined to provide guidance for forensic practitioners facing investigations of this type. Result's document available metadata for establishing site ownership, user interactions, and stored content following analysis of artifacts including Wordpress's wp_users, and wp_comments tables, Drupal's "watchdog" records, and Joomla!'s _users, and _content tables. Finally, investigatory limitations documenting the difficulties of investigating WCMS usage are noted, and analysis recommendations are offered. © 2018 American Academy of Forensic Sciences.

  12. Intelligent wireless forensic model (IWFM) for moving devices between wireless networks

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2008-09-01

    Full Text Available Donald, Forensic Analysis of the Contents of Nokia Mobile Phones, 2006, Pp 1-4. [3] W.G. Kruse and J.G. Heiser, Computer Forensics, Incident response essentials, Addison-Wesley, Boston, 2001. [4] M. Kohn, J.H.P. Eloff, M. Olivier, Framework for a Digital...

  13. QUALITY ASSURANCE GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following quality assurance guidelines to provide laboratories engaged in forensic analysis of chemical evidence associated with terrorism a framework to implement a quality assura...

  14. Insane defendants and forensic convicts: before and after the onset of the new forensic psychiatry network and the criminal justice system reform in Chile.

    Science.gov (United States)

    Cid, Rodrigo D

    2010-09-01

    Like other Latin American democratic societies, Chile is supposed to respect legal rights of mentally ill people who are in trouble with the law, and provide them protection, treatment and welfare. Therefore, in this decade, the Chilean Criminal Justice and Mental Health System has undergone significant changes. Because this article is related to the recent social features that involve different areas such as justice, mental health assistance and forensic psychiatry systems, and thereby the nonexistence of current literature that reviews this matter from a global perspective and its implications for the mental health population involved in the justice system, its review and analysis seems to be interesting. The 'New Forensic Psychiatry Network' (NFPN) has been putting in relevant efforts to offer proper treatment and forensic assessment taking into account the civil rights of mentally insane people, and the 'Criminal Justice System Reform' (CJSR) is making possible legal conditions for better justice ensuring a more just resolution of insane defendants' and mentally ill convicts' lawsuits. From the author's viewpoint, all these changes are leading to a deep cultural impact on a Chilean's mind, changing their vision of justice and how society should respect insane defendants' and mentally ill convicts' legal rights.

  15. Forensic analysis of explosions: Inverse calculation of the charge mass

    NARCIS (Netherlands)

    Voort, M.M. van der; Wees, R.M.M. van; Brouwer, S.D.; Jagt-Deutekom, M.J. van der; Verreault, J.

    2015-01-01

    Forensic analysis of explosions consists of determining the point of origin, the explosive substance involved, and the charge mass. Within the EU fP7 project Hyperion, TNO developed the Inverse Explosion Analysis (TNO-IEA) tool to estïmate the charge mass and point of origin based on observed damage

  16. Shrunken head (tsantsa): a complete forensic analysis procedure.

    Science.gov (United States)

    Charlier, P; Huynh-Charlier, I; Brun, L; Hervé, C; de la Grandmaison, G Lorin

    2012-10-10

    Based on the analysis of shrunken heads referred to our forensic laboratory for anthropological expertise, and data from both anthropological and medical literature, we propose a complete forensic procedure for the analysis of such pieces. A list of 14 original morphological criteria has been developed, based on the global aspect, color, physical deformation, anatomical details, and eventual associated material (wood, vegetal fibers, sand, charcoals, etc.). Such criteria have been tested on a control sample of 20 tsantsa (i.e. shrunken heads from the Jivaro or Shuar tribes of South America). Further complementary analyses are described such as CT-scan and microscopic examination. Such expertise is more and more asked to forensic anthropologists and practitioners in a context of global repatriation of human artifacts to native communities. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  17. Forensic document analysis using scanning microscopy

    Science.gov (United States)

    Shaffer, Douglas K.

    2009-05-01

    The authentication and identification of the source of a printed document(s) can be important in forensic investigations involving a wide range of fraudulent materials, including counterfeit currency, travel and identity documents, business and personal checks, money orders, prescription labels, travelers checks, medical records, financial documents and threatening correspondence. The physical and chemical characterization of document materials - including paper, writing inks and printed media - is becoming increasingly relevant for law enforcement agencies, with the availability of a wide variety of sophisticated commercial printers and copiers which are capable of producing fraudulent documents of extremely high print quality, rendering these difficult to distinguish from genuine documents. This paper describes various applications and analytical methodologies using scanning electron miscoscopy/energy dispersive (x-ray) spectroscopy (SEM/EDS) and related technologies for the characterization of fraudulent documents, and illustrates how their morphological and chemical profiles can be compared to (1) authenticate and (2) link forensic documents with a common source(s) in their production history.

  18. Analysis of errors in forensic science

    Directory of Open Access Journals (Sweden)

    Mingxiao Du

    2017-01-01

    Full Text Available Reliability of expert testimony is one of the foundations of judicial justice. Both expert bias and scientific errors affect the reliability of expert opinion, which in turn affects the trustworthiness of the findings of fact in legal proceedings. Expert bias can be eliminated by replacing experts; however, it may be more difficult to eliminate scientific errors. From the perspective of statistics, errors in operation of forensic science include systematic errors, random errors, and gross errors. In general, process repetition and abiding by the standard ISO/IEC:17025: 2005, general requirements for the competence of testing and calibration laboratories, during operation are common measures used to reduce errors that originate from experts and equipment, respectively. For example, to reduce gross errors, the laboratory can ensure that a test is repeated several times by different experts. In applying for forensic principles and methods, the Federal Rules of Evidence 702 mandate that judges consider factors such as peer review, to ensure the reliability of the expert testimony. As the scientific principles and methods may not undergo professional review by specialists in a certain field, peer review serves as an exclusive standard. This study also examines two types of statistical errors. As false-positive errors involve a higher possibility of an unfair decision-making, they should receive more attention than false-negative errors.

  19. Neutron activation analysis - an aid to forensic science

    International Nuclear Information System (INIS)

    Chattopadhyay, N.; Basu, A.K.; Tripathi, A.B.R.; Bhadkambekar, C.A.; Shukla, S.K.

    2006-01-01

    Forensic Science is oriented towards the examination of evidence specimens, collected from a scene of crime in order to establish the link between the criminal and the crime. This science therefore has a profound role to play in criminal justice delivery system. The importance of neutron activation analysis (NAA) as a specialised technique to aid crime investigation has emerged and has been recognised

  20. Review of the study and application on nuclear forensic analysis

    International Nuclear Information System (INIS)

    Liu Cheng'an; Song Jiashu; Wu Jun

    2009-01-01

    For the interests of national security, many scientists who work in the field of nuclear forensic analysis have carried out extensive work in the past on the detection of radioactive material and attributions study, developed a series of scientific and technical means to trace and detect illicit circulation of nuclear materials used to weapons and other radioactive materials which impair public security. All these questions relate to physical, chemical, biological attribution of materials. The nuclear forensic analysis has already become a special, up-to-date sphere of learning. The goal of the study of nuclear forensics is to prevent terrorists from acquiring not only nuclear weapons but also mate- rials that can be used to make such weapons, including radioactive materials for nuclear power plants, and medical radioisotope to and provide us as many clues of environmental links as possible that could help us trace the smuggling path, to answer the following questions: What is the material? Where did it come from? How did it pass from legitimate to illicit use? How did it get to where it was interdicted? Who did it? This paper outlines the contents, analysis means and application of nuclear forensics. (authors)

  1. My-Forensic-Loci-queries (MyFLq) framework for analysis of forensic STR data generated by massive parallel sequencing.

    Science.gov (United States)

    Van Neste, Christophe; Vandewoestyne, Mado; Van Criekinge, Wim; Deforce, Dieter; Van Nieuwerburgh, Filip

    2014-03-01

    Forensic scientists are currently investigating how to transition from capillary electrophoresis (CE) to massive parallel sequencing (MPS) for analysis of forensic DNA profiles. MPS offers several advantages over CE such as virtually unlimited multiplexy of loci, combining both short tandem repeat (STR) and single nucleotide polymorphism (SNP) loci, small amplicons without constraints of size separation, more discrimination power, deep mixture resolution and sample multiplexing. We present our bioinformatic framework My-Forensic-Loci-queries (MyFLq) for analysis of MPS forensic data. For allele calling, the framework uses a MySQL reference allele database with automatically determined regions of interest (ROIs) by a generic maximal flanking algorithm which makes it possible to use any STR or SNP forensic locus. Python scripts were designed to automatically make allele calls starting from raw MPS data. We also present a method to assess the usefulness and overall performance of a forensic locus with respect to MPS, as well as methods to estimate whether an unknown allele, which sequence is not present in the MySQL database, is in fact a new allele or a sequencing error. The MyFLq framework was applied to an Illumina MiSeq dataset of a forensic Illumina amplicon library, generated from multilocus STR polymerase chain reaction (PCR) on both single contributor samples and multiple person DNA mixtures. Although the multilocus PCR was not yet optimized for MPS in terms of amplicon length or locus selection, the results show excellent results for most loci. The results show a high signal-to-noise ratio, correct allele calls, and a low limit of detection for minor DNA contributors in mixed DNA samples. Technically, forensic MPS affords great promise for routine implementation in forensic genomics. The method is also applicable to adjacent disciplines such as molecular autopsy in legal medicine and in mitochondrial DNA research. Copyright © 2013 The Authors. Published by

  2. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.

  3. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    Science.gov (United States)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  4. Elliptical Fourier analysis: fundamentals, applications, and value for forensic anthropology.

    Science.gov (United States)

    Caple, Jodi; Byrd, John; Stephan, Carl N

    2017-11-01

    The numerical description of skeletal morphology enables forensic anthropologists to conduct objective, reproducible, and structured tests, with the added capability of verifying morphoscopic-based analyses. One technique that permits comprehensive quantification of outline shape is elliptical Fourier analysis. This curve fitting technique allows a form's outline to be approximated via the sum of multiple sine and cosine waves, permitting the profile perimeter of an object to be described in a dense (continuous) manner at a user-defined level of precision. A large amount of shape information (the entire perimeter) can thereby be collected in contrast to other methods relying on sparsely located landmarks where information falling in between the landmarks fails to be acquired. First published in 1982, elliptical Fourier analysis employment in forensic anthropology from 2000 onwards reflects a slow uptake despite large computing power that makes its calculations easy to conduct. Without hurdles arising from calculation speed or quantity, the slow uptake may partly reside with the underlying mathematics that on first glance is extensive and potentially intimidating. In this paper, we aim to bridge this gap by pictorially illustrating how elliptical Fourier harmonics work in a simple step-by-step visual fashion to facilitate universal understanding and as geared towards increased use in forensic anthropology. We additionally provide a short review of the method's utility for osteology, a summary of past uses in forensic anthropology, and software options for calculations that largely save the user the trouble of coding customized routines.

  5. State of the art in bile analysis in forensic toxicology.

    Science.gov (United States)

    Bévalot, F; Cartiser, N; Bottinelli, C; Guitton, J; Fanton, L

    2016-02-01

    In forensic toxicology, alternative matrices to blood are useful in case of limited, unavailable or unusable blood sample, suspected postmortem redistribution or long drug intake-to-sampling interval. The present article provides an update on the state of knowledge for the use of bile in forensic toxicology, through a review of the Medline literature from 1970 to May 2015. Bile physiology and technical aspects of analysis (sampling, storage, sample preparation and analytical methods) are reported, to highlight specificities and consequences from an analytical and interpretative point of view. A table summarizes cause of death and quantification in bile and blood of 133 compounds from more than 200 case reports, providing a useful tool for forensic physicians and toxicologists involved in interpreting bile analysis. Qualitative and quantitative interpretation is discussed. As bile/blood concentration ratios are high for numerous molecules or metabolites, bile is a matrix of choice for screening when blood concentrations are low or non-detectable: e.g., cases of weak exposure or long intake-to-death interval. Quantitative applications have been little investigated, but small molecules with low bile/blood concentration ratios seem to be good candidates for quantitative bile-based interpretation. Further experimental data on the mechanism and properties of biliary extraction of xenobiotics of forensic interest are required to improve quantitative interpretation. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  6. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  7. Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies

    OpenAIRE

    Yusoff, Mohd Najwadi; Dehghantanha, Ali; Mahmod, Ramlan

    2017-01-01

    Development of mobile web-centric OS such as Firefox OS has created new challenges, and opportunities for digital investigators. Network traffic forensic plays an important role in cybercrime investigation to detect subject(s) and object(s) of the crime. In this chapter, we detect and analyze residual network traffic artefacts of Firefox OS in relation to two popular social networking applications (Facebook and Twitter) and one instant messaging application (Telegram). We utilized a Firefox O...

  8. Application of forensic image analysis in accident investigations.

    Science.gov (United States)

    Verolme, Ellen; Mieremet, Arjan

    2017-09-01

    Forensic investigations are primarily meant to obtain objective answers that can be used for criminal prosecution. Accident analyses are usually performed to learn from incidents and to prevent similar events from occurring in the future. Although the primary goal may be different, the steps in which information is gathered, interpreted and weighed are similar in both types of investigations, implying that forensic techniques can be of use in accident investigations as well. The use in accident investigations usually means that more information can be obtained from the available information than when used in criminal investigations, since the latter require a higher evidence level. In this paper, we demonstrate the applicability of forensic techniques for accident investigations by presenting a number of cases from one specific field of expertise: image analysis. With the rapid spread of digital devices and new media, a wealth of image material and other digital information has become available for accident investigators. We show that much information can be distilled from footage by using forensic image analysis techniques. These applications show that image analysis provides information that is crucial for obtaining the sequence of events and the two- and three-dimensional geometry of an accident. Since accident investigation focuses primarily on learning from accidents and prevention of future accidents, and less on the blame that is crucial for criminal investigations, the field of application of these forensic tools may be broader than would be the case in purely legal sense. This is an important notion for future accident investigations. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Microfluidic Devices for Forensic DNA Analysis: A Review.

    Science.gov (United States)

    Bruijns, Brigitte; van Asten, Arian; Tiggelaar, Roald; Gardeniers, Han

    2016-08-05

    Microfluidic devices may offer various advantages for forensic DNA analysis, such as reduced risk of contamination, shorter analysis time and direct application at the crime scene. Microfluidic chip technology has already proven to be functional and effective within medical applications, such as for point-of-care use. In the forensic field, one may expect microfluidic technology to become particularly relevant for the analysis of biological traces containing human DNA. This would require a number of consecutive steps, including sample work up, DNA amplification and detection, as well as secure storage of the sample. This article provides an extensive overview of microfluidic devices for cell lysis, DNA extraction and purification, DNA amplification and detection and analysis techniques for DNA. Topics to be discussed are polymerase chain reaction (PCR) on-chip, digital PCR (dPCR), isothermal amplification on-chip, chip materials, integrated devices and commercially available techniques. A critical overview of the opportunities and challenges of the use of chips is discussed, and developments made in forensic DNA analysis over the past 10-20 years with microfluidic systems are described. Areas in which further research is needed are indicated in a future outlook.

  10. Chiral Drug Analysis in Forensic Chemistry: An Overview

    Directory of Open Access Journals (Sweden)

    Cláudia Ribeiro

    2018-01-01

    Full Text Available Many substances of forensic interest are chiral and available either as racemates or pure enantiomers. Application of chiral analysis in biological samples can be useful for the determination of legal or illicit drugs consumption or interpretation of unexpected toxicological effects. Chiral substances can also be found in environmental samples and revealed to be useful for determination of community drug usage (sewage epidemiology, identification of illicit drug manufacturing locations, illegal discharge of sewage and in environmental risk assessment. Thus, the purpose of this paper is to provide an overview of the application of chiral analysis in biological and environmental samples and their relevance in the forensic field. Most frequently analytical methods used to quantify the enantiomers are liquid and gas chromatography using both indirect, with enantiomerically pure derivatizing reagents, and direct methods recurring to chiral stationary phases.

  11. Forensic Comparison of Soil Samples Using Nondestructive Elemental Analysis.

    Science.gov (United States)

    Uitdehaag, Stefan; Wiarda, Wim; Donders, Timme; Kuiper, Irene

    2017-07-01

    Soil can play an important role in forensic cases in linking suspects or objects to a crime scene by comparing samples from the crime scene with samples derived from items. This study uses an adapted ED-XRF analysis (sieving instead of grinding to prevent destruction of microfossils) to produce elemental composition data of 20 elements. Different data processing techniques and statistical distances were evaluated using data from 50 samples and the log-LR cost (C llr ). The best performing combination, Canberra distance, relative data, and square root values, is used to construct a discriminative model. Examples of the spatial resolution of the method in crime scenes are shown for three locations, and sampling strategy is discussed. Twelve test cases were analyzed, and results showed that the method is applicable. The study shows how the combination of an analysis technique, a database, and a discriminative model can be used to compare multiple soil samples quickly. © 2016 American Academy of Forensic Sciences.

  12. Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics

    OpenAIRE

    Aboluwarin , Oluwapelumi; Andriotis , Panagiotis; Takasu , Atsuhiro; Tryfonas , Theo

    2016-01-01

    Part 2: MOBILE DEVICE FORENSICS; International audience; Mobile devices are now the dominant medium for communications. Humans express various emotions when communicating with others and these communications can be analyzed to deduce their emotional inclinations. Natural language processing techniques have been used to analyze sentiment in text. However, most research involving sentiment analysis in the short message domain (SMS and Twitter) do not account for the presence of non-dictionary w...

  13. Chiral Drug Analysis in Forensic Chemistry: An Overview

    OpenAIRE

    Cláudia Ribeiro; Cristiana Santos; Valter Gonçalves; Ana Ramos; Carlos Afonso; Maria Elizabeth Tiritan

    2018-01-01

    Many substances of forensic interest are chiral and available either as racemates or pure enantiomers. Application of chiral analysis in biological samples can be useful for the determination of legal or illicit drugs consumption or interpretation of unexpected toxicological effects. Chiral substances can also be found in environmental samples and revealed to be useful for determination of community drug usage (sewage epidemiology), identification of illicit drug manufacturing locations, ille...

  14. PIZZARO: Forensic analysis and restoration of image and video data

    Czech Academy of Sciences Publication Activity Database

    Kamenický, Jan; Bartoš, Michal; Flusser, Jan; Mahdian, Babak; Kotera, Jan; Novozámský, Adam; Saic, Stanislav; Šroubek, Filip; Šorel, Michal; Zita, Aleš; Zitová, Barbara; Šíma, Z.; Švarc, P.; Hořínek, J.

    2016-01-01

    Roč. 264, č. 1 (2016), s. 153-166 ISSN 0379-0738 R&D Projects: GA MV VG20102013064; GA ČR GA13-29225S Institutional support: RVO:67985556 Keywords : Image forensic analysis * Image restoration * Image tampering detection * Image source identification Subject RIV: JD - Computer Applications, Robotics Impact factor: 1.989, year: 2016 http://library.utia.cas.cz/separaty/2016/ZOI/kamenicky-0459504.pdf

  15. Social Media in Crisis Management and Forensic Disaster Analysis

    Science.gov (United States)

    Dittrich, André; Lucas, Christian

    2014-05-01

    Today, modern sensors or sensor networks provide good quality measurements for the observation of large-scale emergencies as a result of natural disasters. Mostly however, only at certain points in their respective locations and for a very limited number of measurement parameters (e.g. seismograph) and not over the entire course of a disaster event. The proliferation of different social media application (e.g. Twitter, Facebook, Google+, etc.), yields the possibility to use the resulting data as a free and fast supplement or complement to traditional monitoring techniques. In particular, these new channels can serve for rapid detection, for information gathering for emergency protection and for information dissemination. Thus, each user of these networks represents a so-called virtual sensor ('social sensor'), whose eyewitness account can be important for understanding the situation on the ground. The advantages of these social sensors are the high mobility, the versatility of the parameters that can be captured (text, images, videos, etc.) as well as the rapid spread of information. Due to the subjective characteristics however, the data often show different quality and quantity. Against this background, it is essential for an application in crisis management to reasonably (pre-)process the data from social media. Hence, fully-automated processes are used which adequately filter and structure the enormous amount of information and associate it with an event, respectively, a geographic location. This is done through statistical monitoring of the volume of messages (Twitter) in different geographic regions of the world. In combination with a frequency analysis with respect to disaster-relevant terms (in 43 languages), thematic as well as spatio-temporal clustering, an initial assessment regarding the severity and extent of the detected event, its classification and (spatio-temporal) localization can be achieved. This detection in real time (2-5 minutes) thus allows

  16. Analysis of transferred fragrance and its forensic implications.

    Science.gov (United States)

    Gherghel, Simona; Morgan, Ruth M; Blackman, Christopher S; Karu, Kersti; Parkin, Ivan P

    2016-12-01

    Perfumes are widely used by many people in developed countries, and a large number of both men and women wear perfumes on a daily basis. Analysis of perfume trace materials from clothing is not commonly employed within forensic casework, yet as a form of trace evidence it has the potential to provide valuable intelligence. In order to appreciate the value of trace evidence there is a fundamental need for an evidence base that can both offer insight into how a trace material behaves under different scenarios and activities, and from which inferences can be made. With this purpose a gas chromatography-mass spectrometry method for trace analysis of perfumes was developed. This paper presents two different series of experiments that investigate the dynamics of perfume transfer as a factor of perfume ageing time, and as a factor of perfume contact time. Empirical data showed that both perfume ageing time, and perfume contact time play a key role in the number of perfume components transferred. These studies have implication for forensic protocols, specifically for perfume trace evidence collection, analysis, interpretation, and presentation, and there is potentially great value in analysing perfumes from clothing exhibits in forensic enquiries that involve close contact between individuals, such as sexual assaults. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  17. Recent trend and perspectives in forensic anthropology: a bibliometric analysis.

    Science.gov (United States)

    Gualdi-Russo, Emanuela; Fonti, Giulia

    2013-06-01

    This paper evaluates research in Forensic Anthropology (FA) in order to report on the state of this field of science. In particular, we carried out a review of all PubMed-listed scientific studies in the past decades using "forensic anthropology" as the keyword. In our "meta-analysis", we observed variation in the number of publications per 2-year interval throughout the study period. In total, 1589 studies were found in the database and 1292 of them were published in the period 2000-2009. There was a significant positive correlation between the number of published articles and time (subdivided into 2-year intervals). The rate of increase was lower in the last decade. Based on the observed trend, we expect that the phenomenon will continue in the near future, reaching a number close to 400 FA publications in PubMed in the biennium 2012-13. We also carried out a specific content analysis of all FA papers published in the journal Forensic Science International in the last decade. During this period, the majority of FA papers concerned skeletal biology, although there was a positive shift toward virtual anthropological studies.

  18. Statistical methods for the forensic analysis of striated tool marks

    Energy Technology Data Exchange (ETDEWEB)

    Hoeksema, Amy Beth [Iowa State Univ., Ames, IA (United States)

    2013-01-01

    In forensics, fingerprints can be used to uniquely identify suspects in a crime. Similarly, a tool mark left at a crime scene can be used to identify the tool that was used. However, the current practice of identifying matching tool marks involves visual inspection of marks by forensic experts which can be a very subjective process. As a result, declared matches are often successfully challenged in court, so law enforcement agencies are particularly interested in encouraging research in more objective approaches. Our analysis is based on comparisons of profilometry data, essentially depth contours of a tool mark surface taken along a linear path. In current practice, for stronger support of a match or non-match, multiple marks are made in the lab under the same conditions by the suspect tool. We propose the use of a likelihood ratio test to analyze the difference between a sample of comparisons of lab tool marks to a field tool mark, against a sample of comparisons of two lab tool marks. Chumbley et al. (2010) point out that the angle of incidence between the tool and the marked surface can have a substantial impact on the tool mark and on the effectiveness of both manual and algorithmic matching procedures. To better address this problem, we describe how the analysis can be enhanced to model the effect of tool angle and allow for angle estimation for a tool mark left at a crime scene. With sufficient development, such methods may lead to more defensible forensic analyses.

  19. Forensic Chemistry

    Science.gov (United States)

    Bell, Suzanne

    2009-07-01

    Forensic chemistry is unique among chemical sciences in that its research, practice, and presentation must meet the needs of both the scientific and the legal communities. As such, forensic chemistry research is applied and derivative by nature and design, and it emphasizes metrology (the science of measurement) and validation. Forensic chemistry has moved away from its analytical roots and is incorporating a broader spectrum of chemical sciences. Existing forensic practices are being revisited as the purview of forensic chemistry extends outward from drug analysis and toxicology into such diverse areas as combustion chemistry, materials science, and pattern evidence.

  20. Forensic genetic analysis of bio-geographical ancestry.

    Science.gov (United States)

    Phillips, Chris

    2015-09-01

    With the great strides made in the last ten years in the understanding of human population variation and the detailed characterization of the genome, it is now possible to identify sets of ancestry informative markers suitable for relatively small-scale PCR-based assays and use them to analyze the ancestry of an individual from forensic DNA. This review outlines some of the current understanding of past human population structure and how it may have influenced the complex distribution of contemporary human diversity. A simplified description of human diversity can provide a suitable basis for choosing the best ancestry-informative markers, which is important given the constraints of multiplex sizes in forensic DNA tests. It is also important to decide the level of geographic resolution that is realistic to ensure the balance between informativeness and an over-simplification of complex human diversity patterns. A detailed comparison is made of the most informative ancestry markers suitable for forensic use and assessments are made of the data analysis regimes that can provide statistical inferences of a DNA donor's bio-geographical ancestry. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  1. State of practice and emerging application of analytical techniques of nuclear forensic analysis: highlights from the 4th Collaborative Materials Exercise of the Nuclear Forensics International Technical Working Group (ITWG)

    Energy Technology Data Exchange (ETDEWEB)

    Schwantes, Jon M.; Marsden, Oliva; Pellegrini, Kristi L.

    2016-09-16

    Founded in 1996 upon the initiative of the “Group of 8” governments (G8), the Nuclear Forensics International Technical Working Group (ITWG) is an ad hoc organization of official nuclear forensics practitioners (scientists, law enforcement, and regulators) that can be called upon to provide technical assistance to the global community in the event of a seizure of nuclear or radiological materials. The ITWG is supported by and is affiliated with roughly 40 countries and international partner organizations including the International Atomic Energy Agency (IAEA), EURATOM, INTERPOL, EUROPOL, and the United Nations Interregional Crime and Justice Research Institute (UNICRI). Besides providing a network of nuclear forensics laboratories that are able to assist law enforcement during a nuclear smuggling event, the ITWG is also committed to the advancement of the science of nuclear forensic analysis, largely through participation in periodic table top and Collaborative Materials Exercises (CMXs). Exercise scenarios use “real world” samples with realistic forensics investigation time constraints and reporting requirements. These exercises are designed to promote best practices in the field and test, evaluate, and improve new technical capabilities, methods and techniques in order to advance the science of nuclear forensics. The ITWG recently completed its fourth CMX in the 20 year history of the organization. This was also the largest materials exercise to date, with participating laboratories from 16 countries or organizations. Three samples of low enriched uranium were shipped to these laboratories as part of an illicit trafficking scenario, for which each laboratory was asked to conduct nuclear forensic analyses in support of a fictitious criminal investigation. An objective review of the State Of Practice and Art of international nuclear forensic analysis based upon the outcome of this most recent exercise is provided.

  2. Hair analysis as evidence in forensic cases.

    Science.gov (United States)

    Moeller, M R; Fey, P; Sachs, H

    1993-12-01

    Because hair analysis can be used for the determination of drug use months after drug consumption, hair analysis data can often act as important and even decisive evidence in the courtroom. More recently developed GC/MS methods offer excellent sensitivity and can make the distinction between chronic heroin and codeine use, which was not possible earlier with radioimmunoassay techniques. From more than a thousand hair analyses, the morphine/codeine ratios necessary to determine heroin use were set at 5:1 for low morphine concentrations (< 1 ng/mg hair) and 2:1 for concentrations above 1 ng/mg hair. The distinction can be further focused with the additional analysis of the metabolite monoacetylmorphine (MAM). As can be seen from several case examples, hair analysis cannot pinpoint an exact date of opiate use, but it can be used to validate or invalidate a subject's statement concerning his/her drug consumption. Interpretations should always be made cautiously. Ranges, means and medians are also listed for amphetamine, cocaine and cannabis and work is under way to draw similar safety guidelines for these drugs.

  3. Forensic Analysis of Digital Image Tampering

    Science.gov (United States)

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...used to embed the hidden watermark is Steganography Software F5 version 11+ discussed in Section 2.2. Original JPEG Image – 580 x 435 – 17.4

  4. Forensic Analysis Demonstration via Hawaii Five-O

    Science.gov (United States)

    Shmaefsky, Brian R.

    2006-01-01

    "Forensics," in its most universal sense, is defined as the use of science or technology in the investigation and establishment of facts or evidence for determining identity or relatedness. Most forensic reasoning is used for arguing legal matters. However, forensic studies are also used in agronomy, biology, chemistry, geology, and…

  5. Objective analysis of toolmarks in forensics

    Energy Technology Data Exchange (ETDEWEB)

    Grieve, Taylor N. [Iowa State Univ., Ames, IA (United States)

    2013-01-01

    Since the 1993 court case of Daubert v. Merrell Dow Pharmaceuticals, Inc. the subjective nature of toolmark comparison has been questioned by attorneys and law enforcement agencies alike. This has led to an increased drive to establish objective comparison techniques with known error rates, much like those that DNA analysis is able to provide. This push has created research in which the 3-D surface profile of two different marks are characterized and the marks’ cross-sections are run through a comparative statistical algorithm to acquire a value that is intended to indicate the likelihood of a match between the marks. The aforementioned algorithm has been developed and extensively tested through comparison of evenly striated marks made by screwdrivers. However, this algorithm has yet to be applied to quasi-striated marks such as those made by the shear edge of slip-joint pliers. The results of this algorithm’s application to the surface of copper wire will be presented. Objective mark comparison also extends to comparison of toolmarks made by firearms. In an effort to create objective comparisons, microstamping of firing pins and breech faces has been introduced. This process involves placing unique alphanumeric identifiers surrounded by a radial code on the surface of firing pins, which transfer to the cartridge’s primer upon firing. Three different guns equipped with microstamped firing pins were used to fire 3000 cartridges. These cartridges are evaluated based on the clarity of their alphanumeric transfers and the clarity of the radial code surrounding the alphanumerics.

  6. Computer-aided fiber analysis for crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Arndt, Christian; Makrushin, Andrey; Dittmann, Jana

    2012-03-01

    The forensic analysis of fibers is currently completely manual and therefore time consuming. The automation of analysis steps can significantly support forensic experts and reduce the time, required for the investigation. Moreover, a subjective expert belief is extended by objective machine estimation. This work proposes the pattern recognition pipeline containing the digital acquisition of a fiber media, the pre-processing for fiber segmentation, and the extraction of the distinctive characteristics of fibers. Currently, basic geometrical features like width, height, area of optically dominant fibers are investigated. In order to support the automatic classification of fibers, supervised machine learning algorithms are evaluated. The experimental setup includes a car seat and two pieces clothing of a different fabric. As preliminary work, acrylic as synthetic and sheep wool as natural fiber are chosen to be classified. While sitting on the seat, a test person leaves textile fibers. The test aims at automatic distinguishing of clothes through the fiber traces gained from the seat with the help of adhesive tape. The digitalization of fiber samples is provided by a contactless chromatic white light sensor. First test results showed, that two optically very different fibers can be properly assigned to their corresponding fiber type. The best classifier achieves an accuracy of 75 percent correctly classified samples for our suggested features.

  7. [Forensic Analysis for 54 Cases of Suxamethonium Chloride Poisoning].

    Science.gov (United States)

    Zhao, Y F; Zhao, B Q; Ma, K J; Zhang, J; Chen, F Y

    2017-08-01

    To observe and analyze the performance of forensic science in the cases of suxa- methonium chloride poisoning, and to improve the identification of suxamethonium chloride poisoning. Fifty-four cases of suxamethonium chloride poisoning were collected. The rules of determination of suxamethonium chloride poisoning were observed by the retrospective analysis of pathological and toxicological changes as well as case features. The pathological features of suxamethonium chloride poisoning were similar to the general changes of sudden death, which mainly included acute pulmonary congestion and edema, and partly showed myocardial disarray and fracture. Suxamethonium chloride could be detected in the heart blood of all cases and in skin tissue of part cases. Suxa-methonium chloride poisoning has the characteristics with fast death and covert means, which are difficult to rescue and easily miss inspection. For the cases of sudden death or suspicious death, determination of suxamethonium chloride should be taken as a routine detection index to prevent missing inspection. Copyright© by the Editorial Department of Journal of Forensic Medicine

  8. The perfect match: Do criminal stereotypes bias forensic evidence analysis?

    Science.gov (United States)

    Smalarz, Laura; Madon, Stephanie; Yang, Yueran; Guyll, Max; Buck, Sarah

    2016-08-01

    This research provided the first empirical test of the hypothesis that stereotypes bias evaluations of forensic evidence. A pilot study (N = 107) assessed the content and consensus of 20 criminal stereotypes by identifying perpetrator characteristics (e.g., sex, race, age, religion) that are stereotypically associated with specific crimes. In the main experiment (N = 225), participants read a mock police incident report involving either a stereotyped crime (child molestation) or a nonstereotyped crime (identity theft) and judged whether a suspect's fingerprint matched a fingerprint recovered at the crime scene. Accompanying the suspect's fingerprint was personal information about the suspect of the type that is routinely available to fingerprint analysts (e.g., race, sex) and which could activate a stereotype. Participants most often perceived the fingerprints to match when the suspect fit the criminal stereotype, even though the prints did not actually match. Moreover, participants appeared to be unaware of the extent to which a criminal stereotype had biased their evaluations. These findings demonstrate that criminal stereotypes are a potential source of bias in forensic evidence analysis and suggest that suspects who fit criminal stereotypes may be disadvantaged over the course of the criminal justice process. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. Forensic Analysis of High Explosive Residues from Selected Cloth

    International Nuclear Information System (INIS)

    Mohamad Afiq Mohamed Huri; Umi Kalthom Ahmad

    2014-01-01

    Increased terrorist activities around the Asian region have resulted in the need for improved analytical techniques in forensic analysis. High explosive residues from post-blast clothing are often encountered as physical evidence submitted to a forensic laboratory. Therefore, this study was initiated to detect high explosives residues of cyclotrimethylenetrinitramine (RDX) and pentaerythritol tetranitrate (PETN) on selected cloth in this study. Cotton swabbing technique was employed as a simple and rapid method in recovering analytes from the sample matrix. Analytes were analyzed using Griess spot test, TLC and HPLC. TLC separation employed toluene-ethyl acetate (9:1) as a good solvent system. Reversed phase HPLC separation employed acetonitrile-water (65:35) as the mobile phase and analytes detected using a programmed wavelength. RDX was detected at 235 nm for the first 3.5 min and then switched to 215 nm for PETN. Limits of detection (LODs) of analytes were in the low ppm range (0.05 ppm for RDX and 0.25 ppm for PETN). Analyte recovery studies revealed that the type of cloth has a profound effect on the extraction efficiency. Analytes were recovered better for nylon as compared to cotton cloth. However, no analytes could be recovered from denim cloth. For post-blast samples, only RDX was detected in low concentration for both nylon and cotton cloth. (author)

  10. Impact of dynamic rate coding aspects of mobile phone networks on forensic voice comparison.

    Science.gov (United States)

    Alzqhoul, Esam A S; Nair, Balamurali B T; Guillemin, Bernard J

    2015-09-01

    Previous studies have shown that landline and mobile phone networks are different in their ways of handling the speech signal, and therefore in their impact on it. But the same is also true of the different networks within the mobile phone arena. There are two major mobile phone technologies currently in use today, namely the global system for mobile communications (GSM) and code division multiple access (CDMA) and these are fundamentally different in their design. For example, the quality of the coded speech in the GSM network is a function of channel quality, whereas in the CDMA network it is determined by channel capacity (i.e., the number of users sharing a cell site). This paper examines the impact on the speech signal of a key feature of these networks, namely dynamic rate coding, and its subsequent impact on the task of likelihood-ratio-based forensic voice comparison (FVC). Surprisingly, both FVC accuracy and precision are found to be better for both GSM- and CDMA-coded speech than for uncoded. Intuitively one expects FVC accuracy to increase with increasing coded speech quality. This trend is shown to occur for the CDMA network, but, surprisingly, not for the GSM network. Further, in respect to comparisons between these two networks, FVC accuracy for CDMA-coded speech is shown to be slightly better than for GSM-coded speech, particularly when the coded-speech quality is high, but in terms of FVC precision the two networks are shown to be very similar. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  11. Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.

    Science.gov (United States)

    Casey, Eoghan

    2017-12-28

    This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.

  12. Nuclear Forensics Technologies in Japan

    International Nuclear Information System (INIS)

    Shinohara, N.; Kimura, Y.; Okubo, A.; Tomikawa, H.

    2015-01-01

    Nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material to provide evidence for nuclear attribution by determining origin, history, transit routes and purpose involving such material. Nuclear forensics activities include sampling of the illicit material, analysis of the samples and evaluation of the attribution by comparing the analysed data with database or numerical simulation. Because the nuclear forensics methodologies provide hints of the origin of the nuclear materials used in illegal dealings or nuclear terrorism, it contributes to identify and indict offenders, hence to enhance deterrent effect against such terrorism. Worldwide network on nuclear forensics can lead to strengthening global nuclear security regime. In the ESARDA Symposium 2015, the results of research and development of fundamental nuclear forensics technologies performed in Japan Atomic Energy Agency during the term of 2011-2013 were reported, namely (1) technique to analyse isotopic composition of nuclear material, (2) technique to identify the impurities contained in the material, (3) technique to determine the age of the purified material by measuring the isotopic ratio of daughter thorium to parent uranium, (4) technique to make image data by observing particle shapes with electron microscope, and (5) prototype nuclear forensics library for comparison of the analysed data with database in order to evaluate its evidence such as origin and history. Japan’s capability on nuclear forensics and effective international cooperation are also mentioned for contribution to the international nuclear forensics community.

  13. Constructing and Classifying Email Networks from Raw Forensic Images

    Science.gov (United States)

    2016-09-01

    AUC value will be closer to 1. Figure 2.6 compares 3 different ROC curves. Figure 2.6. ROC curves compared. The dashed black curve at the top has the...main difference was the computation time. For example, on a 1275-node jazz musician network, the fast algorithm ran to completion in about one...königsberg bridges,” Scientific American , vol. 189, no. 1, pp. 66–70, 1953. [8] N. Biggs, E. K. Lloyd, and R. J. Wilson, Graph Theory, 1736-1936. Great

  14. Digital Forensics

    Science.gov (United States)

    Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott

    2017-01-01

    The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…

  15. Forensic applications

    International Nuclear Information System (INIS)

    Yellin, E.

    1981-01-01

    Modern scientific technology now plays an increasingly important role in the process of law enforcement. Neutron activation, as developed for elemental analysis offers, in many cases, the suitable answer to forensic problems. The author discusses the use NAA has been put to in forensic science. (Auth.)

  16. [The future of forensic DNA analysis for criminal justice].

    Science.gov (United States)

    Laurent, François-Xavier; Vibrac, Geoffrey; Rubio, Aurélien; Thévenot, Marie-Thérèse; Pène, Laurent

    2017-11-01

    In the criminal framework, the analysis of approximately 20 DNA microsatellites enables the establishment of a genetic profile with a high statistical power of discrimination. This technique gives us the possibility to establish or exclude a match between a biological trace detected at a crime scene and a suspect whose DNA was collected via an oral swab. However, conventional techniques do tend to complexify the interpretation of complex DNA samples, such as degraded DNA and mixture DNA. The aim of this review is to highlight the powerness of new forensic DNA methods (including high-throughput sequencing or single-cell sequencing) to facilitate the interpretation of the expert with full compliance with existing french legislation. © 2017 médecine/sciences – Inserm.

  17. Digital Forensic Analysis Of Malware Infected Machine- Case Study

    Directory of Open Access Journals (Sweden)

    Amulya Podile

    2015-08-01

    Full Text Available Abstract Internet banking has created a convenient way for us to handle our business without leaving our home. Man-in-the-Browser is a special case of Man-in-the-middle attack targeted against customers of Internet banking. One of the capabilities of Man-in-the-Browser Trojan is modification of html referred to as html injection that allows the attacker to alter the html of a page before it is sent to the browser for interpretation. In this paper the authors discussed about forensic analysis of RAM Volatile data system logs and registry collected from bank customer computer infected with Trojan and confirmed the source of attack time-stamps and the behavior of the malware by using open source and commercial tools.

  18. Genetic Approaches to Appearance and Ancestry : Improving Forensic DNA Analysis

    NARCIS (Netherlands)

    L.C. Chaitanya (Lakshmi)

    2016-01-01

    textabstractTraditionally, routine forensic casework is based on comparative grounds. DNA profiles obtained from crime-scenes are compared with those of potential suspects or DNA profiles deposited in forensic DNA databases. The principal limitation of such comparative approach is that trace

  19. Nuclear forensics

    International Nuclear Information System (INIS)

    Venugopal, V.

    2010-01-01

    Nuclear forensics is the analysis of nuclear materials recovered from either the capture of unused materials, or from the radioactive debris following a nuclear explosion and can contribute significantly to the identification of the sources of the materials and the industrial processes used to obtain them. In the case of an explosion, nuclear forensics can also reconstruct key features of the nuclear device. Nuclear forensic analysis works best in conjunction with other law enforcement, radiological protection dosimetry, traditional forensics, and intelligence work to provide the basis for attributing the materials and/or nuclear device to its originators. Nuclear forensics is a piece of the overall attribution process, not a stand-alone activity

  20. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  1. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  2. Nuclear forensics: a comprehensive model action plan for Nuclear Forensics Laboratory in India

    International Nuclear Information System (INIS)

    Deshmukh, A.V.; Nyati, S.; Fatangre, N.M.; Raghav, N.K.; Reddy, P.G.

    2013-01-01

    Nuclear forensic is an emerging and highly specialized discipline which deals with nuclear investigation and analysis of nuclear or radiological/radioactive materials. Nuclear Forensic analysis includes various methodology and analytical methods along with morphology, physical, chemical, elemental and isotopic analysis to characterize and develop nuclear database for the identification of unknown nuclear or radiological/radioactive material. The origin, source history, pathway and attribution of unknown radioactive/nuclear material is possible with certainty through Nuclear Forensics. Establishment of Nuclear Forensic Laboratory and development of expertise for nuclear investigation under one roof by developing the nuclear data base and laboratory network is need of the hour to ably address the problems of all the law enforcement and nuclear agencies. The present study provides insight in Nuclear Forensics and focuses on an urgent need for a comprehensive plan to set up Nuclear Forensic Laboratory across India. (author)

  3. NanoSIMS analysis of Bacillus spores for forensics

    Energy Technology Data Exchange (ETDEWEB)

    Weber, P K; Davisson, M L; Velsko, S P

    2010-02-23

    The threat associated with the potential use of radiological, nuclear, chemical and biological materials in terrorist acts has resulted in new fields of forensic science requiring the application of state-of-the-science analytical techniques. Since the anthrax letter attacks in the United States in the fall of 2001, there has been increased interest in physical and chemical characterization of bacterial spores. While molecular methods are powerful tools for identifying genetic differences, other methods may be able to differentiate genetically identical samples based on physical and chemical properties, as well as provide complimentary information, such as methods of production and approximate date of production. Microanalysis has the potential to contribute significantly to microbial forensics. Bacillus spores are highly structured, consisting of a core, cortex, coat, and in some species, an exosporium. This structure provides a template for constraining elemental abundance differences at the nanometer scale. The primary controls on the distribution of major elements in spores are likely structural and physiological. For example, P and Ca are known to be abundant in the spore core because that is where P-rich nucleic acids and Cadipicolinic acid are located, respectively. Trace elements are known to bind to the spore coat but the controls on these elements are less well understood. Elemental distributions and abundances may be directly related to spore production, purification and stabilization methodologies, which are of particular interest for forensic investigation. To this end, we are developing a high-resolution secondary ion mass spectrometry method using a Cameca NanoSIMS 50 to study the distribution and abundance of trace elements in bacterial spores. In this presentation we will review and compare methods for preparing and analyzing samples, as well as review results on the distribution and abundance of elements in bacterial spores. We use NanoSIMS to

  4. Ecological network analysis: network construction

    NARCIS (Netherlands)

    Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B.

    2007-01-01

    Ecological network analysis (ENA) is a systems-oriented methodology to analyze within system interactions used to identify holistic properties that are otherwise not evident from the direct observations. Like any analysis technique, the accuracy of the results is as good as the data available, but

  5. Application of modern autoradiography to nuclear forensic analysis.

    Science.gov (United States)

    Parsons-Davis, Tashi; Knight, Kim; Fitzgerald, Marc; Stone, Gary; Caldeira, Lee; Ramon, Christina; Kristo, Michael

    2018-05-01

    Modern autoradiography techniques based on phosphorimaging technology using image plates (IPs) and digital scanning can identify heterogeneities in activity distributions and reveal material properties, serving to inform subsequent analyses. Here, we have adopted these advantages for applications in nuclear forensics, the technical analysis of radioactive or nuclear materials found outside of legal control to provide data related to provenance, production history, and trafficking route for the materials. IP autoradiography is a relatively simple, non-destructive method for sample characterization that records an image reflecting the relative intensity of alpha and beta emissions from a two-dimensional surface. Such data are complementary to information gathered from radiochemical characterization via bulk counting techniques, and can guide the application of other spatially resolved techniques such as scanning electron microscopy (SEM) and secondary ion mass spectrometry (SIMS). IP autoradiography can image large 2-dimenstional areas (up to 20×40cm), with relatively low detection limits for actinides and other radioactive nuclides, and sensitivity to a wide dynamic range (10 5 ) of activity density in a single image. Distributions of radioactivity in nuclear materials can be generated with a spatial resolution of approximately 50μm using IP autoradiography and digital scanning. While the finest grain silver halide films still provide the best possible resolution (down to ∼10μm), IP autoradiography has distinct practical advantages such as shorter exposure times, no chemical post-processing, reusability, rapid plate scanning, and automated image digitization. Sample preparation requirements are minimal, and the analytical method does not consume or alter the sample. These advantages make IP autoradiography ideal for routine screening of nuclear materials, and for the identification of areas of interest for subsequent micro-characterization methods. In this

  6. Forensic analysis of explosive residues from hand swabs

    International Nuclear Information System (INIS)

    Umi Khairul Ahmad; Sumathy Rajendran; Syahidah Abu Hassan

    2008-01-01

    In the forensic examination of physical evidence for organic explosives, cotton swabs are often used to collect residue from surfaces, such as skin and post-blast debris. A preliminary study has been conducted to develop extraction method of a common energetic compound, pentaerythritol tetranitrate (PETN) from hand swabs followed by direct analysis of the resulting extract solution using high-performance liquid chromatography (HPLC) with ultraviolet (UV) detector. Analysis was performed on an octadecylsilane-based (C 18 ) column using acetonitrile-water mixture (55:45) as mobile phase. The mobile phase was pumped at 1.0 mL/ min and separation affected using an isocratic mode with the detection wavelength of 230 nm. The explosive residue was extracted from cotton swabs using acetone in an ultrasonic cold bath. The developed method was later applied to the real hand swabs samples, which were taken from three army personnel who handled PETN during a munition disposal operation at Asahan Camp Military Firing range. The acetone extract obtained using sonication method was found to be effective in recovering PETN from cotton swabs with relatively high recovery (89.5 %) and good sensitivity with detection limit as low as 2 ng. The content of PETN in the real hand swab samples were found to be in the range of 4.7-130 mg. (author)

  7. Automatic forensic analysis of automotive paints using optical microscopy.

    Science.gov (United States)

    Thoonen, Guy; Nys, Bart; Vander Haeghen, Yves; De Roy, Gilbert; Scheunders, Paul

    2016-02-01

    The timely identification of vehicles involved in an accident, such as a hit-and-run situation, bears great importance in forensics. To this end, procedures have been defined for analyzing car paint samples that combine techniques such as visual analysis and Fourier transform infrared spectroscopy. This work proposes a new methodology in order to automate the visual analysis using image retrieval. Specifically, color and texture information is extracted from a microscopic image of a recovered paint sample, and this information is then compared with the same features for a database of paint types, resulting in a shortlist of candidate paints. In order to demonstrate the operation of the methodology, a test database has been set up and two retrieval experiments have been performed. The first experiment quantifies the performance of the procedure for retrieving exact matches, while the second experiment emulates the real-life situation of paint samples that experience changes in color and texture over time. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Immunohistochemical analysis of forensic evidence from a double homicide.

    Science.gov (United States)

    Miller, Rodney T; Grantham, Ross; Lockett, Bruce; Temple-Camp, Cynric; Pang, James

    2002-12-01

    We report the use of immunohistochemical staining for analysis of forensic evidence from a double homicide. A 38-year-old woman and her 7-year-old daughter were murdered by multiple blows to the head and face with a tomahawk, resulting in multiple fragments of brain tissue scattered about the murder scene. The victims' husband and father was the main suspect, who maintained that he was out of town on business during the evening of the murders. However, a shirt taken from the suspect's car on the morning after the murders (secured by the police before the suspect visited the murder scene) was found to have two small stains. DNA analysis on the stains showed the presence of the deceased wife's DNA, and immunohistochemical stains on shirt fragments conclusively documented the presence of deep central nervous system tissue, providing the critical piece of evidence needed to arrest and prosecute the suspect. This report demonstrates that shirt or similar cloth fragments can be processed into paraffin blocks and subsequently immunostained to search for and classify types of tissue fragments that may be present on the fabric.

  9. Applicability of Machine-Learning Enabled LIBS in Post Irradiation Nuclear Forensic Analysis of High Level Waste

    International Nuclear Information System (INIS)

    Onkongi, J.; Maina, D.; Angeyo, H.K.

    2017-01-01

    Nuclear Forensics seeks Information to determine; Chemical Composition, Routes of transit, Origin (Provenance) and Intended use. Post Irradiation/Post detonation NF In a post-detonation event could you get clues/signatures from glass debris, minute sample sizes? Nuclear Forensic Technique Should be State-of -the art that is Rapid, Non-invasive, Remote ability and Non-destructive. Laser Induced Breakdown Spectroscopy (LIBS) unlike other Analytic Techniques that require tedious sample preparations such as Dissolution, digestion & matrix removal, which generate additional nuclear wastes that require proper Procedures for handling, storage & ultimate disposal, LIBS overcomes these limitations. Utility of Machine Learning Techniques employed include; Artificial Neural Networks, ANN (Regression/Modelling), Principal component Analysis, PCA (Classification) and Support Vector Machine SVM (Comparative study/Classification Machine Learning coupled with LIBS gives a state of the art analytic method. Utility of the technic in safeguards security and non-proliferation

  10. Applicability of Machine-Learning Enabled LIBS in Post Irradiation Nuclear Forensic Analysis of High Level Nuclear Waste

    International Nuclear Information System (INIS)

    Onkongi, J.; Maina, D.; Angeyo, H. K.

    2017-01-01

    Nuclear Forensics seeks Information to determine; Chemical Composition, Routes of transit, Origin (Provenance) and Intended use. Post Irradiation/Post detonation NF In a post-detonation event could you get clues/signatures from glass debris, minute sample sizes? Nuclear Forensic Technique Should be State-of -the art that is Rapid, Non-invasive, Remote ability and Non-destructive. Laser Induced Breakdown Spectroscopy (LIBS) unlike other Analytic Techniques that require tedious sample preparations such as Dissolution, digestion & matrix removal, which generate additional nuclear wastes that require proper Procedures for handling, storage & ultimate disposal, LIBS overcomes these limitations. Utility of Machine Learning Techniques employed include; Artificial Neural Networks, ANN (Regression/Modelling), Principal component Analysis, PCA (Classification) and Support Vector Machine SVM (Comparative study/Classification Machine Learning coupled with LIBS gives a state of the art analytic method. Utility of the technic in safeguards security and non-proliferation

  11. Forensic palynological analysis of intestinal contents of a Korean mummy.

    Science.gov (United States)

    Arguelles, Paulette; Reinhard, Karl; Shin, Dong Hoon

    2015-06-01

    Experimental studies show that pollen resides in the intestinal tract for a minimum of seven days to at least 21 days. Because of this long residence time, pollen analysis is an important avenue of forensic research. Pollen provides evidence of the environment of the decedent as well as foods and medicine. We analyzed a coprolite recovered from a Korean mummy. The decedent was a high-ranking general who lived during the 16th or 17th centuries. Twenty pollen types were recovered. These ranged from 100 s to 10,000 s of pollen grains per gram of coprolite. Importantly, comparison of the coprolite pollen spectrum to modern aeropalynology studies of Korea suggests that the general died in winter between middle November to late February. Economic pollen types were most abundant. Economic refers to dietary, medicinal, spice, and beverage types. Dietary pollen types include pollen from Oryza (rice), Eriogonum (buckwheat), Brassicaceae (mustard family), and Solanaceae (tomato-chile pepper family). Pollen consistent with dandelion is present and may represent its use as food. Tens of thousands of grains from water plants, bur-reed or cattail, dominate the pollen spectrum. We believe that this was introduced with water. The large numbers of water-related pollen suggest that the general consumed broth, tea, or soup for a considerable time before death. © 2015 Wiley Periodicals, Inc.

  12. Fuzzy Clustering based Methodology for Multidimensional Data Analysis in Computational Forensic Domain

    OpenAIRE

    Kilian Stoffel; Paul Cotofrei; Dong Han

    2012-01-01

    As interdisciplinary domain requiring advanced and innovative methodologies the computational forensics domain is characterized by data being simultaneously large scaled and uncertain multidimensional and approximate. Forensic domain experts trained to discover hidden pattern from crime data are limited in their analysis without the assistance of a computational intelligence approach. In this paper a methodology and an automatic procedure based on fuzzy set theory and designed to infer precis...

  13. Forensic Analysis of a Contact Lens in a Murder Case.

    Science.gov (United States)

    Zwerling, Charles S

    2016-03-01

    Contact lenses have had rare relevance in trials and/or investigations. After 5 years of burial, orbital remnants were retrieved from an exhumed body and subsequently identified as a key piece of material evidence in a murder trial. The exhumed case materials were evaluated under laboratory conditions and were determined to be contact lens remnants. Contact lens fracture and burial simulation studies were performed to provide additional corroboration of the physical findings of the exhumed contact lens remnants. This material evidence was instrumental in providing factual proof refuting the defendant's testimony in the murder trial. A brief history of contact lens composition and use is provided for understanding the methods and observational results. This forensic case study represents the first published documentation of a contact lens from an exhumed body being used in a murder investigation and establishes an operational procedure for future forensic contact lens examinations. © 2016 American Academy of Forensic Sciences.

  14. Illustration and analysis of a coordinated approach to an effective forensic trace evidence capability.

    Science.gov (United States)

    Stoney, David A; Stoney, Paul L

    2015-08-01

    An effective trace evidence capability is defined as one that exploits all useful particle types, chooses appropriate technologies to do so, and directly integrates the findings with case-specific problems. Limitations of current approaches inhibit the attainment of an effective capability and it has been strongly argued that a new approach to trace evidence analysis is essential. A hypothetical case example is presented to illustrate and analyze how forensic particle analysis can be used as a powerful practical tool in forensic investigations. The specifics in this example, including the casework investigation, laboratory analyses, and close professional interactions, provide focal points for subsequent analysis of how this outcome can be achieved. This leads to the specification of five key elements that are deemed necessary and sufficient for effective forensic particle analysis: (1) a dynamic forensic analytical approach, (2) concise and efficient protocols addressing particle combinations, (3) multidisciplinary capabilities of analysis and interpretation, (4) readily accessible external specialist resources, and (5) information integration and communication. A coordinating role, absent in current approaches to trace evidence analysis, is essential to achieving these elements. However, the level of expertise required for the coordinating role is readily attainable. Some additional laboratory protocols are also essential. However, none of these has greater staffing requirements than those routinely met by existing forensic trace evidence practitioners. The major challenges that remain are organizational acceptance, planning and implementation. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  15. Integrated computer-aided forensic case analysis, presentation, and documentation based on multimodal 3D data.

    Science.gov (United States)

    Bornik, Alexander; Urschler, Martin; Schmalstieg, Dieter; Bischof, Horst; Krauskopf, Astrid; Schwark, Thorsten; Scheurer, Eva; Yen, Kathrin

    2018-06-01

    Three-dimensional (3D) crime scene documentation using 3D scanners and medical imaging modalities like computed tomography (CT) and magnetic resonance imaging (MRI) are increasingly applied in forensic casework. Together with digital photography, these modalities enable comprehensive and non-invasive recording of forensically relevant information regarding injuries/pathologies inside the body and on its surface. Furthermore, it is possible to capture traces and items at crime scenes. Such digitally secured evidence has the potential to similarly increase case understanding by forensic experts and non-experts in court. Unlike photographs and 3D surface models, images from CT and MRI are not self-explanatory. Their interpretation and understanding requires radiological knowledge. Findings in tomography data must not only be revealed, but should also be jointly studied with all the 2D and 3D data available in order to clarify spatial interrelations and to optimally exploit the data at hand. This is technically challenging due to the heterogeneous data representations including volumetric data, polygonal 3D models, and images. This paper presents a novel computer-aided forensic toolbox providing tools to support the analysis, documentation, annotation, and illustration of forensic cases using heterogeneous digital data. Conjoint visualization of data from different modalities in their native form and efficient tools to visually extract and emphasize findings help experts to reveal unrecognized correlations and thereby enhance their case understanding. Moreover, the 3D case illustrations created for case analysis represent an efficient means to convey the insights gained from case analysis to forensic non-experts involved in court proceedings like jurists and laymen. The capability of the presented approach in the context of case analysis, its potential to speed up legal procedures and to ultimately enhance legal certainty is demonstrated by introducing a number of

  16. Soil forensics: How far can soil clay analysis distinguish between soil vestiges?

    Science.gov (United States)

    Corrêa, R S; Melo, V F; Abreu, G G F; Sousa, M H; Chaker, J A; Gomes, J A

    2018-03-01

    Soil traces are useful as forensic evidences because they frequently adhere to individuals and objects associated with crimes and can place or discard a suspect at/from a crime scene. Soil is a mixture of organic and inorganic components and among them soil clay contains signatures that make it reliable as forensic evidence. In this study, we hypothesized that soils can be forensically distinguished through the analysis of their clay fraction alone, and that samples of the same soil type can be consistently distinguished according to the distance they were collected from each other. To test these hypotheses 16 Oxisol samples were collected at distances of between 2m and 1.000m, and 16 Inceptisol samples were collected at distances of between 2m and 300m from each other. Clay fractions were extracted from soil samples and analyzed for hyperspectral color reflectance (HSI), X-ray diffraction crystallographic (XRD), and for contents of iron oxides, kaolinite and gibbsite. The dataset was submitted to multivariate analysis and results were from 65% to 100% effective to distinguish between samples from the two soil types. Both soil types could be consistently distinguished for forensic purposes according to the distance that samples were collected from each other: 1000m for Oxisol and 10m for Inceptisol. Clay color and XRD analysis were the most effective techniques to distinguish clay samples, and Inceptisol samples were more easily distinguished than Oxisol samples. Soil forensics seems a promising field for soil scientists as soil clay can be useful as forensic evidence by using routine analytical techniques from soil science. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  17. Forensic analysis of a smuggled HEU sample interdicted in Bulgaria

    International Nuclear Information System (INIS)

    Niemeyer, S.; Hutcheon, I.

    2002-01-01

    Full text: A sample of HEU was seized in Rousse, Bulgaria on May 29, 1999, at a border crossing between Bulgaria and Romania. A search of the suspect's vehicle uncovered a lead canister hidden in the car trunk. The initial examination of the contents by Bulgarian scientists indicated that the sample was indeed HEU, and subsequently arrangements were made for a U.S. team of nuclear forensics scientists from several national laboratories to conduct a thorough examination. This report gives a summary of the results. The HEU sample was contained in a glass ampoule that was embedded in a yellow wax, and in turn the wax filled the inside of the cylindrical lead container. A broad set of techniques was used to examine both nuclear and non-nuclear materials. Our general experimental approach has been previously described at meetings of the Nuclear Smuggling International Technical Working Group (ITWG), but this case represents the application of the most diverse set of nuclear forensic measurements for an actual seized sample. Analysis of the HEU itself included particle characterization, stoichiometry, impurity elements, residual nuclides, age-dating, and U and Pu isotopics. Measurements by XRD, SEM, and TEM show that sample is mostly U3O8, with minor amounts of two other phases. The powder is extremely fine-grained (160 nm mean) and quite uniform in size. Most grains (95%) are equidimensional, with the remainder rod-or plate-shaped. The U is 72.7% U-235 with a high U-236 abundance of 12.1%. The sample is reprocessed, reactor-irradiated material. The original U enrichment was 90% and the irradiation burned up about 50% of the initial U-235. Pu is present at a very low-level (3 ppb); the Pu-239 abundance is 82% with 240/239=0.12. Three fission products were detected at low levels, giving unambiguous evidence of fuel recycling. The total impurity content is about 600 ppmw (mostly S, Cl, Fe, and Br), which we interpret as indicating a batch processing operation because the

  18. Direct analysis in real time-Mass spectrometry (DART-MS) in forensic and security applications.

    Science.gov (United States)

    Pavlovich, Matthew J; Musselman, Brian; Hall, Adam B

    2018-03-01

    Over the last decade, direct analysis in real time (DART) has emerged as a viable method for fast, easy, and reliable "ambient ionization" for forensic analysis. The ability of DART to generate ions from chemicals that might be present at the scene of a criminal activity, whether they are in the gas, liquid, or solid phase, with limited sample preparation has made the technology a useful analytical tool in numerous forensic applications. This review paper summarizes many of those applications, ranging from the analysis of trace evidence to security applications, with a focus on providing the forensic scientist with a resource for developing their own applications. The most common uses for DART in forensics are in studying seized drugs, drugs of abuse and their metabolites, bulk and detonated explosives, toxic chemicals, chemical warfare agents, inks and dyes, and commercial plant and animal products that have been adulterated for economic gain. This review is meant to complement recent reviews that have described the fundamentals of the ionization mechanism and the general use of DART. We describe a wide range of forensic applications beyond the field of analyzing drugs of abuse, which dominates the literature, including common experimental and data analysis methods. © 2016 Wiley Periodicals, Inc. Mass Spec Rev 37:171-187, 2018. © 2016 Wiley Periodicals, Inc.

  19. Advanced Signal Analysis for Forensic Applications of Ground Penetrating Radar

    Energy Technology Data Exchange (ETDEWEB)

    Steven Koppenjan; Matthew Streeton; Hua Lee; Michael Lee; Sashi Ono

    2004-06-01

    Ground penetrating radar (GPR) systems have traditionally been used to image subsurface objects. The main focus of this paper is to evaluate an advanced signal analysis technique. Instead of compiling spatial data for the analysis, this technique conducts object recognition procedures based on spectral statistics. The identification feature of an object type is formed from the training vectors by a singular-value decomposition procedure. To illustrate its capability, this procedure is applied to experimental data and compared to the performance of the neural-network approach.

  20. Tooth labeling in cone-beam CT using deep convolutional neural network for forensic identification

    Science.gov (United States)

    Miki, Yuma; Muramatsu, Chisako; Hayashi, Tatsuro; Zhou, Xiangrong; Hara, Takeshi; Katsumata, Akitoshi; Fujita, Hiroshi

    2017-03-01

    In large disasters, dental record plays an important role in forensic identification. However, filing dental charts for corpses is not an easy task for general dentists. Moreover, it is laborious and time-consuming work in cases of large scale disasters. We have been investigating a tooth labeling method on dental cone-beam CT images for the purpose of automatic filing of dental charts. In our method, individual tooth in CT images are detected and classified into seven tooth types using deep convolutional neural network. We employed the fully convolutional network using AlexNet architecture for detecting each tooth and applied our previous method using regular AlexNet for classifying the detected teeth into 7 tooth types. From 52 CT volumes obtained by two imaging systems, five images each were randomly selected as test data, and the remaining 42 cases were used as training data. The result showed the tooth detection accuracy of 77.4% with the average false detection of 5.8 per image. The result indicates the potential utility of the proposed method for automatic recording of dental information.

  1. Forensic hash for multimedia information

    Science.gov (United States)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  2. Polymers on the crime scene forensic analysis of polymeric trace evidence

    CERN Document Server

    Causin, Valerio

    2015-01-01

    This book approaches the analysis of forensic contact traces from a polymer science perspective. The development of characterization methods of new or unusual traces and the improvement of existing protocols is described. The book starts with a general introduction to polymers and the issues related to transfer, persistence and recovery of polymeric traces. The chapters present a distinctive feature of polymers, discussing how it can be measured, what the practical difficulties which can be encountered in the analysis, and how useful that information is for comparison or identification purposes. Practical tips for the realization of the forensic analyses are included.

  3. Rapid nuclear forensics analysis via laser based microphotonic techniques coupled with chemometrics

    International Nuclear Information System (INIS)

    Bhatta, B.; Kalambuka, H.A.; Dehayem-Kamadjeu, A.

    2017-01-01

    Nuclear forensics (NF) is an important tool for analysis and attribution of nuclear and radiological materials (NRM) in support of nuclear security. The critical challenge in NF currently is the lack of suitable microanalytical methodologies for direct, rapid and minimally-invasive detection and quantification of NF signatures. Microphotonic techniques can achieve this task particularly when the materials are of limited size and under concealed condition. The purpose of this paper is to demonstrate the combined potential of chemometrics enabled LIBS and laser Raman spectromicroscopy (LRS) for rapid NF analysis and attribution. Using LIBS, uranium lines at 385.464 nm, 385.957 nm and 386.592 nm were identified as NF signatures in uranium ore surrogates. A multivariate calibration strategy using artificial neural network was developed for quantification of trace uranium. Principal component analysis (PCA) of LIBS spectra achieved source attribution of the ores. LRS studies on UCl3, UO3(NO3)2.6H2O, UO2SO4.3H2O and UO3 in pellet state identified the bands associated with different uranium molecules as varying in the range of (840 to 867) ± 15 cm-1. Using this signature, we have demonstrated spectral imaging of uranium under concealed conditions (author)

  4. Hair elemental analysis for forensic science using nuclear and related analytical methods

    Czech Academy of Sciences Publication Activity Database

    Kučera, Jan; Kameník, Jan; Havránek, Vladimír

    2018-01-01

    Roč. 7, č. 3 (2018), s. 65-74 ISSN 2468-1709 R&D Projects: GA ČR(CZ) GBP108/12/G108; GA MŠk LM2015056 Institutional support: RVO:61389005 Keywords : hair * forensic analysis * neutron activation analysis * particle induced X-ray emission Subject RIV: CB - Analytical Chemistry, Separation OBOR OECD: Analytical chemistry

  5. A structured approach to forensic study of explosions: The TNO Inverse Explosion Analysis tool

    NARCIS (Netherlands)

    Voort, M.M. van der; Wees, R.M.M. van; Brouwer, S.D.; Jagt-Deutekom, M.J. van der; Verreault, J.

    2015-01-01

    Forensic analysis of explosions consists of determining the point of origin, the explosive substance involved, and the charge mass. Within the EU FP7 project Hyperion, TNO developed the Inverse Explosion Analysis (TNO-IEA) tool to estimate the charge mass and point of origin based on observed damage

  6. Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity

    CERN Document Server

    Liu, Dale

    2009-01-01

    Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current

  7. DNA methylation-based forensic age prediction using artificial neural networks and next generation sequencing.

    Science.gov (United States)

    Vidaki, Athina; Ballard, David; Aliferi, Anastasia; Miller, Thomas H; Barron, Leon P; Syndercombe Court, Denise

    2017-05-01

    The ability to estimate the age of the donor from recovered biological material at a crime scene can be of substantial value in forensic investigations. Aging can be complex and is associated with various molecular modifications in cells that accumulate over a person's lifetime including epigenetic patterns. The aim of this study was to use age-specific DNA methylation patterns to generate an accurate model for the prediction of chronological age using data from whole blood. In total, 45 age-associated CpG sites were selected based on their reported age coefficients in a previous extensive study and investigated using publicly available methylation data obtained from 1156 whole blood samples (aged 2-90 years) analysed with Illumina's genome-wide methylation platforms (27K/450K). Applying stepwise regression for variable selection, 23 of these CpG sites were identified that could significantly contribute to age prediction modelling and multiple regression analysis carried out with these markers provided an accurate prediction of age (R 2 =0.92, mean absolute error (MAE)=4.6 years). However, applying machine learning, and more specifically a generalised regression neural network model, the age prediction significantly improved (R 2 =0.96) with a MAE=3.3 years for the training set and 4.4 years for a blind test set of 231 cases. The machine learning approach used 16 CpG sites, located in 16 different genomic regions, with the top 3 predictors of age belonged to the genes NHLRC1, SCGN and CSNK1D. The proposed model was further tested using independent cohorts of 53 monozygotic twins (MAE=7.1 years) and a cohort of 1011 disease state individuals (MAE=7.2 years). Furthermore, we highlighted the age markers' potential applicability in samples other than blood by predicting age with similar accuracy in 265 saliva samples (R 2 =0.96) with a MAE=3.2 years (training set) and 4.0 years (blind test). In an attempt to create a sensitive and accurate age prediction test, a next

  8. HIV forensics: pitfalls and acceptable standards in the use of phylogenetic analysis as evidence in criminal investigations of HIV transmission.

    Science.gov (United States)

    Bernard, E J; Azad, Y; Vandamme, A M; Weait, M; Geretti, A M

    2007-09-01

    Phylogenetic analysis - the study of the genetic relatedness between HIV strains - has recently been used in criminal prosecutions as evidence of responsibility for HIV transmission. In these trials, the expert opinion of virologists has been of critical importance. Phylogenetic analysis of HIV gene sequences is complex and its findings do not achieve the levels of certainty obtained with the forensic analysis of human DNA. Although two individuals may carry HIV strains that are closely related, these will not necessarily be unique to the two parties and could extend to other persons within the same transmission network. For forensic purposes, phylogenetic analysis should be conducted under strictly controlled conditions by laboratories with relevant expertise applying rigorous methods. It is vitally important to include the right controls, which should be epidemiologically and temporally relevant to the parties under investigation. Use of inappropriate controls can exaggerate any relatedness between the virus strains of the complainant and defendant as being strikingly unique. It will be often difficult to obtain the relevant controls. If convenient but less appropriate controls are used, interpretation of the findings should be tempered accordingly. Phylogenetic analysis cannot prove that HIV transmission occurred directly between two individuals. However, it can exonerate individuals by demonstrating that the defendant carries a virus strain unrelated to that of the complainant. Expert witnesses should acknowledge the limitations of the inferences that might be made and choose the correct language in both written and verbal testimony.

  9. Automated forensic DNA purification optimized for FTA card punches and identifiler STR-based PCR analysis.

    Science.gov (United States)

    Tack, Lois C; Thomas, Michelle; Reich, Karl

    2007-03-01

    Forensic labs globally face the same problem-a growing need to process a greater number and wider variety of samples for DNA analysis. The same forensic lab can be tasked all at once with processing mixed casework samples from crime scenes, convicted offender samples for database entry, and tissue from tsunami victims for identification. Besides flexibility in the robotic system chosen for forensic automation, there is a need, for each sample type, to develop new methodology that is not only faster but also more reliable than past procedures. FTA is a chemical treatment of paper, unique to Whatman Bioscience, and is used for the stabilization and storage of biological samples. Here, the authors describe optimization of the Whatman FTA Purification Kit protocol for use with the AmpFlSTR Identifiler PCR Amplification Kit.

  10. Xbox one file system data storage: A forensic analysis

    OpenAIRE

    Gravel, Caitlin Elizabeth

    2015-01-01

    The purpose of this research was to answer the question, how does the file system of the Xbox One store data on its hard disk? This question is the main focus of the exploratory research and results sought. The research is focused on digital forensic investigators and experts. An out of the box Xbox One gaming console was used in the research. Three test cases were created as viable scenarios an investigator could come across in a search and seizure of evidence. The three test cases were then...

  11. BioFoV - An open platform for forensic video analysis and biometric data extraction

    DEFF Research Database (Denmark)

    Almeida, Miguel; Correia, Paulo Lobato; Larsen, Peter Kastmand

    2016-01-01

    to tailor-made software, based on state of art knowledge in fields such as soft biometrics, gait recognition, photogrammetry, etc. This paper proposes an open and extensible platform, BioFoV (Biometric Forensic Video tool), for forensic video analysis and biometric data extraction, aiming to host some...... of the developments that researchers come up with for solving specific problems, but that are often not shared with the community. BioFoV includes a simple to use Graphical User Interface (GUI), is implemented with open software that can run in multiple software platforms, and its implementation is publicly available....

  12. DNS in Computer Forensics

    Directory of Open Access Journals (Sweden)

    Neil Fowler Wright

    2012-06-01

    Full Text Available The Domain Name Service (DNS is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures. This paper examines the history along with the rapid growth of DNS up to its current critical status. It then explores the often overlooked value of DNS query data; from packet traces, DNS cache data, and DNS logs, with its use in System Forensics and more frequently in Network Forensics, extrapolating examples and experiments that enhance knowledge.Continuing on, it details the common attacks that can be used directly against the DNS systems and services, before following on with the malicious uses of DNS in direct system attacks, Distributed Denial of Service (DDoS, traditional Denial of Service (DOS attacks and malware. It explores both cyber-criminal activities and cyber-warfare based attacks, and also extrapolates from a number of more recent attacks the possible methods for data exfiltration. It explores some of the potential analytical methodologies including; common uses in Intrusion Detection Systems (IDS, as well as infection and activity tracking in malware traffic analysis, and covers some of the associated methods around technology designed to defend against, mitigate, and/or manage these and other risks, plus the effect that ISP and nation states can have by direct manipulation of DNS queries and return traffic.This paper also investigates potential behavioural analysis and time-lining, which can then be used for the

  13. A template for constructing Bayesian networks in forensic biology cases when considering activity level propositions.

    Science.gov (United States)

    Taylor, Duncan; Biedermann, Alex; Hicks, Tacha; Champod, Christophe

    2018-03-01

    The hierarchy of propositions has been accepted amongst the forensic science community for some time. It is also accepted that the higher up the hierarchy the propositions are, against which the scientist are competent to evaluate their results, the more directly useful the testimony will be to the court. Because each case represents a unique set of circumstances and findings, it is difficult to come up with a standard structure for evaluation. One common tool that assists in this task is Bayesian networks (BNs). There is much diversity in the way that BN can be constructed. In this work, we develop a template for BN construction that allows sufficient flexibility to address most cases, but enough commonality and structure that the flow of information in the BN is readily recognised at a glance. We provide seven steps that can be used to construct BNs within this structure and demonstrate how they can be applied, using a case example. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  14. Deaths from abdominal trauma: analysis of 1888 forensic autopsies

    Directory of Open Access Journals (Sweden)

    POLYANNA HELENA COELHO BORDONI

    Full Text Available ABSTRACT Objective: to evaluate the epidemiological profile of deaths due to abdominal trauma at the Forensic Medicine Institute of Belo Horizonte, MG - Brazil. Methods: we conducted a retrospective study of the reports of deaths due to abdominal trauma autopsied from 2006 to 2011. Results: we analyzed 1.888 necropsy reports related to abdominal trauma. Penetrating trauma was more common than blunt one and gunshot wounds were more prevalent than stab wounds. Most of the individuals were male, brown-skinned, single and occupationally active. The median age was 34 years. The abdominal organs most injured in the penetrating trauma were the liver and the intestines, and in blunt trauma, the liver and the spleen. Homicide was the most prevalent circumstance of death, followed by traffic accidents, and almost half of the cases were referred to the Forensic Medicine Institute by a health unit. The blood alcohol test was positive in a third of the necropsies where it was performed. Cocaine and marijuana were the most commonly found substances in toxicology studies. Conclusion: in this sample. there was a predominance of penetrating abdominal trauma in young, brown and single men, the liver being the most injured organ.

  15. Adaptive Visual Sort and Summary of Micrographic Images of Nanoparticles for Forensic Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jurrus, Elizabeth R.; Hodas, Nathan O.; Baker, Nathan A.; Marrinan, Timothy P.; Hoover, Mark D.

    2016-05-12

    Forensic analysis of nanoparticles is often conducted through the collection and identifi- cation of electron microscopy images to determine the origin of suspected nuclear material. Each image is carefully studied by experts for classification of materials based on texture, shape, and size. Manually inspecting large image datasets takes enormous amounts of time. However, automatic classification of large image datasets is a challenging problem due to the complexity involved in choosing image features, the lack of training data available for effective machine learning methods, and the availability of user interfaces to parse through images. Therefore, a significant need exists for automated and semi-automated methods to help analysts perform accurate image classification in large image datasets. We present INStINCt, our Intelligent Signature Canvas, as a framework for quickly organizing image data in a web based canvas framework. Images are partitioned using small sets of example images, chosen by users, and presented in an optimal layout based on features derived from convolutional neural networks.

  16. Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics.

    Science.gov (United States)

    Ruffell, Alastair

    2010-10-10

    We now have a confusing set of five commonly used terms for the application of Earth evidence in forensic science. This confusion is resulting in Earth scientists who use these methods mentioning different terms, sometimes for the same type of study. Likewise, forensic scientists, police/law enforcement officers and those employed by courts of law are becoming confused as to what each term means. A nomenclatural framework (based on the first use of each term) is proposed to encourage consistency in the use of terminology. Generally, the number of Earth science applications has grown through time, from soil and sediment analysis to remote sensing and GIS. The issue of where forensic biology and microbiology sits with these uses of Earth evidence is considered. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  17. Communication Network Analysis Methods.

    Science.gov (United States)

    Farace, Richard V.; Mabee, Timothy

    This paper reviews a variety of analytic procedures that can be applied to network data, discussing the assumptions and usefulness of each procedure when applied to the complexity of human communication. Special attention is paid to the network properties measured or implied by each procedure. Factor analysis and multidimensional scaling are among…

  18. Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis

    Science.gov (United States)

    Li, Yue; Li, Chang-Tsun

    The last few years have seen the applications of Photo Response Non-Uniformity noise (PRNU) - a unique stochastic fingerprint of image sensors, to various types of digital forensic investigations such as source device identification and integrity verification. In this work we proposed a new way of extracting PRNU noise pattern, called Decomposed PRNU (DPRNU), by exploiting the difference between the physical andartificial color components of the photos taken by digital cameras that use a Color Filter Array for interpolating artificial components from physical ones. Experimental results presented in this work have shown the superiority of the proposed DPRNU to the commonly used version. We also proposed a new performance metrics, Corrected Positive Rate (CPR) to evaluate the performance of the common PRNU and the proposed DPRNU.

  19. An analysis of forensic entomological specimens by Universiti Kebangsaan Malaysia.

    Science.gov (United States)

    Syamsa, R A; Ahmad, F M S; Marwi, M A; Zuha, R M; Omar, B

    2010-09-01

    This study reviews forensic entomological specimens analysed by the Department of Parasitology & Medical Entomology, Universiti Kebangsaan Malaysia for the year 2004. A total of 10 cases (6 males and 4 females) were observed for the entomological specimens. Various types of death scenes were obtained including indoor and outdoor area such as bushes field, rubbish dumping site, and aquatic areas. Identified fly species collected from the death sites were blow flies, Chrysomya megacephala, Chrysomya rufifacies and Lucilia cuprina and unknown sarcophagid larvae, with Ch. megacephala being the most common species found in the ecologically varied death scene habitats. The post-mortem interval (PMI) estimation ranged from one to five days, based on the entomological specimens collected.

  20. The Power of Contextual Effects in Forensic Anthropology: A Study of Biasability in the Visual Interpretations of Trauma Analysis on Skeletal Remains.(Proceedings of the American Academy of Forensic Sciences. February 2013. Volume XIX.)

    OpenAIRE

    Hanson, Ian; Nakhaeizadeh, S.; Dozzi, N.

    2013-01-01

    The potential for contextual information to bias assessments in the forensic sciences has been demonstrated, focusing on the DNA, ballistics, and friction ridge analysis disciplines. This has been discussed in the National Academy of Sciences Report, Strengthening Forensic Science in the United States: A Path Forward. However, in many forensic disciplines, such as anthropology, the presence of bias, its impact on objectivity, and how to mitigate its effects is still not fully assessed or appr...

  1. Forensic Sampling and Analysis from a Single Substrate: Surface-Enhanced Raman Spectroscopy Followed by Paper Spray Mass Spectrometry.

    Science.gov (United States)

    Fedick, Patrick W; Bills, Brandon J; Manicke, Nicholas E; Cooks, R Graham

    2017-10-17

    Sample preparation is the most common bottleneck in the analysis and processing of forensic evidence. Time-consuming steps in many forensic tests involve complex separations, such as liquid and gas chromatography or various types of extraction techniques, typically coupled with mass spectrometry (e.g., LC-MS). Ambient ionization ameliorates these slow steps by reducing or even eliminating sample preparation. While some ambient ionization techniques have been adopted by the forensic community, there is significant resistance to discarding chromatography as most forensic analyses require both an identification and a confirmation technique. Here, we describe the use of a paper substrate, the surface of which has been inkjet printed with silver nanoparticles, for surface enhanced Raman spectroscopy (SERS). The same substrate can also act as the paper substrate for paper spray mass spectrometry. The coupling of SERS and paper spray ionization creates a quick, forensically feasible combination.

  2. Potential Application of Quantitative Prostate-specific Antigen Analysis in Forensic Examination of Seminal Stains

    Directory of Open Access Journals (Sweden)

    Zhenping Liu

    2015-01-01

    Full Text Available The aims of this study are to use quantitative analysis of the prostate-specific antigen (PSA in the seminal stain examination and to explore the practical value of this analysis in forensic science. For a comprehensive analysis, vaginal swabs from 48 rape cases were tested both by a PSA fluorescence analyzer (i-CHROMA Reader and by a conventional PSA strip test. To confirm the results of these PSA tests, seminal DNA was tested following differential extraction. Compared to the PSA strip test, the PSA rapid quantitative fluorescence analyzer provided the more accurate and sensitive results. More importantly, individualized schemes based on quantitative PSA results of samples can be developed to improve the quality and procedural efficiency in the forensic seminal inspection of samples prior to DNA analysis.

  3. Forensic intelligence applied to questioned document analysis: A model and its application against organized crime.

    Science.gov (United States)

    De Alcaraz-Fossoul, Josep; Roberts, Katherine A

    2017-07-01

    The capability of forensic sciences to fight crime, especially against organized criminal groups, becomes relevant in the recent economic downturn and the war on terrorism. In view of these societal challenges, the methods of combating crime should experience critical changes in order to improve the effectiveness and efficiency of the current resources available. It is obvious that authorities have serious difficulties combating criminal groups of transnational nature. These are characterized as well structured organizations with international connections, abundant financial resources and comprised of members with significant and diverse expertise. One common practice among organized criminal groups is the use of forged documents that allow for the commission of illegal cross-border activities. Law enforcement can target these movements to identify counterfeits and establish links between these groups. Information on document falsification can become relevant to generate forensic intelligence and to design new strategies against criminal activities of this nature and magnitude. This article discusses a methodology for improving the development of forensic intelligence in the discipline of questioned document analysis. More specifically, it focuses on document forgeries and falsification types used by criminal groups. It also describes the structure of international criminal organizations that use document counterfeits as means to conduct unlawful activities. The model presented is partially based on practical applications of the system that have resulted in satisfactory outcomes in our laboratory. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  4. [Forensic anthropology].

    Science.gov (United States)

    Lynnerup, Niels

    2009-09-07

    Forensic anthropology is the application of biological or physical anthropology in the service of justice. One main area is the analysis of human remains. Such analyses involve person identification by assessment of age and sex of the deceased, and comparison with ante-mortem data. Another major area is the analysis of surveillance pictures and videos. Such analyses may comprise facial and bodily morphological comparisons, multi-angle photogrammetry and gait analysis. We also perform studies of human remains for archaeologists.

  5. Error rates in forensic DNA analysis: definition, numbers, impact and communication.

    Science.gov (United States)

    Kloosterman, Ate; Sjerps, Marjan; Quak, Astrid

    2014-09-01

    . These should be reported, separately from the match probability, when requested by the court or when there are internal or external indications for error. It should also be made clear that there are various other issues to consider, like DNA transfer. Forensic statistical models, in particular Bayesian networks, may be useful to take the various uncertainties into account and demonstrate their effects on the evidential value of the forensic DNA results. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. Forensic comparative glass analysis by laser-induced breakdown spectroscopy

    International Nuclear Information System (INIS)

    Bridge, Candice M.; Powell, Joseph; Steele, Katie L.; Sigman, Michael E.

    2007-01-01

    Glass samples of four types commonly encountered in forensic examinations have been analyzed by laser-induced breakdown spectroscopy (LIBS) for the purpose of discriminating between samples originating from different sources. Some of the glass sets were also examined by laser ablation-inductively coupled plasma-mass spectrometry (LA-ICP-MS). Refractive index (RI) measurements were also made on all glass samples and the refractive index data was combined with the LIBS and with the LA-ICP-MS data to enhance discrimination. The glass types examined included float glass taken from front and side automobile windows (examined on the non-float side), automobile headlamp glass, automobile side-mirror glass and brown beverage container glass. The largest overall discrimination was obtained by employing RI data in combination with LA-ICP-MS (98.8% discrimination of 666 pairwise comparisons at 95% confidence), while LIBS in combination with RI provided a somewhat lower discrimination (87.2% discrimination of 1122 pairwise comparisons at 95% confidence). Samples of side-mirror glass were less discriminated by LIBS due to a larger variance in emission intensities, while discrimination of side-mirror glass by LA-ICP-MS remained high

  7. Validation of the direct analysis in real time source for use in forensic drug screening.

    Science.gov (United States)

    Steiner, Robert R; Larson, Robyn L

    2009-05-01

    The Direct Analysis in Real Time (DART) ion source is a relatively new mass spectrometry technique that is seeing widespread use in chemical analyses world-wide. DART studies include such diverse topics as analysis of flavors and fragrances, melamine in contaminated dog food, differentiation of writing inks, characterization of solid counterfeit drugs, and as a detector for planar chromatography. Validation of this new technique for the rapid screening of forensic evidence for drugs of abuse, utilizing the DART source coupled to an accurate mass time-of-flight mass spectrometer, was conducted. The study consisted of the determination of the lower limit of detection for the method, determination of selectivity and a comparison of this technique to established analytical protocols. Examples of DART spectra are included. The results of this study have allowed the Virginia Department of Forensic Science to incorporate this new technique into their analysis scheme for the screening of solid dosage forms of drugs of abuse.

  8. Portable XRF and principal component analysis for bill characterization in forensic science.

    Science.gov (United States)

    Appoloni, C R; Melquiades, F L

    2014-02-01

    Several modern techniques have been applied to prevent counterfeiting of money bills. The objective of this study was to demonstrate the potential of Portable X-ray Fluorescence (PXRF) technique and the multivariate analysis method of Principal Component Analysis (PCA) for classification of bills in order to use it in forensic science. Bills of Dollar, Euro and Real (Brazilian currency) were measured directly at different colored regions, without any previous preparation. Spectra interpretation allowed the identification of Ca, Ti, Fe, Cu, Sr, Y, Zr and Pb. PCA analysis separated the bills in three groups and subgroups among Brazilian currency. In conclusion, the samples were classified according to its origin identifying the elements responsible for differentiation and basic pigment composition. PXRF allied to multivariate discriminate methods is a promising technique for rapid and no destructive identification of false bills in forensic science. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Analytical and Radiochemistry for Nuclear Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-26

    Information about nonproliferation nuclear forensics, activities in forensics at Los Alamos National Laboratory, radio analytical work at LANL, radiochemical characterization capabilities, bulk chemical and materials analysis capabilities, and future interests in forensics interactions.

  10. Hair Analysis in Forensic Toxicology: An Updated Review with a Special Focus on Pitfalls.

    Science.gov (United States)

    Kintz, Pascal

    2017-01-01

    The detection of drugs in hair analysis has progressively emerged as a consequence of the enhanced sensitivity of analytical techniques used in forensic toxicology; a greater advantage in using this matrix with respect to classical ones (i.e. urine and blood) is an easier and non-invasive sample collection, even when the careful supervision of law enforcement officers is required to avoid the risk that the sample may be adulterated or replaced. Moreover, according to the length of the hair, the history of drug exposure can be retrospectively monitored from few weeks up to months or years since sample collection. Through a detailed revision of the existent literature, this manuscript provides information on the proper sample collection, preparation and analysis, as well as pitfalls in forensic hair analysis, and summarizes the wide range of application of this technology, including excessive alcohol drinking, doping, child abuse, and offences linked to drug use. Verification of history of psychotropic drugs, alcohol and doping agents use by hair analysis, hair testing for driving license regranting and drug facilitated crimes, and testing for drugs in hair of children have been reviewed together with recent trends in hair contamination and possibility to disclose use of new psychoactive substances by hair analysis. Hair analysis in forensic toxicology has been quickly emerged and improved in recent years; a deeper knowledge of advantages and limitations of this unique matrix is necessary for a better use in forensic caseworks. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  11. Forensic Science.

    Science.gov (United States)

    Brettell, T. A.; Saferstein, R.

    1989-01-01

    Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)

  12. Portable XRF and principal component analysis for bill characterization in forensic science

    International Nuclear Information System (INIS)

    Appoloni, C.R.; Melquiades, F.L.

    2014-01-01

    Several modern techniques have been applied to prevent counterfeiting of money bills. The objective of this study was to demonstrate the potential of Portable X-ray Fluorescence (PXRF) technique and the multivariate analysis method of Principal Component Analysis (PCA) for classification of bills in order to use it in forensic science. Bills of Dollar, Euro and Real (Brazilian currency) were measured directly at different colored regions, without any previous preparation. Spectra interpretation allowed the identification of Ca, Ti, Fe, Cu, Sr, Y, Zr and Pb. PCA analysis separated the bills in three groups and subgroups among Brazilian currency. In conclusion, the samples were classified according to its origin identifying the elements responsible for differentiation and basic pigment composition. PXRF allied to multivariate discriminate methods is a promising technique for rapid and no destructive identification of false bills in forensic science. - Highlights: • The paper is about a direct method for bills discrimination by EDXRF and principal component analysis. • The bills are analyzed directly, without sample preparation and non destructively. • The results demonstrates that the methodology is feasible and could be applied in forensic science for identification of origin and false banknotes. • The novelty is that portable EDXRF is very fast and efficient for bills characterization

  13. A Comparative Taphonomic Analysis of 24 Trophy Skulls from Modern Forensic Cases.

    Science.gov (United States)

    Yucha, Josephine M; Pokines, James T; Bartelink, Eric J

    2017-09-01

    Cranial remains retained from fallen enemies are commonly referred to as "trophy skulls," and many such crania were acquired as souvenirs by U.S. servicemembers during WWII and the Vietnam conflict. These remains increasingly have become the subject of forensic anthropological analysis as their possessors, typically veterans or their relatives, try to discard or repatriate them. The present research uses a qualitative analytical approach to review 24 cases of reported trophy skulls (14 previously unpublished cases and 10 from the literature) to determine which perimortem and postmortem characteristics are most useful for generating a taphonomic profile. Overall, the taphonomic signature of trophy remains includes traits relating to acquisition and preparation, ornamental display, and subsequent curation. Contextual evidence and the biological profile also are considered when determining the possible origin of human cranial remains as a trophy skull. Thorough taphonomic analysis will aid in identifying these types of remains as trophy skulls. © 2017 American Academy of Forensic Sciences.

  14. Application of dye analysis in forensic fibre and textile examination: Case examples.

    Science.gov (United States)

    Schotman, Tom G; Xu, Xiaoma; Rodewijk, Nicole; van der Weerd, Jaap

    2017-09-01

    Seven cases and a quality assurance test are presented. In these cases, fibres or textiles submitted for investigation were analysed by HPLC-DAD-MS to identify the dyes present. The cases presented illustrate that it is possible to identify textile dyes in fibre traces recovered for forensic analysis. The results show that a mixture of dyes is present in all textiles investigated, except one sample that was taken from a manufacturer dye shade card. It is concluded that dye analyses improves the evidential value of forensic fibre examinations, as it becomes possible to distinguish textiles that are different in dye chemistry, but have a similar colour. In addition dye analysis makes the examination more robust, as it becomes possible to attribute colour differences between samples to identical dyes (mixed in different ratios) or to chemically different dyes. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. The Potential of Cosmetic Applicators as a Source of DNA for Forensic Analysis.

    Science.gov (United States)

    Adamowicz, Michael S; Labonte, Renáe D; Schienman, John E

    2015-07-01

    Personal products, such as toothbrushes, have been used as both known reference and evidentiary samples for forensic DNA analysis. This study examined the viability of a broad selection of cosmetic applicators for use as targets for human DNA extraction and short tandem repeat (STR) analysis using standard polymerase chain reaction (PCR) conditions. Applicator types included eyeliner smudgers, pencils and crayons, eye shadow sponges, mascara wands, concealer wands, face makeup sponges, pads and brushes, lipsticks and balms, and lip gloss wands. The quantity and quality of DNA extracted from each type of applicator were examined by assessing the number of loci successfully amplified and the peak balance of the heterozygous alleles in each full STR profile. While degraded DNA, stochastic amplification, and PCR inhibition were observed for some items, full STR profiles were developed for 14 of 76 applicators. The face makeup sponge applicators yielded the highest proportional number of full STR profiles (4/7). © 2015 American Academy of Forensic Sciences.

  16. Forensic DNA databases in Western Balkan region: retrospectives, perspectives, and initiatives

    Science.gov (United States)

    Marjanović, Damir; Konjhodžić, Rijad; Butorac, Sara Sanela; Drobnič, Katja; Merkaš, Siniša; Lauc, Gordan; Primorac, Damir; Anđelinović, Šimun; Milosavljević, Mladen; Karan, Željko; Vidović, Stojko; Stojković, Oliver; Panić, Bojana; Vučetić Dragović, Anđelka; Kovačević, Sandra; Jakovski, Zlatko; Asplen, Chris; Primorac, Dragan

    2011-01-01

    The European Network of Forensic Science Institutes (ENFSI) recommended the establishment of forensic DNA databases and specific implementation and management legislations for all EU/ENFSI members. Therefore, forensic institutions from Bosnia and Herzegovina, Serbia, Montenegro, and Macedonia launched a wide set of activities to support these recommendations. To assess the current state, a regional expert team completed detailed screening and investigation of the existing forensic DNA data repositories and associated legislation in these countries. The scope also included relevant concurrent projects and a wide spectrum of different activities in relation to forensics DNA use. The state of forensic DNA analysis was also determined in the neighboring Slovenia and Croatia, which already have functional national DNA databases. There is a need for a ‘regional supplement’ to the current documentation and standards pertaining to forensic application of DNA databases, which should include regional-specific preliminary aims and recommendations. PMID:21674821

  17. DNA Commission of the International Society for Forensic Genetics: recommendations on forensic analysis using Y-chromosome STRs

    DEFF Research Database (Denmark)

    Gill, P; Brenner, C; Brinkmann, B

    2001-01-01

    During the past few years, the DNA Commission of the International Society of Forensic Genetics has published a series of documents providing guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. This latest report addresses...

  18. DNA commission of the International Society for Forensic Genetics: recommendations on forensic analysis using Y-chromosome STRs

    DEFF Research Database (Denmark)

    Gill, P; Brenner, C; Brinkmann, B

    2001-01-01

    During the past few years the DNA commission of the International Society of Forensic Genetics has published a series of documents providing guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. This latest report addresses...

  19. DNA Commission of the International Society of Forensic Genetics: recommendations on forensic analysis using Y-chromosome short tandem repeats

    DEFF Research Database (Denmark)

    Gill, P.; Brenner, C.; Brinkmann, B.

    2001-01-01

    During the past few years the DNA commission of the International Society of Forensic Genetics has published a series of documents providing guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. This latest report addresses a relat...

  20. Discriminant Analysis of Raman Spectra for Body Fluid Identification for Forensic Purposes

    OpenAIRE

    Sikirzhytski, Vitali; Virkler, Kelly; Lednev, Igor K.

    2010-01-01

    Detection and identification of blood, semen and saliva stains, the most common body fluids encountered at a crime scene, are very important aspects of forensic science today. This study targets the development of a nondestructive, confirmatory method for body fluid identification based on Raman spectroscopy coupled with advanced statistical analysis. Dry traces of blood, semen and saliva obtained from multiple donors were probed using a confocal Raman microscope with a 785-nm excitation wave...

  1. Parts-based detection of AK-47s for forensic video analysis

    OpenAIRE

    Jones, Justin

    2010-01-01

    Approved for public release; distribution is unlimited Law enforcement, military personnel, and forensic analysts are increasingly reliant on imaging ystems to perform in a hostile environment and require a robust method to efficiently locate bjects of interest in videos and still images. Current approaches require a full-time operator to monitor a surveillance video or to sift a hard drive for suspicious content. In this thesis, we demonstrate the effectiveness of automated analysis tools...

  2. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    sharing, an essential tool for combating money laundering and terrorist financing, verifying sanctions against rogue nations and non-state actors, tracking nuclear proliferation networks, and protecting dual-use materials. These steps can save lives without interfering with state sovereignty or individual rights. The specter of nuclear threat is real and constant. This paper will provide forensic analysis of the most effective financial tools and policies to combat that threat, placing special emphasis on multinational and public-private cooperation.

  3. Chemical Differentiation of Osseous, Dental, and Non-skeletal Materials in Forensic Anthropology using Elemental Analysis.

    Science.gov (United States)

    Zimmerman, Heather A; Meizel-Lambert, Cayli J; Schultz, John J; Sigman, Michael E

    2015-03-01

    Forensic anthropologists are generally able to identify skeletal materials (bone and tooth) using gross anatomical features; however, highly fragmented or taphonomically altered materials may be problematic to identify. Several chemical analysis techniques have been shown to be reliable laboratory methods that can be used to determine if questionable fragments are osseous, dental, or non-skeletal in nature. The purpose of this review is to provide a detailed background of chemical analysis techniques focusing on elemental compositions that have been assessed for use in differentiating osseous, dental, and non-skeletal materials. More recently, chemical analysis studies have also focused on using the elemental composition of osseous/dental materials to evaluate species and provide individual discrimination, but have generally been successful only in small, closed groups, limiting their use forensically. Despite significant advances incorporating a variety of instruments, including handheld devices, further research is necessary to address issues in standardization, error rates, and sample size/diversity. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  4. Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations.

    Science.gov (United States)

    Keegan, Elizabeth; Kristo, Michael J; Toole, Kaitlyn; Kips, Ruth; Young, Emma

    2016-02-02

    Nuclear forensic science, or "nuclear forensic", aims to answer questions about nuclear material found outside of regulatory control. In this Feature, we provide a general overview of nuclear forensics, selecting examples of key "nuclear forensic signatures" which have allowed investigators to determine the identity of unknown nuclear material in real investigations.

  5. Role of importance of X-ray fluorescence analysis of forensic samples

    International Nuclear Information System (INIS)

    Jha, Shailendra; Sharma, M.

    2009-01-01

    Full text: In the field of forensic science, it is very important to investigate the evidential samples obtained at various crime scenes. X-ray fluorescence (XRF) is used widely in forensic science [1]. Its main strength is its non-destructive nature, thus preserving evidence [2, 3]. In this paper, we report the application of XRF to examine the evidences like purity gold and silver jewelry (Indian Ornaments), remnants of glass pieces and paint chips recovered from crime scenes. The experimental measurements on these samples have been made using X-ray fluorescence spectrometer (LAB Center XRF-1800) procured from Shimazdu Scientific Inst., USA. The results are explained in terms of quantitative/ qualitative analysis of trace elements. (author)

  6. [Analysis of the Injury-disease Relationship between Spondylolysis and Trauma in 26 Forensic Identifications].

    Science.gov (United States)

    Wang, L X; Zhu, G L; Qi, L Q; Sheng, Y Y

    2016-12-01

    To expound the injury-disease relationship between spondylolysis and trauma for the points of forensic identification. Total 26 cases of spondylolysis were collected and the characteristics of this disease such as age, accompanied symptoms, treatment and injury manner were discussed. The causal relationship existed between trauma and injury consequence in 2 appraised individuals and both of them aged less than 50 years old. The injury manners of both were high-energy injury with combined injury and these 2 patients were treated by operation. The analysis of injury-disease relationship between spondylolysis and trauma should be paid attention in the middle-young age under 50 years old. More importantly, the injury-disease relationship should be analyzed in the patients who chose operative treatment. Copyright© by the Editorial Department of Journal of Forensic Medicine

  7. Whole-Genome Sequencing in Microbial Forensic Analysis of Gamma-Irradiated Microbial Materials.

    Science.gov (United States)

    Broomall, Stacey M; Ait Ichou, Mohamed; Krepps, Michael D; Johnsky, Lauren A; Karavis, Mark A; Hubbard, Kyle S; Insalaco, Joseph M; Betters, Janet L; Redmond, Brady W; Rivers, Bryan A; Liem, Alvin T; Hill, Jessica M; Fochler, Edward T; Roth, Pierce A; Rosenzweig, C Nicole; Skowronski, Evan W; Gibbons, Henry S

    2016-01-15

    Effective microbial forensic analysis of materials used in a potential biological attack requires robust methods of morphological and genetic characterization of the attack materials in order to enable the attribution of the materials to potential sources and to exclude other potential sources. The genetic homogeneity and potential intersample variability of many of the category A to C bioterrorism agents offer a particular challenge to the generation of attributive signatures, potentially requiring whole-genome or proteomic approaches to be utilized. Currently, irradiation of mail is standard practice at several government facilities judged to be at particularly high risk. Thus, initial forensic signatures would need to be recovered from inactivated (nonviable) material. In the study described in this report, we determined the effects of high-dose gamma irradiation on forensic markers of bacterial biothreat agent surrogate organisms with a particular emphasis on the suitability of genomic DNA (gDNA) recovered from such sources as a template for whole-genome analysis. While irradiation of spores and vegetative cells affected the retention of Gram and spore stains and sheared gDNA into small fragments, we found that irradiated material could be utilized to generate accurate whole-genome sequence data on the Illumina and Roche 454 sequencing platforms. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  8. Monte Carlo analysis of thermochromatography as a fast separation method for nuclear forensics

    International Nuclear Information System (INIS)

    Garrison, J.R.; Hanson, D.E.; Hall, H.L.

    2012-01-01

    Nuclear forensic science has become increasingly important for global nuclear security, and enhancing the timeliness of forensic analysis has been established as an important objective in the field. New, faster techniques must be developed to meet this objective. Current approaches for the analysis of minor actinides, fission products, and fuel-specific materials require time-consuming chemical separation coupled with measurement through either nuclear counting or mass spectrometry. These very sensitive measurement techniques can be hindered by impurities or incomplete separation in even the most painstaking chemical separations. High-temperature gas-phase separation or thermochromatography has been used in the past for the rapid separations in the study of newly created elements and as a basis for chemical classification of that element. This work examines the potential for rapid separation of gaseous species to be applied in nuclear forensic investigations. Monte Carlo modeling has been used to evaluate the potential utility of the thermochromatographic separation method, albeit this assessment is necessarily limited due to the lack of available experimental data for validation. (author)

  9. Monte Carlo analysis of thermochromatography as a fast separation method for nuclear forensics

    International Nuclear Information System (INIS)

    Hall, Howard L.

    2012-01-01

    Nuclear forensic science has become increasingly important for global nuclear security, and enhancing the timeliness of forensic analysis has been established as an important objective in the field. New, faster techniques must be developed to meet this objective. Current approaches for the analysis of minor actinides, fission products, and fuel-specific materials require time-consuming chemical separation coupled with measurement through either nuclear counting or mass spectrometry. These very sensitive measurement techniques can be hindered by impurities or incomplete separation in even the most painstaking chemical separations. High-temperature gas-phase separation or thermochromatography has been used in the past for the rapid separations in the study of newly created elements and as a basis for chemical classification of that element. This work examines the potential for rapid separation of gaseous species to be applied in nuclear forensic investigations. Monte Carlo modeling has been used to evaluate the potential utility of the thermochromatographic separation method, albeit this assessment is necessarily limited due to the lack of available experimental data for validation.

  10. Comparative analysis of LWR and FBR spent fuels for nuclear forensics evaluation

    International Nuclear Information System (INIS)

    Permana, Sidik; Suzuki, Mitsutoshi; Su'ud, Zaki

    2012-01-01

    Some interesting issues are attributed to nuclide compositions of spent fuels from thermal reactors as well as fast reactors such as a potential to reuse as recycled fuel, and a possible capability to be manage as a fuel for destructive devices. In addition, analysis on nuclear forensics which is related to spent fuel compositions becomes one of the interesting topics to evaluate the origin and the composition of spent fuels from the spent fuel foot-prints. Spent fuel compositions of different fuel types give some typical spent fuel foot prints and can be estimated the origin of source of those spent fuel compositions. Some technics or methods have been developing based on some science and technological capability including experimental and modeling or theoretical aspects of analyses. Some foot-print of nuclear forensics will identify the typical information of spent fuel compositions such as enrichment information, burnup or irradiation time, reactor types as well as the cooling time which is related to the age of spent fuels. This paper intends to evaluate the typical spent fuel compositions of light water (LWR) and fast breeder reactors (FBR) from the view point of some foot prints of nuclear forensics. An established depletion code of ORIGEN is adopted to analyze LWR spent fuel (SF) for several burnup constants and decay times. For analyzing some spent fuel compositions of FBR, some coupling codes such as SLAROM code, JOINT and CITATION codes including JFS-3-J-3.2R as nuclear data library have been adopted. Enriched U-235 fuel composition of oxide type is used for fresh fuel of LWR and a mixed oxide fuel (MOX) for FBR fresh fuel. Those MOX fuels of FBR come from the spent fuels of LWR. Some typical spent fuels from both LWR and FBR will be compared to distinguish some typical foot-prints of SF based on nuclear forensic analysis.

  11. Comparative analysis of LWR and FBR spent fuels for nuclear forensics evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Permana, Sidik; Suzuki, Mitsutoshi; Su' ud, Zaki [Department of Science and Technology for Nuclear Material Management (STNM), Japan Atomic Energy Agency (JAEA), 2-4 Shirane, Shirakata, Tokai Mura, Naka-gun, Ibaraki 319-1195 Nuclear Physics and Bio (Indonesia); Department of Science and Technology for Nuclear Material Management (STNM), Japan Atomic Energy Agency (JAEA), 2-4 Shirane, Shirakata, Tokai Mura, Naka-gun, Ibaraki 319-1195 (Japan); Nuclear Physics and Bio Physics Research Group, Department of Physics, Bandung Institute of Technology, Gedung Fisika, Jl. Ganesha 10, Bandung 40132 (Indonesia)

    2012-06-06

    Some interesting issues are attributed to nuclide compositions of spent fuels from thermal reactors as well as fast reactors such as a potential to reuse as recycled fuel, and a possible capability to be manage as a fuel for destructive devices. In addition, analysis on nuclear forensics which is related to spent fuel compositions becomes one of the interesting topics to evaluate the origin and the composition of spent fuels from the spent fuel foot-prints. Spent fuel compositions of different fuel types give some typical spent fuel foot prints and can be estimated the origin of source of those spent fuel compositions. Some technics or methods have been developing based on some science and technological capability including experimental and modeling or theoretical aspects of analyses. Some foot-print of nuclear forensics will identify the typical information of spent fuel compositions such as enrichment information, burnup or irradiation time, reactor types as well as the cooling time which is related to the age of spent fuels. This paper intends to evaluate the typical spent fuel compositions of light water (LWR) and fast breeder reactors (FBR) from the view point of some foot prints of nuclear forensics. An established depletion code of ORIGEN is adopted to analyze LWR spent fuel (SF) for several burnup constants and decay times. For analyzing some spent fuel compositions of FBR, some coupling codes such as SLAROM code, JOINT and CITATION codes including JFS-3-J-3.2R as nuclear data library have been adopted. Enriched U-235 fuel composition of oxide type is used for fresh fuel of LWR and a mixed oxide fuel (MOX) for FBR fresh fuel. Those MOX fuels of FBR come from the spent fuels of LWR. Some typical spent fuels from both LWR and FBR will be compared to distinguish some typical foot-prints of SF based on nuclear forensic analysis.

  12. AQME: A forensic mitochondrial DNA analysis tool for next-generation sequencing data.

    Science.gov (United States)

    Sturk-Andreaggi, Kimberly; Peck, Michelle A; Boysen, Cecilie; Dekker, Patrick; McMahon, Timothy P; Marshall, Charla K

    2017-11-01

    The feasibility of generating mitochondrial DNA (mtDNA) data has expanded considerably with the advent of next-generation sequencing (NGS), specifically in the generation of entire mtDNA genome (mitogenome) sequences. However, the analysis of these data has emerged as the greatest challenge to implementation in forensics. To address this need, a custom toolkit for use in the CLC Genomics Workbench (QIAGEN, Hilden, Germany) was developed through a collaborative effort between the Armed Forces Medical Examiner System - Armed Forces DNA Identification Laboratory (AFMES-AFDIL) and QIAGEN Bioinformatics. The AFDIL-QIAGEN mtDNA Expert, or AQME, generates an editable mtDNA profile that employs forensic conventions and includes the interpretation range required for mtDNA data reporting. AQME also integrates an mtDNA haplogroup estimate into the analysis workflow, which provides the analyst with phylogenetic nomenclature guidance and a profile quality check without the use of an external tool. Supplemental AQME outputs such as nucleotide-per-position metrics, configurable export files, and an audit trail are produced to assist the analyst during review. AQME is applied to standard CLC outputs and thus can be incorporated into any mtDNA bioinformatics pipeline within CLC regardless of sample type, library preparation or NGS platform. An evaluation of AQME was performed to demonstrate its functionality and reliability for the analysis of mitogenome NGS data. The study analyzed Illumina mitogenome data from 21 samples (including associated controls) of varying quality and sample preparations with the AQME toolkit. A total of 211 tool edits were automatically applied to 130 of the 698 total variants reported in an effort to adhere to forensic nomenclature. Although additional manual edits were required for three samples, supplemental tools such as mtDNA haplogroup estimation assisted in identifying and guiding these necessary modifications to the AQME-generated profile. Along

  13. Computational intelligence in digital forensics forensic investigation and applications

    CERN Document Server

    Choo, Yun-Huoy; Abraham, Ajith; Srihari, Sargur

    2014-01-01

    Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts.   This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement ...

  14. Detecting Target Data in Network Traffic

    Science.gov (United States)

    2017-03-01

    perimeter around a network and create a single point of entry where security policies can be enforced and auditing can be performed [16]. Security...that we used in this thesis. 2.4.1 bulk_extractor Bulk_extractor is a forensic analysis tool designed for directly extracting artifacts of forensic ...educated guess whether or not the file is there. Shields et al. explains that they need other forensics tools to ensure that all forensic evidence is used

  15. Network performance analysis

    CERN Document Server

    Bonald, Thomas

    2013-01-01

    The book presents some key mathematical tools for the performance analysis of communication networks and computer systems.Communication networks and computer systems have become extremely complex. The statistical resource sharing induced by the random behavior of users and the underlying protocols and algorithms may affect Quality of Service.This book introduces the main results of queuing theory that are useful for analyzing the performance of these systems. These mathematical tools are key to the development of robust dimensioning rules and engineering methods. A number of examples i

  16. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  17. Microbial population analysis improves the evidential value of faecal traces in forensic investigations.

    Science.gov (United States)

    Quaak, Frederike C A; de Graaf, Mei-Lan M; Weterings, Rob; Kuiper, Irene

    2017-01-01

    The forensic science community has a growing interest in microbial population analysis, especially the microbial populations found inside and on the human body. Both their high abundance, microbes outnumber human cells by a factor 10, and their diversity, different sites of the human body harbour different microbial communities, make them an interesting tool for forensics. Faecal material is a type of trace evidence which can be found in a variety of criminal cases, but is often being ignored in forensic investigations. Deriving a human short tandem repeat (STR) profile from a faecal sample can be challenging. However, the microbial communities within faecal material can be of additional criminalistic value in linking a faecal trace to the possible donor. We present a microarray technique in which the faecal microbial community is used to differentiate between faecal samples and developed a decision model to predict the possible common origin of questioned samples. The results show that this technique may be a useful additional tool when no or only partial human STR profiles can be generated.

  18. Analysis of computer networks

    CERN Document Server

    Gebali, Fayez

    2015-01-01

    This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together, and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling and analyzing these last two components. Topics covered include, but are not limited to: Markov chains and queuing analysis, traffic modeling, interconnection networks and switch architectures and buffering strategies.   ·         Provides techniques for modeling and analysis of network software and switching equipment; ·         Discusses design options used to build efficient switching equipment; ·         Includes many worked examples of the application of discrete-time Markov chains to communication systems; ·         Covers the mathematical theory and techniques necessary for ana...

  19. A template for constructing Bayesian networks in forensic biology cases when considering activity level propositions

    OpenAIRE

    Taylor, Duncan; Biedermann, Alex; Hicks, Tacha; Champod, Christophe

    2018-01-01

    The hierarchy of propositions has been accepted amongst the forensic science community for some time. It is also accepted that the higher up the hierarchy the propositions are, against which the scientist are competent to evaluate their results, the more directly useful the testimony will be to the court. Because each case represents a unique set of circumstances and findings, it is difficult to come up with a standard structure for evaluation. One common tool that assists in this task is Bay...

  20. Characterization and forensic analysis of soil samples using laser-induced breakdown spectroscopy (LIBS).

    Science.gov (United States)

    Jantzi, Sarah C; Almirall, José R

    2011-07-01

    A method for the quantitative elemental analysis of surface soil samples using laser-induced breakdown spectroscopy (LIBS) was developed and applied to the analysis of bulk soil samples for discrimination between specimens. The use of a 266 nm laser for LIBS analysis is reported for the first time in forensic soil analysis. Optimization of the LIBS method is discussed, and the results compared favorably to a laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS) method previously developed. Precision for both methods was LIBS limits of detection were LIBS method successfully discriminated samples from two different sites in Dade County, FL. Analysis of variance, Tukey's post hoc test and Student's t test resulted in 100% discrimination with no type I or type II errors. Principal components analysis (PCA) resulted in clear groupings of the two sites. A correct classification rate of 99.4% was obtained with linear discriminant analysis using leave-one-out validation. Similar results were obtained when the same samples were analyzed by LA-ICP-MS, showing that LIBS can provide similar information to LA-ICP-MS. In a forensic sampling/spatial heterogeneity study, the variation between sites, between sub-plots, between samples and within samples was examined on three similar Dade sites. The closer the sampling locations, the closer the grouping on a PCA plot and the higher the misclassification rate. These results underscore the importance of careful sampling for geographic site characterization.

  1. Analysis of plant soil seed banks and seed dispersal vectors: Its potential and limits for forensic investigations.

    Science.gov (United States)

    Šumberová, Kateřina; Ducháček, Michal

    2017-01-01

    Plant seeds exhibit many species-specific traits, thus potentially being especially helpful for forensic investigations. Seeds of a broad range of plant species occur in soil seed banks of various habitats and may become attached in large quantities to moving objects. Although plant seeds are now routinely used as trace evidence in forensic practice, only scant information has been published on this topic in the scientific literature. Thus, the standard methods remain unknown to specialists in such botanical subjects as plant ecology and plant geography. These specialists, if made aware of the forensic uses of seeds, could help in development of new, more sophisticated approaches. We aim to bridge the gap between forensic analysts and botanists. Therefore, we explore the available literature and compare it with our own experiences to reveal both the potential and limits of soil seed bank and seed dispersal analysis in forensic investigations. We demonstrate that habitat-specific and thus relatively rare species are of the greatest forensic value. Overall species composition, in terms of species presence/absence and relative abundance can also provide important information. In particular, the ecological profiles of seeds found on any moving object can help us identify the types of environments through which the object had travelled. We discuss the applicability of this approach to various European environments, with the ability to compare seed samples with georeferenced vegetation databases being particularly promising for forensic investigations. We also explore the forensic limitations of soil seed bank and seed dispersal vector analyses. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  2. Mobile Phone Security and Forensics A Practical Approach

    CERN Document Server

    Androulidakis, Iosif I

    2012-01-01

    Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis.

  3. Forensic archaeology and anthropology : An Australian perspective.

    Science.gov (United States)

    Oakley, Kate

    2005-09-01

    Forensic archaeology is an extremely powerful investigative discipline and, in combination with forensic anthropology, can provide a wealth of evidentiary information to police investigators and the forensic community. The re-emergence of forensic archaeology and anthropology within Australia relies on its diversification and cooperation with established forensic medical organizations, law enforcement forensic service divisions, and national forensic boards. This presents a unique opportunity to develop a new multidisciplinary approach to forensic archaeology/anthropology within Australia as we hold a unique set of environmental, social, and cultural conditions that diverge from overseas models and require different methodological approaches. In the current world political climate, more forensic techniques are being applied at scenes of mass disasters, genocide, and terrorism. This provides Australian forensic archaeology/anthropology with a unique opportunity to develop multidisciplinary models with contributions from psychological profiling, ballistics, sociopolitics, cultural anthropology, mortuary technicians, post-blast analysis, fire analysis, and other disciplines from the world of forensic science.

  4. Quality assurance and reference material requirements and considerations for environmental sample analysis in nuclear forensics

    International Nuclear Information System (INIS)

    Swindle, D.W. Jr.; Perrin, R.E.; Goldberg, S.A.; Cappis, J.

    2002-01-01

    Full text: High-sensitivity nuclear environmental sampling and analysis techniques have been proven in their ability to verify declared nuclear activities, as well as to assist in the detection of undeclared nuclear activities and facilities. Following the Gulf War, the capability and revealing power of environmental sampling and analysis techniques to support international safeguards was demonstrated and subsequently adopted by the International Atomic Energy Agency (IAEA) as routine safeguards measures in safeguards inspections and verifications. In addition to having been proved useful in international safeguards, environmental sampling and analysis techniques have demonstrated their utility in identifying the origins of 'orphaned' nuclear material, as well as the origin of intercepted smuggled nuclear material. Today, environmental sampling and analysis techniques are now being applied in six broad areas to support nonproliferation, disarmament treaty verification, national and international nuclear security, and environmental stewardship of weapons production activities. Consequently, more and more laboratories around the world are establishing capabilities or expanding capabilities to meet these growing applications, and as such requirements for quality assurance and control are increasing. The six areas are: 1) Nuclear safeguards; 2) Nuclear forensics/illicit trafficking; 3) Ongoing monitoring and verification (OMV); 4) Comprehensive Test Ban Treaty (CTBT); 5) Weapons dismantlement/materials disposition; and 6) Research and development (R and D)/environmental stewardship/safety. Application of environmental sampling and analysis techniques and resources to illicit nuclear material trafficking, while embodying the same basic techniques and resources, does have unique requirements for sample management, handling, protocols, chain of custody, archiving, and data interpretation. These requirements are derived from needs of how data from nuclear forensics

  5. The forensic analysis of soils and sediment taken from the cast of a footprint.

    Science.gov (United States)

    Bull, Peter A; Parker, Adrian; Morgan, Ruth M

    2006-10-16

    The routine production of a cast of a shoe-print taken in soil provides information other than shoe size and gait. Material adhering to the surface of the cast represents the preservation of the moment of footprint impression. The analysis of the interface between the cast and soil is therefore a potentially lucrative source of information for forensic reconstruction. These principles are demonstrated with reference to a murder case which took place in the English Midlands. The cast of a footprint provided evidence of a two-way transfer of material between the sole of a boot and the soil of a recently ploughed field. Lumps of soil, which had dried on a boot, were deposited on the field as the footprints were made. Pollen analysis of these lumps of soil indicated that the perpetrator of the imprint had been standing recently in a nearby stream. Fibre analysis together with physical and chemical characteristics of the soil suggested a provenance for contamination of this mud prior to deposition of the footprint. Carbon/nitrogen ratios of the water taken from the cast showed that distilled water had been used thus excluding the possibility of contamination of the boot-soil interface. It was possible to reconstruct three phases of previous activity of the wearer of the boot prior to leaving the footprint in the field after the murder had taken place. This analysis shows the power of integrating different independent techniques in the analysis of hitherto unrecognised forensic materials.

  6. Genetic variation and DNA markers in forensic analysis

    African Journals Online (AJOL)

    SAM

    2014-07-30

    Jul 30, 2014 ... Author(s) agree that this article remain permanently open access under the terms of the Creative Commons Attribution License. 4.0 International ... (mtDNA) is today a routine method of analysis of biological ... A promising approach in this context seems to be .... 1985; Armour et al., 1996). ...... management.

  7. Field-based detection of biological samples for forensic analysis: Established techniques, novel tools, and future innovations.

    Science.gov (United States)

    Morrison, Jack; Watts, Giles; Hobbs, Glyn; Dawnay, Nick

    2018-04-01

    Field based forensic tests commonly provide information on the presence and identity of biological stains and can also support the identification of species. Such information can support downstream processing of forensic samples and generate rapid intelligence. These approaches have traditionally used chemical and immunological techniques to elicit the result but some are known to suffer from a lack of specificity and sensitivity. The last 10 years has seen the development of field-based genetic profiling systems, with specific focus on moving the mainstay of forensic genetic analysis, namely STR profiling, out of the laboratory and into the hands of the non-laboratory user. In doing so it is now possible for enforcement officers to generate a crime scene DNA profile which can then be matched to a reference or database profile. The introduction of these novel genetic platforms also allows for further development of new molecular assays aimed at answering the more traditional questions relating to body fluid identity and species detection. The current drive for field-based molecular tools is in response to the needs of the criminal justice system and enforcement agencies, and promises a step-change in how forensic evidence is processed. However, the adoption of such systems by the law enforcement community does not represent a new strategy in the way forensic science has integrated previous novel approaches. Nor do they automatically represent a threat to the quality control and assurance practices that are central to the field. This review examines the historical need and subsequent research and developmental breakthroughs in field-based forensic analysis over the past two decades with particular focus on genetic methods Emerging technologies from a range of scientific fields that have potential applications in forensic analysis at the crime scene are identified and associated issues that arise from the shift from laboratory into operational field use are discussed

  8. Discriminant analysis of Raman spectra for body fluid identification for forensic purposes.

    Science.gov (United States)

    Sikirzhytski, Vitali; Virkler, Kelly; Lednev, Igor K

    2010-01-01

    Detection and identification of blood, semen and saliva stains, the most common body fluids encountered at a crime scene, are very important aspects of forensic science today. This study targets the development of a nondestructive, confirmatory method for body fluid identification based on Raman spectroscopy coupled with advanced statistical analysis. Dry traces of blood, semen and saliva obtained from multiple donors were probed using a confocal Raman microscope with a 785-nm excitation wavelength under controlled laboratory conditions. Results demonstrated the capability of Raman spectroscopy to identify an unknown substance to be semen, blood or saliva with high confidence.

  9. Discriminant Analysis of Raman Spectra for Body Fluid Identification for Forensic Purposes

    Directory of Open Access Journals (Sweden)

    Vitali Sikirzhytski

    2010-03-01

    Full Text Available Detection and identification of blood, semen and saliva stains, the most common body fluids encountered at a crime scene, are very important aspects of forensic science today. This study targets the development of a nondestructive, confirmatory method for body fluid identification based on Raman spectroscopy coupled with advanced statistical analysis. Dry traces of blood, semen and saliva obtained from multiple donors were probed using a confocal Raman microscope with a 785-nm excitation wavelength under controlled laboratory conditions. Results demonstrated the capability of Raman spectroscopy to identify an unknown substance to be semen, blood or saliva with high confidence.

  10. Analysis of laser and inkjet prints using spectroscopic methods for forensic identification of questioned documents

    OpenAIRE

    Gál, Lukáš; Belovičová, Michaela; Oravec, Michal; Palková, Miroslava; Čeppan, Michal

    2013-01-01

    The spectral properties in UV-VIS-NIR and IR regions of laser and inkjet prints were studied for the purposes of forensic analysis of documents. The procedures of measurements and processing of spectra of printed documents using fibre optics reflectance spectroscopy in UV-VIS and NIR region, FTIR-ATR with diamond/ZnSe and germanium crystals were optimized. It was found that the shapes of spectra of various black laser jet prints and inkjet prints generally differ in the spectral regions...

  11. Critical review of forensic trace evidence analysis and the need for a new approach.

    Science.gov (United States)

    Stoney, David A; Stoney, Paul L

    2015-06-01

    The historical development, contributions and limitations of the two traditional approaches to trace evidence analysis are reviewed. The first approach was as generalist practitioner, looking broadly at an assemblage of many different particle types. The second was that of specialist practitioner, with attention focused on one specific particle type. Four factors have significantly impacted the effectiveness of these approaches: (1) increasing technological capabilities, (2) increasing complexity in the character of manufactured materials, (3) changes in forensic laboratory management, and (4) changing scientific and legal expectations. The effectiveness of each approach is assessed within the context of these changes. More recently, new technologies have been applied to some trace evidence problems, intended to address one or more limitations. This has led to a third approach founded on discrete, highly technical methods addressing specific analytical problems. After evaluating the contributions and limitations of this third approach, we consider the different ways that technologies could be developed to address unmet needs in forensic trace evidence analysis. The route toward effective use of new technologies is contrasted with how forensic science laboratories are currently choosing and employing them. The conclusion is that although new technologies are contributing, we are not on a path that will result in their most effective and appropriate use. A new approach is required. Based on an analysis of the contributions of each of the three exisiting approaches, seven characteristics of an effective trace evidence analysis capability were determined: (1) particle traces should be a major problem-solving tool, (2) there should be readily available, straightforward methods to enable their use, (3) all available and potentially useful particle types should be considered, (4) decisions to use them should be made in the context of each case, guided by what they can

  12. Technical feasibility of the implementing of the paper analysis in forensic documentoscopy

    International Nuclear Information System (INIS)

    Perez Alfaro, Cesar Alonso

    2013-01-01

    Technical feasibility has determined the implementation of the paper analysis in forensic documentoscopy. Methods of non-destructive and destructive testing are focused in the study. The dimensions, thickness, opacity, brightness and air permeability are analyzed by the methods of non-destructive testing. The analysis of pH, fiber, humidity and ashes are performed by destructive methods. 10 samples of paper type 'Bond' are examined of the main importers from country. The chemical and anatomy of the wood are explained. The results of the non-destructive methods have achieved to differentiate 8 of the 10 samples studied. The two remaining samples have achieved to differentiate by the fibers analysis and ashes analysis. The pH has determined in the 10 samples that the pulping method has been basic. The technical differentiation of the 'Bond' paper has been possible for use in forensic documentoscopy. The fibers present in the paper are observed applying the dye 'Graff C' and using the microscope. The dye method 'Graff C' has allowed a morphologic differentiation of the organic composition of the sample of paper [es

  13. Paper Spray Mass Spectrometry for the Forensic Analysis of Black Ballpoint Pen Inks

    Science.gov (United States)

    Amador, Victoria Silva; Pereira, Hebert Vinicius; Sena, Marcelo Martins; Augusti, Rodinei; Piccin, Evandro

    2017-09-01

    This article describes the use of paper spray mass spectrometry (PS-MS) for the direct analysis of black ink writings made with ballpoint pens. The novel approach was developed in a forensic context by first performing the classification of commercially available ballpoint pens according to their brands. Six of the most commonly worldwide utilized brands (Bic, Paper Mate, Faber Castell, Pentel, Compactor, and Pilot) were differentiated according to their characteristic chemical patterns obtained by PS-MS. MS on the negative ion mode at a mass range of m/ z 100-1000 allowed prompt discrimination just by visual inspection. On the other hand, the concept of relative ion intensity (RII) and the analysis at other mass ranges were necessary for the differentiation using the positive ion mode. PS-MS combined with partial least squares (PLS) was utilized to monitor changes on the ink chemical composition after light exposure (artificial aging studies). The PLS model was optimized by variable selection, which allowed the identification of the most influencing ions on the degradation process. The feasibility of the method on forensic investigations was also demonstrated in three different applications: (1) analysis of overlapped fresh ink lines, (2) analysis of old inks from archived documents, and (3) detection of alterations (simulated forgeries) performed on archived documents. [Figure not available: see fulltext.

  14. Column: The Science of Digital Forensics: Analysis of Digital Traces

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2012-09-01

    Full Text Available In part 1 of this series (Cohen, 2011a, Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.“Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine."(see PDF for full column

  15. Differential Power Analysis as a digital forensic tool.

    Science.gov (United States)

    Souvignet, T; Frinken, J

    2013-07-10

    Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. Single cells for forensic DNA analysis--from evidence material to test tube.

    Science.gov (United States)

    Brück, Simon; Evers, Heidrun; Heidorn, Frank; Müller, Ute; Kilper, Roland; Verhoff, Marcel A

    2011-01-01

    The purpose of this project was to develop a method that, while providing morphological quality control, allows single cells to be obtained from the surfaces of various evidence materials and be made available for DNA analysis in cases where only small amounts of cell material are present or where only mixed traces are found. With the SteREO Lumar.V12 stereomicroscope and UV unit from Zeiss, it was possible to detect and assess single epithelial cells on the surfaces of various objects (e.g., glass, plastic, metal). A digitally operated micromanipulator developed by aura optik was used to lift a single cell from the surface of evidence material and to transfer it to a conventional PCR tube or to an AmpliGrid(®) from Advalytix. The actual lifting of the cells was performed with microglobes that acted as carriers. The microglobes were held with microtweezers and were transferred to the DNA analysis receptacles along with the adhering cells. In a next step, the PCR can be carried out in this receptacle without removing the microglobe. Our method allows a single cell to be isolated directly from evidence material and be made available for forensic DNA analysis. © 2010 American Academy of Forensic Sciences.

  17. An Analysis of Forensic Imaging in the Absence of Write-Blockers

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2014-09-01

    Full Text Available Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker are immediate suspect for integrity. This paper describes a research framework to examine what occurs when a forensic image is acquired without benefit of a write-blocker in order to understand the true impact of such an eventuality. The initial tests document the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.

  18. Preliminary analysis of facial hair follicle distribution for forensic identification using OCT

    Science.gov (United States)

    Zhang, Ning; Wang, Chengming; Li, Zhigang; Xie, Lanchi; Guo, Jingjing; Xu, Lei; Yan, Yuwen; Li, Zhihui; Huang, Wei; Xu, Xiaojing

    2018-02-01

    In most deaths caused by explosions, the fragment of explosive remained on the victim's body can provide valuable clues to forensic investigation. However, the examination of the skin and appendages at the scene of explosion, which may reveal clue to the identity of an individual, has not been extensively studied. Compared with visual appearance of the epidermis surface that affected by various wounds, skin adnexa embedded in the dermis has a more stable morphology as an inner biometric. Hair follicles are formed when a fetus is 5 months old and distributed fairly evenly throughout the body, with the exception of hairless palms and soles. Therefore, we focus on the distribution of hair follicles in order to infer information of age, gender, and race/ethnicity. Optical coherence tomography (OCT) is a novel forensic imaging method, which achieves non-destructive, high-resolution and most importantly cross-sectional imaging. In this study, we design and develop a custom-built spectral-domain three-dimensional (3D) OCT system with a portable handheld probe to detect and reconstruct the hair follicles in the facial skin. We test our system on the forehead and preauricular skin of 2 adult volunteers and demonstrate the high quality visualization of hair follicles beneath the epidermis. The diameter, orientation, density and shape of hair follicles can be extracted from the 3D volume data. The preliminary analysis suggests that these parameters vary from different part of body and have individual difference. Eventually, we believe 3D OCT is promising tool for the examination of hair follicles for forensic purpose.

  19. The power of contextual effects in forensic anthropology: a study of biasability in the visual interpretations of trauma analysis on skeletal remains.

    Science.gov (United States)

    Nakhaeizadeh, Sherry; Hanson, Ian; Dozzi, Nathalie

    2014-09-01

    The potential for contextual information to bias assessments in the forensic sciences has been demonstrated, in several forensic disiplines. In this paper, biasability potential within forensic anthropology was examined by analyzing the effects of external manipulations on judgments and decision-making in visual trauma assessment. Three separate websites were created containing fourteen identical images. Participants were randomly assigned to one website. Each website provided different contextual information, to assess variation of interpretation of the same images between contexts. The results indicated a higher scoring of trauma identification responses for the Mass grave context. Furthermore, a significant biasing effect was detected in the interpretation of four images. Less experienced participants were more likely to indicate presence of trauma. This research demonstrates bias impact in forensic anthropological trauma assessments and highlights the importance of recognizing and limiting cognitive vulnerabilities that forensic anthropologists might bring to the analysis. © 2014 American Academy of Forensic Sciences.

  20. Forensic odontology.

    Science.gov (United States)

    Shamim, Thorakkal

    2012-04-01

    Forensic odontology is a specialized field of dentistry which analyses dental evidence in the interest of justice. Forensic odontology embraces all dental specialities and it is almost impossible to segregate this branch from other dental specialities. This review aims to discuss the utility of various dental specialities with forensic odontology.

  1. From forensic epigenetics to forensic epigenomics: broadening DNA investigative intelligence.

    Science.gov (United States)

    Vidaki, Athina; Kayser, Manfred

    2017-12-21

    Human genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We envision future forensic applications of DNA methylation analysis that will broaden DNA-based forensic intelligence. Together with genetic prediction of appearance and biogeographic ancestry, epigenomic lifestyle prediction is expected to increase the ability of police to find unknown perpetrators of crime who are not identifiable using current forensic DNA profiling.

  2. Morphological, spectral and chromatography analysis and forensic comparison of PET fibers.

    Science.gov (United States)

    Farah, Shady; Tsach, Tsadok; Bentolila, Alfonso; Domb, Abraham J

    2014-06-01

    Poly(ethylene terephthalate) (PET) fiber analysis and comparison by spectral and polymer molecular weight determination was investigated. Plain fibers of PET, a common textile fiber and plastic material was chosen for this study. The fibers were analyzed for morphological (SEM and AFM), spectral (IR and NMR), thermal (DSC) and molecular weight (MS and GPC) differences. Molecular analysis of PET fibers by Gel Permeation Chromatography (GPC) allowed the comparison of fibers that could not be otherwise distinguished with high confidence. Plain PET fibers were dissolved in hexafluoroisopropanol (HFIP) and analyzed by GPC using hexafluoroisopropanol:chloroform 2:98 v/v as eluent. 14 PET fiber samples, collected from various commercial producers, were analyzed for polymer molecular weight by GPC. Distinct differences in the molecular weight of the different fiber samples were found which may have potential use in forensic fiber comparison. PET fibers with average molecular weights between about 20,000 and 70,000 g mol(-1) were determined using fiber concentrations in HFIP as low as 1 μg mL(-1). This GPC analytical method can be applied for exclusively distinguish between PET fibers using 1 μg of fiber. This method can be extended to forensic comparison of other synthetic fibers such as polyamides and acrylics. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. Vitreous humor analysis for the detection of xenobiotics in forensic toxicology: a review.

    Science.gov (United States)

    Bévalot, Fabien; Cartiser, Nathalie; Bottinelli, Charline; Fanton, Laurent; Guitton, Jérôme

    2016-01-01

    Vitreous humor (VH) is a gelatinous substance contained in the posterior chamber of the eye, playing a mechanical role in the eyeball. It has been the subject of numerous studies in various forensic applications, primarily for the assessment of postmortem interval and for postmortem chemical analysis. Since most of the xenobiotics present in the bloodstream are detected in VH after crossing the selective blood-retinal barrier, VH is an alternative matrix useful for forensic toxicology. VH analysis offers particular advantages over other biological matrices: it is less prone to postmortem redistribution, is easy to collect, has relatively few interfering compounds for the analytical process, and shows sample stability over time after death. The present study is an overview of VH physiology, drug transport and elimination. Collection, storage, analytical techniques and interpretation of results from qualitative and quantitative points of view are dealt with. The distribution of xenobiotics in VH samples is thus discussed and illustrated by a table reporting the concentrations of 106 drugs from more than 300 case reports. For this purpose, a survey was conducted of publications found in the MEDLINE database from 1969 through April 30, 2015.

  4. DNA degradation and genetic analysis of empty puparia: genetic identification limits in forensic entomology.

    Science.gov (United States)

    Mazzanti, Morena; Alessandrini, Federica; Tagliabracci, Adriano; Wells, Jeffrey D; Campobasso, Carlo P

    2010-02-25

    Puparial cases are common remnants of necrophagous flies in crime investigations. They usually represent the longest developmental time and, therefore, they can be very useful for the estimation of the post-mortem interval (PMI). However, before any PMI estimate, it is crucial to identify the species of fly eclosed from each puparium associated with the corpse. Morphological characteristics of the puparium are often distinctive enough to permit a species identification. But, even an accurate morphological analysis of empty puparia cannot discriminate among different species of closely related flies. Furthermore, morphological identification may be impossible if the fly puparia are poorly preserved or in fragments. This study explores the applicability of biomolecular techniques on empty puparia and their fragments for identification purposes. A total of 63 empty puparia of necrophagous Diptera resulting from forensic casework were examined. Samples were divided into three groups according to size, type and time of eclosion in order to verify whether the physical characteristics and puparia weathering can influence the amount of DNA extraction. The results suggest that a reliable genetic identification of forensically important flies may also be performed from empty puparia and/or their fragments. However, DNA degradation can deeply compromise the genetic analysis since the older the fly puparia, the smaller are the amplified fragments. 2009 Elsevier Ireland Ltd. All rights reserved.

  5. On-site and off-site forensic analysis capabilities for proliferation and terrorism prevention

    International Nuclear Information System (INIS)

    Whipple, R.E.; Nunes, P.J.; Reynolds, J.G.; Alcaraz, A.; Hart, B.R.

    2004-01-01

    Full text: We will present current on-site technologies that can be utilized for the screening of explosives, chemical agents, and environmental contaminants. These techniques must have the capability to detect various hazardous materials at very low levels, since they pose a major challenge for first responders. Specifically, the technology must detect concealed explosives or chemical agents on-site rapidly. Lawrence Livermore National Laboratory (LLNL) is currently developing several different high explosive screening and detection technologies for field use. Two technologies that have demonstrated an ability to screen for explosives at low levels are colorimetric spot tests and thin layer chromatography (TLC). Another technology that has demonstrated usefulness for the on-site analysis of unknowns is portable gas chromatography-mass spectrometry (GC-MS) with solid phase micro-extraction (SPME) sampling. Several examples utilizing these technologies and their usefulness will be presented. In addition to developing on-site screening methods, LLNL is an Organization for the Prohibition of Chemical Weapons (OPCW) designated laboratory and is certified to accept CW suspect samples. Currently, LLNL is expanding its ISO-17025 certification to include nuclear forensics and explosives. These off-site forensic analysis capabilities and certified procedures will support the needs for homeland security. We will highlight some of the ISO-17025 requirements to accredit procedures, handle samples, and reports. Work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract W-7405-ENG-48

  6. On-site and off-site forensic analysis capabilities for proliferation and terrorism prevention

    International Nuclear Information System (INIS)

    Hart, B.R.; Whipple, R.E.; Nunes, P.J.; Reynolds, J.G.; Alcaraz, A.

    2004-01-01

    We present current on-site technologies that can be utilized for the screening of explosives, chemical agents, and environmental contaminants. These techniques must have the capability to detect various hazardous materials at very low levels, since they pose a major challenge for first responders. Specifically, the technology must detect concealed explosives or chemical agents on-site rapidly. Lawrence Livermore National Laboratory (LLNL) is currently developing several different high explosive screening and detection technologies for field use. Two technologies that have demonstrated an ability to screen for explosives at low levels are colorimetric spot tests and thin layer chromatography (TLC). Another technology that has demonstrated usefulness for the on-site analysis of unknowns is portable gas chromatography-mass spectrometry (GC-MS) with solid phase micro-extraction (SPME) sampling. Several examples utilizing these technologies and their usefulness will be presented. In addition to developing on-site screening methods, LLNL is an Organization for the Prohibition of Chemical Weapons (OPCW) designated laboratory and is certified to accept CW suspect samples. Currently, LLNL is expanding its ISO-17025 certification to include nuclear forensics and explosives. These off-site forensic analysis capabilities and certified procedures will support the needs for homeland security. We will highlight some of the ISO-17025 requirements to accredit procedures, handle samples, and reports. Work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract W-7405-ENG-48. (author)

  7. Multifractal analysis of complex networks

    International Nuclear Information System (INIS)

    Wang Dan-Ling; Yu Zu-Guo; Anh V

    2012-01-01

    Complex networks have recently attracted much attention in diverse areas of science and technology. Many networks such as the WWW and biological networks are known to display spatial heterogeneity which can be characterized by their fractal dimensions. Multifractal analysis is a useful way to systematically describe the spatial heterogeneity of both theoretical and experimental fractal patterns. In this paper, we introduce a new box-covering algorithm for multifractal analysis of complex networks. This algorithm is used to calculate the generalized fractal dimensions D q of some theoretical networks, namely scale-free networks, small world networks, and random networks, and one kind of real network, namely protein—protein interaction networks of different species. Our numerical results indicate the existence of multifractality in scale-free networks and protein—protein interaction networks, while the multifractal behavior is not clear-cut for small world networks and random networks. The possible variation of D q due to changes in the parameters of the theoretical network models is also discussed. (general)

  8. Applications of liquid-based separation in conjunction with mass spectrometry to the analysis of forensic evidence.

    Science.gov (United States)

    Moini, Mehdi

    2018-03-12

    In the past few years, there has been a significant effort by the forensic science community to develop new scientific techniques for the analysis of forensic evidence. Forensic chemists have been spearheaded to develop information-rich confirmatory technologies and techniques and apply them to a broad array of forensic challenges. The purpose of these confirmatory techniques is to provide alternatives to presumptive techniques that rely on data such as color changes, pattern matching, or retention time alone, which are prone to more false positives. To this end, the application of separation techniques in conjunction with mass spectrometry has played an important role in the analysis of forensic evidence. Moreover, in the past few years the role of liquid separation techniques, such as liquid chromatography and capillary electrophoresis in conjunction with mass spectrometry, has gained significant tractions and have been applied to a wide range of chemicals, from small molecules such as drugs and explosives, to large molecules such as proteins. For example, proteomics and peptidomics have been used for identification of humans, organs, and bodily fluids. A wide range of HPLC techniques including reversed phase, hydrophilic interaction, mixed-mode, supercritical fluid, multidimensional chromatography, and nanoLC, as well as several modes of capillary electrophoresis mass spectrometry, including capillary zone electrophoresis, partial filling, full filling, and micellar electrokenetic chromatography have been applied to the analysis drugs, explosives, and questioned documents. In this article, we review recent (2015-2017) applications of liquid separation in conjunction with mass spectrometry to the analysis of forensic evidence. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Age onset of offending and serious mental illness among forensic psychiatric patients: A latent profile analysis.

    Science.gov (United States)

    Penney, Stephanie R; Prosser, Aaron; Simpson, Alexander I F

    2018-01-16

    Developmental typologies regarding age of onset of violence and offending have not routinely taken account of the role of serious mental illness (SMI), and whether age of onset of offending in relation to onset of illness impacts on the manifestation of offending over the life course. To test whether forensic psychiatric patients can be classified according to age of onset of SMI and offending, and, if so, whether subtypes differ by sex. Details of all 511 patients enrolled into a large forensic mental health service in Ontario, Canada, in 2011 or 2012 were collected from records. A latent profile analysis supported a 2-class solution in both men and women. External validation of the classes demonstrated that those with a younger age onset of serious mental illness and offending were characterised by higher levels of static risk factors and criminogenic need than those whose involvement in both mental health and criminal justice systems was delayed to later life. Our findings present a new perspective on life course trajectories of offenders with SMI. While analyses identified just two distinct age-of-onset groups, in both the illness preceded the offending. The fact that our sample was entirely drawn from those hospitalised may have introduced a selection bias for those whose illness precedes offending, but findings underscore the complexity and level of need among those with a younger age of onset. Copyright © 2018 John Wiley & Sons, Ltd. Copyright © 2018 John Wiley & Sons, Ltd.

  10. Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2008-12-01

    Full Text Available Varsalone, J. (Tech. Ed., Kubasiak, R.R., Morrissey, S., et al. (2009. Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. Burlington, MA: Syngress. 551 + xix pages, ISBN: 978-1-59749-297-3, US$59.95.Reviewed by Gary C. Kessler (gary.kessler@champlain.eduAt last! A quality book about computer forensics for Apple products! Alas, I get ahead of myself.Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had in earlier times -- write code, play with the hardware, and, indeed, get to a command line. And, of course, tons of application developers flocked to the PC because of its open architecture.(see PDF for full review

  11. Forensic analysis of explosives using isotope ratio mass spectrometry (IRMS)--discrimination of ammonium nitrate sources.

    Science.gov (United States)

    Benson, Sarah J; Lennard, Christopher J; Maynard, Philip; Hill, David M; Andrew, Anita S; Roux, Claude

    2009-06-01

    An evaluation was undertaken to determine if isotope ratio mass spectrometry (IRMS) could assist in the investigation of complex forensic cases by providing a level of discrimination not achievable utilising traditional forensic techniques. The focus of the research was on ammonium nitrate (AN), a common oxidiser used in improvised explosive mixtures. The potential value of IRMS to attribute Australian AN samples to the manufacturing source was demonstrated through the development of a preliminary AN classification scheme based on nitrogen isotopes. Although the discrimination utilising nitrogen isotopes alone was limited and only relevant to samples from the three Australian manufacturers during the evaluated time period, the classification scheme has potential as an investigative aid. Combining oxygen and hydrogen stable isotope values permitted the differentiation of AN prills from three different Australian manufacturers. Samples from five different overseas sources could be differentiated utilising a combination of the nitrogen, oxygen and hydrogen isotope values. Limited differentiation between Australian and overseas prills was achieved for the samples analysed. The comparison of nitrogen isotope values from intact AN prill samples with those from post-blast AN prill residues highlighted that the nitrogen isotopic composition of the prills was not maintained post-blast; hence, limiting the technique to analysis of un-reacted explosive material.

  12. State-of-the-art of bone marrow analysis in forensic toxicology: a review.

    Science.gov (United States)

    Cartiser, Nathalie; Bévalot, Fabien; Fanton, Laurent; Gaillard, Yvan; Guitton, Jérôme

    2011-03-01

    Although blood is the reference medium in the field of forensic toxicology, alternative matrices are required in case of limited, unavailable or unusable blood samples. The present review investigated the suitability of bone marrow (BM) as an alternative matrix to characterize xenobiotic consumption and its influence on the occurrence of death. Basic data on BM physiology are reported in order to highlight the specificities of this matrix and their analytical and toxicokinetic consequences. A review of case reports, animal and human studies involving BM sample analysis focuses on the various parameters of interpretation of toxicological results: analytic limits, sampling location, pharmacokinetics, blood/BM concentration correlation, stability and postmortem redistribution. Tables summarizing the analytical conditions and quantification of 45 compounds from BM samples provide a useful tool for toxicologists. A specific section devoted to ethanol shows that, despite successful quantification, interpretation is highly dependent on postmortem interval. In conclusion, BM is an interesting alternative matrix, and further experimental data and validated assays are required to confirm its great potential relevance in forensic toxicology.

  13. A forensic re-analysis of one of the deadliest European tornadoes

    Science.gov (United States)

    Holzer, Alois M.; Schreiner, Thomas M. E.; Púčik, Tomáš

    2018-06-01

    Extremely rare events with high potential impact, such as violent tornadoes, are of strong interest for climatology and risk assessment. In order to obtain more knowledge about the most extreme events, it is vital to study historical cases. The purpose of this paper is twofold: (1) to demonstrate how a windstorm catastrophe that happened 100 years ago, such as the Wiener Neustadt, Lower Austria, tornado on 10 July 1916, can be successfully re-analyzed using a forensic approach, and (2) to propose a repeatable working method for assessing damage and reconstructing the path and magnitude of local windstorm and tornado cases with sufficient historical sources. Based on the results of the forensic re-analyses, a chronology of the tornado impact is presented, followed by a description of the key tornado characteristics: a maximum intensity rating of F4, a damage path length of 20 km and a maximum visible tornado diameter of 1 km. Compared to a historical scientific study published soon after the event, additional new findings are presented, namely the existence of two predecessor tornadoes and a higher number of fatalities: at least 34 instead of 32. While the storm-scale meteorology could not be reconstructed, rich damage data sources for the urban area of Wiener Neustadt facilitated a detailed analysis of damage tracks and wind intensities within the tornado. The authors postulate the requirement for an International Fujita Scale to rate tornadoes globally in a consistent way, based on comparable damage indicators.

  14. Network Analysis, Architecture, and Design

    CERN Document Server

    McCabe, James D

    2007-01-01

    Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evalua

  15. Forensic and archaeological applications of neutron activation analysis. Part of a coordinated programme on nuclear detection and analysis

    International Nuclear Information System (INIS)

    Sankar Das, M.

    1977-11-01

    The work carried out can be categorized as follows: setting up and standardization of the instrumental multielement analysis facility, for which a system manual is attached; forensic applications which have included the examination of firearm discharge residues around holes suspected to have been caused by the passage of a bullet, and the trace element characterization of biological (hair) and non-biological (transmission wires) materials; archaeological applications involving the study of potsherds from sites along the Stulej river in India; analysis of IAEA intercomparison samples, for which the results are tabulated; and methods for data evaluation

  16. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  17. Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing.

    Science.gov (United States)

    Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A

    2017-11-01

    Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Insights Gained from Forensic Analysis with MELCOR of the Fukushima-Daiichi Accidents.

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Nathan C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gauntt, Randall O. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    Since the accidents at Fukushima-Daiichi, Sandia National Laboratories has been modeling these accident scenarios using the severe accident analysis code, MELCOR. MELCOR is a widely used computer code developed at Sandia National Laboratories since ~1982 for the U.S. Nuclear Regulatory Commission. Insights from the modeling of these accidents is being used to better inform future code development and potentially improved accident management. To date, our necessity to better capture in-vessel thermal-hydraulic and ex-vessel melt coolability and concrete interactions has led to the implementation of new models. The most recent analyses, presented in this paper, have been in support of the of the Organization for Economic Cooperation and Development Nuclear Energy Agency’s (OECD/NEA) Benchmark Study of the Accident at the Fukushima Daiichi Nuclear Power Station (BSAF) Project. The goal of this project is to accurately capture the source term from all three releases and then model the atmospheric dispersion. In order to do this, a forensic approach is being used in which available plant data and release timings is being used to inform the modeled MELCOR accident scenario. For example, containment failures, core slumping events and lower head failure timings are all enforced parameters in these analyses. This approach is fundamentally different from a blind code assessment analysis often used in standard problem exercises. The timings of these events are informed by representative spikes or decreases in plant data. The combination of improvements to the MELCOR source code resulting from analysis previous accident analysis and this forensic approach has allowed Sandia to generate representative and plausible source terms for all three accidents at Fukushima Daiichi out to three weeks after the accident to capture both early and late releases. In particular, using the source terms developed by MELCOR, the MACCS software code, which models atmospheric dispersion and

  19. Forensic DNA testing.

    Science.gov (United States)

    Butler, John M

    2011-12-01

    Forensic DNA testing has a number of applications, including parentage testing, identifying human remains from natural or man-made disasters or terrorist attacks, and solving crimes. This article provides background information followed by an overview of the process of forensic DNA testing, including sample collection, DNA extraction, PCR amplification, short tandem repeat (STR) allele separation and sizing, typing and profile interpretation, statistical analysis, and quality assurance. The article concludes with discussions of possible problems with the data and other forensic DNA testing techniques.

  20. Nuclear forensic analysis of uranium oxide powders interdicted in Victoria, Australia

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, Michael Joseph [Lawrence Livermore National Laboratory, Livermore, CA (United States); Keegan, Elizabeth; Colella, Michael [Australian Nuclear Science and Technology Organisation, Kirrawee, NSW (Australia); and others

    2015-07-01

    Nuclear forensic analysis was conducted on two uranium samples confiscated during a police investigation in Victoria, Australia. The first sample, designated NSR-F-270409-1, was a depleted uranium powder of moderate purity (∝ 1000 μg/g total elemental impurities). The chemical form of the uranium was a compound similar to K{sub 2}(UO{sub 2}){sub 3}O{sub 4} . 4H{sub 2}O. While aliquoting NSR-F-270409-1 for analysis, the body and head of a Tineid moth was discovered in the sample. The second sample, designated NSR-F-270409-2, was also a depleted uranium powder. It was of reasonably high purity (∝ 380 μg/g total elemental impurities). The chemical form of the uranium was primarily UO{sub 3} . 2H{sub 2}O, with minor phases of U{sub 3}O{sub 8} and UO{sub 2}. While aliquoting NSR-F-270409-2 for analysis, a metal staple of unknown origin was discovered in the sample. The presence of {sup 236}U and {sup 232}U in both samples indicates that the uranium feed stocks for these samples experienced a neutron flux at some point in their history. The reactor burn-up calculated from the isotopic composition of the uranium is consistent with that of spent fuel from natural uranium (NU) fueled Pu production. These nuclear forensic conclusions allow us to categorically exclude Australia as the origin of the material and greatly reduce the number of candidate sources.

  1. Forensic Mass Spectrometry

    Science.gov (United States)

    Hoffmann, William D.; Jackson, Glen P.

    2015-07-01

    Developments in forensic mass spectrometry tend to follow, rather than lead, the developments in other disciplines. Examples of techniques having forensic potential born independently of forensic applications include ambient ionization, imaging mass spectrometry, isotope ratio mass spectrometry, portable mass spectrometers, and hyphenated chromatography-mass spectrometry instruments, to name a few. Forensic science has the potential to benefit enormously from developments that are funded by other means, if only the infrastructure and personnel existed to adopt, validate, and implement the new technologies into casework. Perhaps one unique area in which forensic science is at the cutting edge is in the area of chemometrics and the determination of likelihood ratios for the evaluation of the weight of evidence. Such statistical techniques have been developed most extensively for ignitable-liquid residue analyses and isotope ratio analysis. This review attempts to capture the trends, motivating forces, and likely impact of developing areas of forensic mass spectrometry, with the caveat that none of this research is likely to have any real impact in the forensic community unless: (a) The instruments developed are turned into robust black boxes with red and green lights for positives and negatives, respectively, or (b) there are PhD graduates in the workforce who can help adopt these sophisticated techniques.

  2. Forensic analysis of Venezuelan elections during the Chávez presidency.

    Directory of Open Access Journals (Sweden)

    Raúl Jiménez

    Full Text Available Hugo Chávez dominated the Venezuelan electoral landscape since his first presidential victory in 1998 until his death in 2013. Nobody doubts that he always received considerable voter support in the numerous elections held during his mandate. However, the integrity of the electoral system has come into question since the 2004 Presidential Recall Referendum. From then on, different sectors of society have systematically alleged electoral irregularities or biases in favor of the incumbent party. We have carried out a thorough forensic analysis of the national-level Venezuelan electoral processes held during the 1998-2012 period to assess these complaints. The second-digit Benford's law and two statistical models of vote distributions, recently introduced in the literature, are reviewed and used in our case study. In addition, we discuss a new method to detect irregular variations in the electoral roll. The outputs obtained from these election forensic tools are examined taking into account the substantive context of the elections and referenda under study. Thus, we reach two main conclusions. Firstly, all the tools uncover anomalous statistical patterns, which are consistent with election fraud from 2004 onwards. Although our results are not a concluding proof of fraud, they signal the Recall Referendum as a turning point in the integrity of the Venezuelan elections. Secondly, our analysis calls into question the reliability of the electoral register since 2004. In particular, we found irregular variations in the electoral roll that were decisive in winning the 50% majority in the 2004 Referendum and in the 2012 Presidential Elections.

  3. Design of experiments and data analysis challenges in calibration for forensics applications

    International Nuclear Information System (INIS)

    Anderson-Cook, Christine M.; Burr, Thomas L.; Hamada, Michael S.; Ruggiero, Christy E.; Thomas, Edward V.

    2015-01-01

    Forensic science aims to infer characteristics of source terms using measured observables. Our focus is on statistical design of experiments and data analysis challenges arising in nuclear forensics. More specifically, we focus on inferring aspects of experimental conditions (of a process to produce product Pu oxide powder), such as temperature, nitric acid concentration, and Pu concentration, using measured features of the product Pu oxide powder. The measured features, Y, include trace chemical concentrations and particle morphology such as particle size and shape of the produced Pu oxide power particles. Making inferences about the nature of inputs X that were used to create nuclear materials having particular characteristics, Y, is an inverse problem. Therefore, statistical analysis can be used to identify the best set (or sets) of Xs for a new set of observed responses Y. One can fit a model (or models) such as Y = f(X) + error, for each of the responses, based on a calibration experiment and ''invert'' to solve for the best set of Xs for a new set of Ys. This perspectives paper uses archived experimental data to consider aspects of data collection and experiment design for the calibration data to maximize the quality of the predicted Ys in the forward models; that is, we assume that well-estimated forward models are effective in the inverse problem. In addition, we consider how to identify a best solution for the inferred X, and evaluate the quality of the result and its robustness to a variety of initial assumptions, and different correlation structures between the responses. In addition, we also briefly review recent advances in metrology issues related to characterizing particle morphology measurements used in the response vector, Y

  4. Forensic Analysis of Venezuelan Elections during the Chávez Presidency

    Science.gov (United States)

    Jiménez, Raúl; Hidalgo, Manuel

    2014-01-01

    Hugo Chávez dominated the Venezuelan electoral landscape since his first presidential victory in 1998 until his death in 2013. Nobody doubts that he always received considerable voter support in the numerous elections held during his mandate. However, the integrity of the electoral system has come into question since the 2004 Presidential Recall Referendum. From then on, different sectors of society have systematically alleged electoral irregularities or biases in favor of the incumbent party. We have carried out a thorough forensic analysis of the national-level Venezuelan electoral processes held during the 1998–2012 period to assess these complaints. The second-digit Benford's law and two statistical models of vote distributions, recently introduced in the literature, are reviewed and used in our case study. In addition, we discuss a new method to detect irregular variations in the electoral roll. The outputs obtained from these election forensic tools are examined taking into account the substantive context of the elections and referenda under study. Thus, we reach two main conclusions. Firstly, all the tools uncover anomalous statistical patterns, which are consistent with election fraud from 2004 onwards. Although our results are not a concluding proof of fraud, they signal the Recall Referendum as a turning point in the integrity of the Venezuelan elections. Secondly, our analysis calls into question the reliability of the electoral register since 2004. In particular, we found irregular variations in the electoral roll that were decisive in winning the 50% majority in the 2004 Referendum and in the 2012 Presidential Elections. PMID:24971462

  5. Analysis of fingerprint samples, testing various conditions, for forensic DNA identification.

    Science.gov (United States)

    Ostojic, Lana; Wurmbach, Elisa

    2017-01-01

    Fingerprints can be of tremendous value for forensic biology, since they can be collected from a wide variety of evident types, such as handles of weapons, tools collected in criminal cases, and objects with no apparent staining. DNA obtained from fingerprints varies greatly in quality and quantity, which ultimately affects the quality of the resulting STR profiles. Additional difficulties can arise when fingerprint samples show mixed STR profiles due to the handling of multiple persons. After applying a tested protocol for sample collection (swabbing with 5% Triton X-100), DNA extraction (using an enzyme that works at elevated temperatures), and PCR amplification (AmpFlSTR® Identifiler® using 31cycles) extensive analysis was performed to better understand the challenges inherent to fingerprint samples, with the ultimate goal of developing valuable profiles (≥50% complete). The impact of time on deposited fingerprints was investigated, revealing that while the quality of profiles deteriorated, full STR profiles could still be obtained from samples after 40days of storage at room temperature. By comparing the STR profiles from fingerprints of the dominant versus the non-dominant hand, we found a slightly better quality from the non-dominant hand, which was not always significant. Substrates seem to have greater effects on fingerprints. Tests on glass, plastic, paper and metal (US Quarter dollar, made of Cu and Ni), common substrates in offices and homes, showed best results for glass, followed by plastic and paper, while almost no profiles were obtained from a Quarter dollar. Important for forensic casework, we also assessed three-person mixtures of touched fingerprint samples. Unlike routinely used approaches for sampling evidence, the surface of an object (bottle) was sectioned into six equal parts and separate samples were taken from each section. The samples were processed separately for DNA extraction and STR amplification. The results included a few single

  6. Frequency of forensic toxicological analysis in external cause deaths among nursing home residents: an analysis of trends.

    Science.gov (United States)

    Aitken, Georgia; Murphy, Briony; Pilgrim, Jennifer; Bugeja, Lyndal; Ranson, David; Ibrahim, Joseph Elias

    2017-03-01

    There is a paucity of research examining the utility of forensic toxicology in the investigation of premature external cause deaths of residents in nursing homes. The aim of this study is to describe the frequency and characteristics of toxicological analysis conducted in external cause (injury-related) deaths amongst nursing home residents in Victoria, Australia. This study was a retrospective cohort study examining external cause deaths among nursing home residents during the period July 1, 2000 to December 31, 2012 in Victoria, Australia, using the National Coronial Information System (NCIS). The variables examined comprised: sex, age group, year-of-death, cause and manner of death. One-third of deaths among nursing home residents in Victoria resulted from external causes (n = 1296, 33.3%) of which just over one-quarter (361, 27.9%) underwent toxicological analysis as part of the medical death investigation. The use of toxicological analysis varied by cause of death with a relatively low proportion conducted in deaths from unintentional falls (n = 286, 24.9%) and choking (n = 36, 40.4%). The use of toxicological analysis decreased as the decedents age increased. Forensic toxicology has the potential to contribute to improving our understanding of premature deaths in nursing home residents however it remains under used and is possibly undervalued.

  7. Error rates in forensic DNA analysis: Definition, numbers, impact and communication

    NARCIS (Netherlands)

    Kloosterman, A.; Sjerps, M.; Quak, A.

    2014-01-01

    Forensic DNA casework is currently regarded as one of the most important types of forensic evidence, and important decisions in intelligence and justice are based on it. However, errors occasionally occur and may have very serious consequences. In other domains, error rates have been defined and

  8. Vitreous humour - routine or alternative material for analysis in forensic medicine.

    Science.gov (United States)

    Markowska, Joanna; Szopa, Monika; Zawadzki, Marcin; Piekoszewski, Wojciech

    2017-01-01

    Biological materials used in toxicological analyses in forensic medicine traditionally include blood, urine and vitreous humour. Forensic use of the vitreous body is mostly due to the need to assess the endogenous concentration of ethyl alcohol in the process of human body decomposition. The vitreous body is an underestimated biological material, even though its biochemical properties and anatomical location make it suitable for specific forensic toxicology tests as a reliable material for the preparation of forensic expert opinions. Based on the available literature the paper gathers information on the biochemical structure of the vitreous body, ways to secure the material after collection and its use in postmortem diagnostics. Specific applications of the vitreous humour for biochemical and toxicological tests are discussed, with a focus on its advantages and limitations in forensic medical assessment which are attributable to its biochemical properties, anatomical location and limited scientific studies on the distribution of xenobiotics in the vitreous body.

  9. A forensic re-analysis of one of the deadliest European tornadoes

    Directory of Open Access Journals (Sweden)

    A. M. Holzer

    2018-06-01

    Full Text Available Extremely rare events with high potential impact, such as violent tornadoes, are of strong interest for climatology and risk assessment. In order to obtain more knowledge about the most extreme events, it is vital to study historical cases. The purpose of this paper is twofold: (1 to demonstrate how a windstorm catastrophe that happened 100 years ago, such as the Wiener Neustadt, Lower Austria, tornado on 10 July 1916, can be successfully re-analyzed using a forensic approach, and (2 to propose a repeatable working method for assessing damage and reconstructing the path and magnitude of local windstorm and tornado cases with sufficient historical sources. Based on the results of the forensic re-analyses, a chronology of the tornado impact is presented, followed by a description of the key tornado characteristics: a maximum intensity rating of F4, a damage path length of 20 km and a maximum visible tornado diameter of 1 km. Compared to a historical scientific study published soon after the event, additional new findings are presented, namely the existence of two predecessor tornadoes and a higher number of fatalities: at least 34 instead of 32. While the storm-scale meteorology could not be reconstructed, rich damage data sources for the urban area of Wiener Neustadt facilitated a detailed analysis of damage tracks and wind intensities within the tornado. The authors postulate the requirement for an International Fujita Scale to rate tornadoes globally in a consistent way, based on comparable damage indicators.

  10. Forensic analysis methodology for thermal and chemical characterization of homemade explosives

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2014-01-01

    Highlights: • Identification of homemade explosives (HME) is critical for determining the origin of explosive precursor materials. • A novel laser-heating technique was used to obtain the thermal/chemical signatures of HME precursor materials. • Liquid-fuel saturation of the pores of a solid porous oxidizer affected the total specific heat release. • Material thermal signatures were dependent on sample mass and heating rate. • This laser-heating technique can be a useful diagnostic tool for characterizing the thermochemical behavior of HMEs. - Abstract: Forensic identification of homemade explosives is critical for determining the origin of the explosive materials and precursors, and formulation procedures. Normally, the forensic examination of the pre- and post-blast physical evidence lacks specificity for homemade-explosive identification. The focus of this investigation was to use a novel measurement technique, referred to as the laser-driven thermal reactor, to obtain the thermal/chemical signatures of homemade-explosive precursor materials. Specifically, nitromethane and ammonium nitrate were studied under a variety of operating conditions and protocols. Results indicated that liquid-fuel saturation of the internal pores of a solid particle oxidizer appear to be a limiting parameter for the total specific heat release during exothermic processes. Results also indicated that the thermal signatures of these materials are dependent on sample mass and heating rate, for which this dependency may not be detectable by other commercially available thermal analysis techniques. This study has demonstrated that the laser-driven thermal reactor can be a useful diagnostic tool for characterizing the thermal and chemical behavior of trace amounts of homemade-explosive materials

  11. Testing inter-observer reliability of the Transition Analysis aging method on the William M. Bass forensic skeletal collection.

    Science.gov (United States)

    Fojas, Christina L; Kim, Jieun; Minsky-Rowland, Jocelyn D; Algee-Hewitt, Bridget F B

    2018-01-01

    Skeletal age estimation is an integral part of the biological profile. Recent work shows how multiple-trait approaches better capture senescence as it occurs at different rates among individuals. Furthermore, a Bayesian statistical framework of analysis provides more useful age estimates. The component-scoring method of Transition Analysis (TA) may resolve many of the functional and statistical limitations of traditional phase-aging methods and is applicable to both paleodemography and forensic casework. The present study contributes to TA-research by validating TA for multiple, differently experienced observers using a collection of modern forensic skeletal cases. Five researchers independently applied TA to a random sample of 58 documented individuals from the William M. Bass Forensic Skeletal Collection, for whom knowledge of chronological age was withheld. Resulting scores were input into the ADBOU software and maximum likelihood estimates (MLEs) and 95% confidence intervals (CIs) were produced using the forensic prior. Krippendorff's alpha was used to evaluate interrater reliability and agreement. Inaccuracy and bias were measured to gauge the magnitude and direction of difference between estimated ages and chronological ages among the five observers. The majority of traits had moderate to excellent agreement among observers (≥0.6). The superior surface morphology had the least congruence (0.4), while the ventral symphyseal margin had the most (0.9) among scores. Inaccuracy was the lowest for individuals younger than 30 and the greatest for individuals over 60. Consistent over-estimation of individuals younger than 30 and under-estimation of individuals over 40 years old occurred. Individuals in their 30s showed a mixed pattern of under- and over-estimation among observers. These results support the use of the TA method by researchers of varying experience levels. Further, they validate its use on forensic cases, given the low error overall. © 2017 Wiley

  12. Artificial Neural Network Analysis System

    Science.gov (United States)

    2001-02-27

    Contract No. DASG60-00-M-0201 Purchase request no.: Foot in the Door-01 Title Name: Artificial Neural Network Analysis System Company: Atlantic... Artificial Neural Network Analysis System 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Powell, Bruce C 5d. PROJECT NUMBER 5e. TASK NUMBER...34) 27-02-2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") 28-10-2000 27-02-2001 Title and Subtitle Artificial Neural Network Analysis

  13. Compound-Specific Isotope Analysis of Diesel Fuels in a Forensic Investigation

    Science.gov (United States)

    Muhammad, Syahidah; Frew, Russell; Hayman, Alan

    2015-02-01

    Compound-specific isotope analysis (CSIA) offers great potential as a tool to provide chemical evidence in a forensic investigation. Many attempts to trace environmental oil spills were successful where isotopic values were particularly distinct. However, difficulties arise when a large data set is analyzed and the isotopic differences between samples are subtle. In the present study, discrimination of diesel oils involved in a diesel theft case was carried out to infer the relatedness of the samples to potential source samples. This discriminatory analysis used a suite of hydrocarbon diagnostic indices, alkanes, to generate carbon and hydrogen isotopic data of the compositions of the compounds which were then processed using multivariate statistical analyses to infer the relatedness of the data set. The results from this analysis were put into context by comparing the data with the δ13C and δ2H of alkanes in commercial diesel samples obtained from various locations in the South Island of New Zealand. Based on the isotopic character of the alkanes, it is suggested that diesel fuels involved in the diesel theft case were distinguishable. This manuscript shows that CSIA when used in tandem with multivariate statistical analysis provide a defensible means to differentiate and source-apportion qualitatively similar oils at the molecular level. This approach was able to overcome confounding challenges posed by the near single-point source of origin i.e. the very subtle differences in isotopic values between the samples.

  14. Fast and Simple Forensic Red Pen Ink Analysis Using Ultra-Performance Liquid Chromatography (UPLC)

    International Nuclear Information System (INIS)

    Lee, L.C.; Ying, S.L.; Wan Nur Syazwani Wan Mohamad Fuad; Ab Aziz Ishak; Khairul Osman

    2016-01-01

    Ultra-performance liquid chromatography (UPLC) is more effective than high performance liquid chromatography in terms of analysis speed and sensitivity. This paper presents a feasibility study on forensic red pen inks analysis using UPLC. A total of 12 varieties of red ball point pen inks were purchased from selected stationary shop. For each variety, four different individual pens were sampled to provide intra-variability within a particular variety of pen. The proposed approach is very simple that it only involved limited analysis step and chemicals. A total of 144 chromatograms were obtained from red ink entries extracted with 1.5 mL 80 % (v/v) acetonitrile. Peaks originated from pen inks were determined by comparing the chromatograms of both blank paper and blank solvent against that of ink samples. Subsequently, one-way ANOVA was conducted to discriminate all 66 possible pairs for red pen inks. Results showed that the proposed approach giving discriminating power of 95.45 %. The outcome of the study indicates that UPLC could be a fast and simple approach to red ball point pen inks analysis. (author)

  15. Compound-Specific Isotope Analysis of Diesel Fuels in a Forensic Investigation

    Directory of Open Access Journals (Sweden)

    Syahidah Akmal Muhammad

    2015-02-01

    Full Text Available Compound-specific isotope analysis (CSIA offers great potential as a tool to provide chemical evidence in a forensic investigation. Many attempts to trace environmental oil spills were successful where isotopic values were particularly distinct. However, difficulties arise when a large data set is analyzed and the isotopic differences between samples are subtle. In the present study, discrimination of diesel oils involved in a diesel theft case was carried out to infer the relatedness of the samples to potential source samples. This discriminatory analysis used a suite of hydrocarbon diagnostic indices, alkanes, to generate carbon and hydrogen isotopic data of the compositions of the compounds which were then processed using multivariate statistical analyses to infer the relatedness of the data set. The results from this analysis were put into context by comparing the data with the δ13C and δ2H of alkanes in commercial diesel samples obtained from various locations in the South Island of New Zealand. Based on the isotopic character of the alkanes, it is suggested that diesel fuels involved in the diesel theft case were distinguishable. This manuscript shows that CSIA when used in tandem with multivariate statistical analysis provide a defensible means to differentiate and source-apportion qualitatively similar oils at the molecular level. This approach was able to overcome confounding challenges posed by the near single-point source of origin i.e. the very subtle differences in isotopic values between the samples.

  16. Compound-specific isotope analysis of diesel fuels in a forensic investigation.

    Science.gov (United States)

    Muhammad, Syahidah A; Frew, Russell D; Hayman, Alan R

    2015-01-01

    Compound-specific isotope analysis (CSIA) offers great potential as a tool to provide chemical evidence in a forensic investigation. Many attempts to trace environmental oil spills were successful where isotopic values were particularly distinct. However, difficulties arise when a large data set is analyzed and the isotopic differences between samples are subtle. In the present study, discrimination of diesel oils involved in a diesel theft case was carried out to infer the relatedness of the samples to potential source samples. This discriminatory analysis used a suite of hydrocarbon diagnostic indices, alkanes, to generate carbon and hydrogen isotopic data of the compositions of the compounds which were then processed using multivariate statistical analyses to infer the relatedness of the data set. The results from this analysis were put into context by comparing the data with the δ(13)C and δ(2)H of alkanes in commercial diesel samples obtained from various locations in the South Island of New Zealand. Based on the isotopic character of the alkanes, it is suggested that diesel fuels involved in the diesel theft case were distinguishable. This manuscript shows that CSIA when used in tandem with multivariate statistical analysis provide a defensible means to differentiate and source-apportion qualitatively similar oils at the molecular level. This approach was able to overcome confounding challenges posed by the near single-point source of origin, i.e., the very subtle differences in isotopic values between the samples.

  17. Nuclear forensics

    International Nuclear Information System (INIS)

    Karadeniz, O.; Guenalp, G.

    2010-01-01

    This review discusses the methodology of nuclear forensics and illicit trafficking of nuclear materials. Nuclear forensics is relatively new scientific branch whose aim it is to read out material inherent from nuclear material. Nuclear forensics investigations have to be considered as part of a comprehensive set of measures for detection,interception, categorization and characterization of illicitly trafficking nuclear material. Prevention, detection and response are the main elements in combating illicit trafficking. Forensics is a key element in the response process. Forensic science is defined as the application of a broad spectrum of sciences to answer questions of interest to the legal system. Besides, in this study we will explain age determination of nuclear materials.

  18. Activation analysis study on Li-ion batteries for nuclear forensic applications

    Science.gov (United States)

    Johnson, Erik B.; Whitney, Chad; Holbert, Keith E.; Zhang, Taipeng; Stannard, Tyler; Christie, Anthony; Harper, Peter; Anderson, Blake; Christian, James F.

    2015-06-01

    The nuclear materials environment has been increasing significantly in complexity over the past couple of decades. The prevention of attacks from nuclear weapons is becoming more difficult, and nuclear forensics is a deterrent by providing detailed information on any type of nuclear event for proper attribution. One component of the nuclear forensic analysis is a measurement of the neutron spectrum. As an example, the neutron component provides information on the composition of the weapons, whether boosting is involved or the mechanisms used in creating a supercritical state. As 6Li has a large cross-section for thermal neutrons, the lithium battery is a primary candidate for assessing the neutron spectrum after detonation. The absorption process for 6Li yields tritium, which can be measured at a later point after the nuclear event, as long as the battery can be processed in a manner to successfully extract the tritium content. In addition, measuring the activated constituents after exposure provides a means to reconstruct the incident neutron spectrum. The battery consists of a spiral or folded layers of material that have unique, energy dependent interactions associated with the incident neutron flux. A detailed analysis on the batteries included a pre-irradiated mass spectrometry analysis to be used as input for neutron spectrum reconstruction. A set of batteries were exposed to a hard neutron spectrum delivered by the University of Massachusetts, Lowell research reactor Fast Neutron Irradiator (FNI). The gamma spectra were measured from the batteries within a few days and within a week after the exposure to obtain sufficient data on the activated materials in the batteries. The activity was calculated for a number of select isotopes, indicating the number of associated neutron interactions. The results from tritium extraction are marginal. A measurable increase in detected particles (gammas and betas) below 50 keV not self-attenuated by the battery was observed

  19. Activation analysis study on Li-ion batteries for nuclear forensic applications

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Erik B., E-mail: ejohnson@rmdinc.com [Radiation Monitoring Devices Inc., 44 Hunt Street, Watertown, MA 02472 (United States); Whitney, Chad [Radiation Monitoring Devices Inc., 44 Hunt Street, Watertown, MA 02472 (United States); Holbert, Keith E.; Zhang, Taipeng; Stannard, Tyler; Christie, Anthony; Harper, Peter; Anderson, Blake [Arizona State University, Tempe, AZ 85287 (United States); Christian, James F. [Radiation Monitoring Devices Inc., 44 Hunt Street, Watertown, MA 02472 (United States)

    2015-06-01

    The nuclear materials environment has been increasing significantly in complexity over the past couple of decades. The prevention of attacks from nuclear weapons is becoming more difficult, and nuclear forensics is a deterrent by providing detailed information on any type of nuclear event for proper attribution. One component of the nuclear forensic analysis is a measurement of the neutron spectrum. As an example, the neutron component provides information on the composition of the weapons, whether boosting is involved or the mechanisms used in creating a supercritical state. As {sup 6}Li has a large cross-section for thermal neutrons, the lithium battery is a primary candidate for assessing the neutron spectrum after detonation. The absorption process for {sup 6}Li yields tritium, which can be measured at a later point after the nuclear event, as long as the battery can be processed in a manner to successfully extract the tritium content. In addition, measuring the activated constituents after exposure provides a means to reconstruct the incident neutron spectrum. The battery consists of a spiral or folded layers of material that have unique, energy dependent interactions associated with the incident neutron flux. A detailed analysis on the batteries included a pre-irradiated mass spectrometry analysis to be used as input for neutron spectrum reconstruction. A set of batteries were exposed to a hard neutron spectrum delivered by the University of Massachusetts, Lowell research reactor Fast Neutron Irradiator (FNI). The gamma spectra were measured from the batteries within a few days and within a week after the exposure to obtain sufficient data on the activated materials in the batteries. The activity was calculated for a number of select isotopes, indicating the number of associated neutron interactions. The results from tritium extraction are marginal. A measurable increase in detected particles (gammas and betas) below 50 keV not self-attenuated by the battery

  20. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    procedures and training to meet these initial challenges so as minimize disturbance of the evidence. While epidemiology and forensics are similar sciences with similar goals when applied to biocrimes, forensics has additional and more stringent requirements. Maintaining a chain of custody on evidentiary samples is one example of an extra requirement imposed on an investigation of a biocrime. Another issue is the intent in microbial forensics to identify a bioattack organism in greatest detail. If possible, forensic investigations will strive to identify the precise strain and substrain, rather than just to the species level, which might be sufficient in an epidemiological investigation. Although multiple groups have developed lists of bioterrorism target pathogens, these lists are too narrow. An expansion of microorganisms relevant to food and water threats should be considered. Computerized networks should be established to track infectious disease outbreaks in real time. These systems could alert public health and agricultural officials to the existence of a potential bioattack earlier than simply waiting for a report of a suspicious cluster of similar patients. Once a biocrime is suspected, a wide variety of methods are available to identify the microorganism used in the bioattack and to analyze features that might lead to the source of the event. A multi-pronged approach to such an investigation may be preferable, using many available methods-ranging from genomics to sequencing to physiology to analysis of substances in the sample. Microbial forensics will be most effective if there is sufficient basic scientific information concerning microbial genetics, evolution, physiology, and ecology. Strain subtyping analysis will be difficult to interpret if we do not understand some of the basic evolutionary mechanisms and population diversity of pathogens. Phenotypic features associated with evidentiary pathogens also may provide investigative leads, but full exploitation of

  1. Age estimation in forensic sciences: Application of combined aspartic acid racemization and radiocarbon analysis

    Energy Technology Data Exchange (ETDEWEB)

    Alkass, K; Buchholz, B A; Ohtani, S; Yamamoto, T; Druid, H; Spalding, S L

    2009-11-02

    Age determination of unknown human bodies is important in the setting of a crime investigation or a mass disaster, since the age at death, birth date and year of death, as well as gender, can guide investigators to the correct identity among a large number of possible matches. Traditional morphological methods used by anthropologists to determine age are often imprecise, whereas chemical analysis of tooth dentin, such as aspartic acid racemization has shown reproducible and more precise results. In this paper we analyze teeth from Swedish individuals using both aspartic acid racemization and radiocarbon methodologies. The rationale behind using radiocarbon analysis is that above-ground testing of nuclear weapons during the cold war (1955-1963) caused an extreme increase in global levels of carbon-14 ({sup 14}C) which have been carefully recorded over time. Forty-four teeth from 41 individuals were analyzed using aspartic acid racemization analysis of tooth crown dentin or radiocarbon analysis of enamel and ten of these were split and subjected to both radiocarbon and racemization analysis. Combined analysis showed that the two methods correlated well (R2=0.66, p < 0.05). Radiocarbon analysis showed an excellent precision with an overall absolute error of 0.6 {+-} 04 years. Aspartic acid racemization also showed a good precision with an overall absolute error of 5.4 {+-} 4.2 years. Whereas radiocarbon analysis gives an estimated year of birth, racemization analysis indicates the chronological age of the individual at the time of death. We show how these methods in combination can also assist in the estimation of date of death of an unidentified victim. This strategy can be of significant assistance in forensic casework involving dead victim identification.

  2. Aberrant functional network connectivity in psychopathy from a large (N = 985) forensic sample.

    Science.gov (United States)

    Espinoza, Flor A; Vergara, Victor M; Reyes, Daisy; Anderson, Nathaniel E; Harenski, Carla L; Decety, Jean; Rachakonda, Srinivas; Damaraju, Eswar; Rashid, Barnaly; Miller, Robyn L; Koenigs, Michael; Kosson, David S; Harenski, Keith; Kiehl, Kent A; Calhoun, Vince D

    2018-06-01

    Psychopathy is a personality disorder characterized by antisocial behavior, lack of remorse and empathy, and impaired decision making. The disproportionate amount of crime committed by psychopaths has severe emotional and economic impacts on society. Here we examine the neural correlates associated with psychopathy to improve early assessment and perhaps inform treatments for this condition. Previous resting-state functional magnetic resonance imaging (fMRI) studies in psychopathy have primarily focused on regions of interest. This study examines whole-brain functional connectivity and its association to psychopathic traits. Psychopathy was hypothesized to be characterized by aberrant functional network connectivity (FNC) in several limbic/paralimbic networks. Group-independent component and regression analyses were applied to a data set of resting-state fMRI from 985 incarcerated adult males. We identified resting-state networks (RSNs), estimated FNC between RSNs, and tested their association to psychopathy factors and total summary scores (Factor 1, interpersonal/affective; Factor 2, lifestyle/antisocial). Factor 1 scores showed both increased and reduced functional connectivity between RSNs from seven brain domains (sensorimotor, cerebellar, visual, salience, default mode, executive control, and attentional). Consistent with hypotheses, RSNs from the paralimbic system-insula, anterior and posterior cingulate cortex, amygdala, orbital frontal cortex, and superior temporal gyrus-were related to Factor 1 scores. No significant FNC associations were found with Factor 2 and total PCL-R scores. In summary, results suggest that the affective and interpersonal symptoms of psychopathy (Factor 1) are associated with aberrant connectivity in multiple brain networks, including paralimbic regions. © 2018 Wiley Periodicals, Inc.

  3. Computational Social Network Analysis

    CERN Document Server

    Hassanien, Aboul-Ella

    2010-01-01

    Presents insight into the social behaviour of animals (including the study of animal tracks and learning by members of the same species). This book provides web-based evidence of social interaction, perceptual learning, information granulation and the behaviour of humans and affinities between web-based social networks

  4. Network analysis applications in hydrology

    Science.gov (United States)

    Price, Katie

    2017-04-01

    Applied network theory has seen pronounced expansion in recent years, in fields such as epidemiology, computer science, and sociology. Concurrent development of analytical methods and frameworks has increased possibilities and tools available to researchers seeking to apply network theory to a variety of problems. While water and nutrient fluxes through stream systems clearly demonstrate a directional network structure, the hydrological applications of network theory remain under­explored. This presentation covers a review of network applications in hydrology, followed by an overview of promising network analytical tools that potentially offer new insights into conceptual modeling of hydrologic systems, identifying behavioral transition zones in stream networks and thresholds of dynamical system response. Network applications were tested along an urbanization gradient in Atlanta, Georgia, USA. Peachtree Creek and Proctor Creek. Peachtree Creek contains a nest of five long­term USGS streamflow and water quality gages, allowing network application of long­term flow statistics. The watershed spans a range of suburban and heavily urbanized conditions. Summary flow statistics and water quality metrics were analyzed using a suite of network analysis techniques, to test the conceptual modeling and predictive potential of the methodologies. Storm events and low flow dynamics during Summer 2016 were analyzed using multiple network approaches, with an emphasis on tomogravity methods. Results indicate that network theory approaches offer novel perspectives for understanding long­ term and event­based hydrological data. Key future directions for network applications include 1) optimizing data collection, 2) identifying "hotspots" of contaminant and overland flow influx to stream systems, 3) defining process domains, and 4) analyzing dynamic connectivity of various system components, including groundwater­surface water interactions.

  5. Fire debris analysis for forensic fire investigation using laser induced breakdown spectroscopy (LIBS)

    Science.gov (United States)

    Choi, Soojin; Yoh, Jack J.

    2017-08-01

    The possibility verification of the first attempt to apply LIBS to arson investigation was performed. LIBS has capabilities for real time in-situ analysis and depth profiling. It can provide valuable information about the fire debris that are complementary to the classification of original sample components and combustion residues. In this study, fire debris was analyzed to determine the ignition source and existence of a fire accelerant using LIBS spectra and depth profiling analysis. Fire debris chemical composition and carbon layer thickness determines the possible ignition source while the carbon layer thickness of combusted samples represents the degree of sample carbonization. When a sample is combusted with fire accelerants, a thicker carbon layer is formed because the burning rate is increased. Therefore, depth profiling can confirm the existence of combustion accelerants, which is evidence of arson. Also investigation of fire debris by depth profiling is still possible when a fire is extinguished with water from fire hose. Such data analysis and in-situ detection of forensic signals via the LIBS may assist fire investigation at crime scenes.

  6. State of practice and emerging application of analytical techniques of nuclear forensic analysis: highlights from the 4th Collaborative Materials Exercise of the Nuclear Forensics International Technical Working Group (ITWG)

    International Nuclear Information System (INIS)

    Schwantes, J.M.; Pellegrini, K.L.; Marsden, Oliva

    2017-01-01

    The Nuclear Forensics International Technical Working Group (ITWG) recently completed its fourth Collaborative Materials Exercise (CMX-4) in the 21 year history of the Group. This was also the largest materials exercise to date, with participating laboratories from 16 countries or international organizations. Exercise samples (including three separate samples of low enriched uranium oxide) were shipped as part of an illicit trafficking scenario, for which each laboratory was asked to conduct nuclear forensic analyses in support of a fictitious criminal investigation. In all, over 30 analytical techniques were applied to characterize exercise materials, for which ten of those techniques were applied to ITWG exercises for the first time. An objective review of the state of practice and emerging application of analytical techniques of nuclear forensic analysis based upon the outcome of this most recent exercise is provided. (author)

  7. State of practice and emerging application of analytical techniques of nuclear forensic analysis: highlights from the 4th Collaborative Materials Exercise of the Nuclear Forensics International Technical Working Group (ITWG)

    International Nuclear Information System (INIS)

    Schwantes, Jon M.; Marsden, Oliva; Pellegrini, Kristi L.

    2016-01-01

    The Nuclear Forensics International Technical Working Group (ITWG) recently completed its fourth Collaborative Materials Exercise (CMX-4) in the 21 year history of the Group. This was also the largest materials exercise to date, with participating laboratories from 16 countries or international organizations. Moreover, exercise samples (including three separate samples of low enriched uranium oxide) were shipped as part of an illicit trafficking scenario, for which each laboratory was asked to conduct nuclear forensic analyses in support of a fictitious criminal investigation. In all, over 30 analytical techniques were applied to characterize exercise materials, for which ten of those techniques were applied to ITWG exercises for the first time. We performed an objective review of the state of practice and emerging application of analytical techniques of nuclear forensic analysis based upon the outcome of this most recent exercise is provided.

  8. Age estimation in forensic sciences: application of combined aspartic acid racemization and radiocarbon analysis.

    Science.gov (United States)

    Alkass, Kanar; Buchholz, Bruce A; Ohtani, Susumu; Yamamoto, Toshiharu; Druid, Henrik; Spalding, Kirsty L

    2010-05-01

    Age determination of unknown human bodies is important in the setting of a crime investigation or a mass disaster because the age at death, birth date, and year of death as well as gender can guide investigators to the correct identity among a large number of possible matches. Traditional morphological methods used by anthropologists to determine age are often imprecise, whereas chemical analysis of tooth dentin, such as aspartic acid racemization, has shown reproducible and more precise results. In this study, we analyzed teeth from Swedish individuals using both aspartic acid racemization and radiocarbon methodologies. The rationale behind using radiocarbon analysis is that aboveground testing of nuclear weapons during the cold war (1955-1963) caused an extreme increase in global levels of carbon-14 ((14)C), which has been carefully recorded over time. Forty-four teeth from 41 individuals were analyzed using aspartic acid racemization analysis of tooth crown dentin or radiocarbon analysis of enamel, and 10 of these were split and subjected to both radiocarbon and racemization analysis. Combined analysis showed that the two methods correlated well (R(2) = 0.66, p Aspartic acid racemization also showed a good precision with an overall absolute error of 5.4 +/- 4.2 years. Whereas radiocarbon analysis gives an estimated year of birth, racemization analysis indicates the chronological age of the individual at the time of death. We show how these methods in combination can also assist in the estimation of date of death of an unidentified victim. This strategy can be of significant assistance in forensic casework involving dead victim identification.

  9. Trace- and ultra-trace elemental analysis in forensic glass case work: looking back at 15 years use of ICP-MS and LA-ICP-MS at a forensic-science lab

    International Nuclear Information System (INIS)

    Duecking, M.; Weis, P.; Watzke, P.; Becker, S.

    2009-01-01

    Full text: The poster will present the use of LA-ICPMS at the BKA for forensic glass analysis. An overview will be given on the developments during the last 15 years, starting with the installation of the first ICPMS in 1993. A method for the quantification of elements in glass by LA-ICPMS was developed, validated and established in routine casework. Accreditation for the method according to ISO 17025 and ISO 17020 was received in 2007 and 2008, respectively. Latest developments of the technique will be presented. Forensic relevant features and limitations of the method such as sample size and homogeneity will be shown. (author)

  10. Ecological state of the urban environment as an object of forensic analysis within the period of introducing the judicial reform of Russia

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available For today, environmental protection is one of the most serious issues for the government. The urban environment is exposed to numerous negative natural and anthropogenic processes. The scientific article considers the main problems of forensic analysis of the ecological state of the urban environment. Reduction in the scope of environmental expertise caused by urban development reformation became the negative matter. The authors believe that the forensic analysis is an important legal instrument for ensuring rational environmental resources management and environmental protection from harmful impacts on urban areas. Along with rationing, licensing, certification, audit, the forensic analysis performs the function of environmental control, acting as a guarantor of compliance with legal requirements. In order to integrate new kinds (types of forensic analysis into a unified list of kinds (types of analysis and to regulate the existing lists, the adoption of the National Standard on Forensic Ecological Expert Analysis is demanded; however, the adoption of a unified National Standard of the Russian Federation on forensic analysis is also required.

  11. Nuclear Forensic Science: Analysis of Nuclear Material Out of Regulatory Control

    Science.gov (United States)

    Kristo, Michael J.; Gaffney, Amy M.; Marks, Naomi; Knight, Kim; Cassata, William S.; Hutcheon, Ian D.

    2016-06-01

    Nuclear forensic science seeks to identify the origin of nuclear materials found outside regulatory control. It is increasingly recognized as an integral part of a robust nuclear security program. This review highlights areas of active, evolving research in nuclear forensics, with a focus on analytical techniques commonly employed in Earth and planetary sciences. Applications of nuclear forensics to uranium ore concentrates (UOCs) are discussed first. UOCs have become an attractive target for nuclear forensic researchers because of the richness in impurities compared to materials produced later in the fuel cycle. The development of chronometric methods for age dating nuclear materials is then discussed, with an emphasis on improvements in accuracy that have been gained from measurements of multiple radioisotopic systems. Finally, papers that report on casework are reviewed, to provide a window into current scientific practice.

  12. [Histopathological analysis of organs submitted by legal medicine experts in Baojii City: 358 forensic identification cases].

    Science.gov (United States)

    Dong, Du-xuan; Shi, Ping-xia; Li, Yun-li; Tian, San-hu; Yang, Jia; Gao, Gang; Zheng, Yun; Jia, Le; Ju, Hong-ya; Sun, Lu-ying; Chen, Ni; Wang, Xiao-bao

    2014-08-01

    To analyze pathological characteristics of organs recovered during forensic autopsy submitted by legal medicine experts. From Baoji city, 358 cases of forensic autopsy specimens from a series of routine exams were collected. And histopathological diagnoses were reviewed. Majority of the 358 cases were young men. The major causes of death were trauma, sudden death and poisoning. The cause of death was determined with histology in 250 cases. No typical histological changes were noted in 101 cases. The tissue autolysis and decomposition were present in 7 cases. The major pathological diagnosis was cardiovascular disease, followed by diseases in respiratory, nervous, and digestive systems. Forensic autopsy with its professional characteristics, is different from regular autopsy. When diagnosing cause of death by histopathological examination, pathologists should collaborate with legal medicine experts to know the details of the cases, circumstances surrounding the death, and specific forensic pathological characteristics.

  13. Forensic speaker identification through comparative analysis of the formant frequencies of the vowels in the Macedonian language

    International Nuclear Information System (INIS)

    Pop-Dimitrijoska, V.; Apostolovska, G

    2012-01-01

    The main objective of this study is forensic speaker identification from an incriminated recording. The identification was made through a comparative analysis between first three formants F 1 , F 2 and F 3 of the voice samples from the questioned and suspects’ recordings. The measurements were made with the PRAAT software, for each of the five vowels in the Macedonian language: a, e, i, o and u, which were isolated from the recordings. Used methodology of recording examinations employed in this research showed positive identification of the questioned voice. The forensic audio analysis still doesn't have its place in legal and the crime fighting systems in Macedonia. This is a sufficient reason to put a bigger accent on the research of this issue in the future that will contribute in solving many criminal cases which until now, because of the type of generally accepted evidence, were not resolved. (Author)

  14. Chiral drug analysis using mass spectrometric detection relevant to research and practice in clinical and forensic toxicology.

    Science.gov (United States)

    Schwaninger, Andrea E; Meyer, Markus R; Maurer, Hans H

    2012-12-21

    This paper reviews analytical approaches published in 2002-2012 for chiral drug analysis and their relevance in research and practice in the field of clinical and forensic toxicology. Separation systems such as gas chromatography, high performance liquid chromatography, capillary electromigration, and supercritical fluid chromatography, all coupled to mass spectrometry, are discussed. Typical applications are reviewed for relevant chiral analytes such as amphetamines and amphetamine-derived designer drugs, methadone, tramadol, psychotropic and other CNS acting drugs, anticoagulants, cardiovascular drugs, and some other drugs. Usefulness of chiral drug analysis in the interpretation of analytical results in clinical and forensic toxicology is discussed as well. Copyright © 2012 Elsevier B.V. All rights reserved.

  15. A framework to approach problems of forensic anthropology using complex networks

    Science.gov (United States)

    Caridi, Inés; Dorso, Claudio O.; Gallo, Pablo; Somigliana, Carlos

    2011-05-01

    We have developed a method to analyze and interpret emerging structures in a set of data which lacks some information. It has been conceived to be applied to the problem of getting information about people who disappeared in the Argentine state of Tucumán from 1974 to 1981. Even if the military dictatorship formally started in Argentina had begun in 1976 and lasted until 1983, the disappearance and assassination of people began some months earlier. During this period several circuits of Illegal Detention Centres (IDC) were set up in different locations all over the country. In these secret centres, disappeared people were illegally kept without any sort of constitutional guarantees, and later assassinated. Even today, the final destination of most of the disappeared people’s remains is still unknown. The fundamental hypothesis in this work is that a group of people with the same political affiliation whose disappearances were closely related in time and space shared the same place of captivity (the same IDC or circuit of IDCs). This hypothesis makes sense when applied to the systematic method of repression and disappearances which was actually launched in Tucumán, Argentina (2007) [11]. In this work, the missing individuals are identified as nodes on a network and connections are established among them based on the individuals’ attributes while they were alive, by using rules to link them. In order to determine which rules are the most effective in defining the network, we use other kind of knowledge available in this problem: previous results from the anthropological point of view (based on other sources of information, both oral and written, historical and anthropological data, etc.); and information about the place (one or more IDCs) where some people were kept during their captivity. For these best rules, a prediction about these people’s possible destination is assigned (one or more IDCs where they could have been kept), and the success of the

  16. Analysis of dental injuries with clinical implications: A forensic case report.

    Science.gov (United States)

    Tan, Si-Lei; Peng, Shu-Ya; Wan, Lei; Chen, Jie-Min; Xia, Wen-Tao

    2018-01-01

    Dental injuries, especially of the incisors, caused by punches in violent criminal attacks could be seen in daily forensic casework involving the identification of injuries to a living body. Sometimes, when there is neither circumstantial evidence nor information about the surrounding circumstances, it is difficult to discern the cause of these injuries and the manner in which they were inflicted. As an example of clinical forensic medicine, we present the case of a 58-year-old woman whose teeth were injured when fighting with her son-in-law over household affairs with no witnesses present. The two parties had conflicting stories about the cause of the woman's injury. The woman claimed that her teeth were lost while she was being beaten by her son-in-law, and the man argued that the damage to his mother-in-law's teeth was self-inflicted when she bit his fingers. The police attending the crime called for a forensic examination. Forensic practitioners analysed the mechanism of the tooth loss using multi-slice spiral computed tomography (MSCT) and imaging reconstruction technology. Local alveolar bone (medial alveolar) fracture and a small area of alveolar bone loss were found on MSCT. Thus, forensic medical experts speculated that the woman's lower central and lateral incisors were lost as a result of a violent attack and were not self-inflicted. Finally, forensic practitioners helped police in avoiding a miscarriage of justice and wrongful conviction.

  17. Graduate Accounting Students' Perception of IT Forensics: A Multi-Dimensional Analysis

    Directory of Open Access Journals (Sweden)

    Grover S. Kearns

    2009-03-01

    Full Text Available Forensics and information technology (IT have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 graduate accounting students was conducted to measure two dimensions − knowledge and skills and interest and enjoyment − along nine common topics found in a forensics IT course. The association of the two dimensions was then measured. Also, the relationship between IT attitudes and the nine topics was measured along both dimensions. Fifteen hypotheses are presented and tested. Results are discussed to posit what instructors can do in order to increase the quality of the class and the positive perception of IT for accounting students.

  18. Forensic nursing and the palliative approach to care: an empirical nursing ethics analysis.

    Science.gov (United States)

    Wright, David Kenneth; Vanderspank-Wright, Brandi; Holmes, Dave; Skinner, Elise

    2017-08-02

    A movement is underway to promote a palliative approach to care in all contexts where people age and live with life-limiting conditions, including psychiatric settings. Forensic psychiatry nursing-a subfield of mental health nursing- focuses on individuals who are in conflict with the criminal justice system. We know little about the values of nurses working in forensic psychiatry, and how these values might influence a palliative approach to care for frail and aging patients. Interviews with four nurses working on one of two forensic units of a university-affiliated mental health hospital in an urban area of eastern Canada. Three specific values were found to guide forensic nurses in their care of aging patients that are commensurate with a palliative approach: hope, inclusivity, and quality of life. When we started this project, we wondered whether the culture of forensic nursing practice was antithetical to the values of a palliative approach. Instead, we found several parallels between forensic nurses' moral identities and palliative philosophy. These findings have implications for how we think about the palliative approach in contexts not typically associated with palliative care, but in which patients will increasingly age and die.

  19. Remote Forensics May Bring the Next Sea Change in E-discovery: Are All Networked Computers Now Readily Accessible Under the Revised Federal Rules of Civil Procedure?

    Directory of Open Access Journals (Sweden)

    AleJoseph J. Schwerha

    2008-09-01

    on geographically dispersed computers remotely.  That process, in general, is often defined as remote forensics. The question is now whether newly available remote forensic solution indicate that all networked computers are readily accessible under the current state of the law.  This article attempts to define remote forensics, examines a selection of applicable court decisions, and then analyzes the currently available commercial software packages that allow remote forensics.

  20. Forensic analysis of ballpoint pen inks using paper spray mass spectrometry.

    Science.gov (United States)

    da Silva Ferreira, Priscila; Fernandes de Abreu e Silva, Débora; Augusti, Rodinei; Piccin, Evandro

    2015-02-07

    A novel analytical approach based on paper spray mass spectrometry (PS-MS) is developed for a fast and effective forensic analysis of inks in documents. Ink writings made in ordinary paper with blue ballpoint pens were directly analyzed under ambient conditions without any prior sample preparation. Firstly, the method was explored on a set of distinct pens and the results obtained in the positive ion mode, PS(+)-MS, demonstrated that pens from different brands provide typical profiles. Simple visual inspection of the PS(+)-MS led to the distinction of four different combinations of dyes and additives in the inks. Further discrimination was performed by using the concept of relative ion intensity (RII), owing to the large variability of dyes BV3 and BB26 regarding their demethylated homologues. Following screening and differentiation studies, the composition changes of ink entries subjected to light exposure were also monitored by PS-MS. The results of these tests revealed distinct degradation behaviors which were reflected on the typical chemical profiles of the studied inks, attesting that PS-MS may be also useful to verify the fading of dyes thus allowing the discrimination of entries on a document. As proof of concept experiments, PS-MS was successfully utilized for the analysis of archived documents and characterization of overlapped ink lines made on simulated forged documents.

  1. Civilizing the 'Barbarian': a critical analysis of behaviour modification programmes in forensic psychiatry settings.

    Science.gov (United States)

    Holmes, Dave; Murray, Stuart J

    2011-04-01

    Drawing on the works of Erving Goffman and Michel Foucault, this article presents part of the results of a qualitative study conducted in a forensic psychiatry setting. For many years, behaviour modification programmes (BMPs) have been subjected to scrutiny and harsh criticism on the part of researchers, clinicians and professional organizations. Nevertheless, BMPs continue to be in vogue in some 'total' institutions, such as psychiatric hospitals and prisons. Discourse analysis of mute evidence available in situ was used to critically look at behaviour modification programmes. Compelling examples of behaviour modification care plans are used to illustrate our critical analysis and to support our claim that BMPs violate both scientific and ethical norms in the name of doing 'what is best' for the patients. We argue that the continued use of BMPs is not only flawed from a scientific perspective, but constitutes an unethical approach to the management of nursing care for mentally ill offenders. Nurse managers need to be aware that BMPs violate ethical standards in nursing. As a consequence, they should overtly question the use of these approaches in psychiatric nursing. © 2011 The Authors. Journal compilation © 2011 Blackwell Publishing Ltd.

  2. Forensic analysis of Salvia divinorum using multivariate statistical procedures. Part I: discrimination from related Salvia species.

    Science.gov (United States)

    Willard, Melissa A Bodnar; McGuffin, Victoria L; Smith, Ruth Waddell

    2012-01-01

    Salvia divinorum is a hallucinogenic herb that is internationally regulated. In this study, salvinorin A, the active compound in S. divinorum, was extracted from S. divinorum plant leaves using a 5-min extraction with dichloromethane. Four additional Salvia species (Salvia officinalis, Salvia guaranitica, Salvia splendens, and Salvia nemorosa) were extracted using this procedure, and all extracts were analyzed by gas chromatography-mass spectrometry. Differentiation of S. divinorum from other Salvia species was successful based on visual assessment of the resulting chromatograms. To provide a more objective comparison, the total ion chromatograms (TICs) were subjected to principal components analysis (PCA). Prior to PCA, the TICs were subjected to a series of data pretreatment procedures to minimize non-chemical sources of variance in the data set. Successful discrimination of S. divinorum from the other four Salvia species was possible based on visual assessment of the PCA scores plot. To provide a numerical assessment of the discrimination, a series of statistical procedures such as Euclidean distance measurement, hierarchical cluster analysis, Student's t tests, Wilcoxon rank-sum tests, and Pearson product moment correlation were also applied to the PCA scores. The statistical procedures were then compared to determine the advantages and disadvantages for forensic applications.

  3. Analysis of forensically used autosomal short tandem repeat markers in Polish and neighboring populations.

    Science.gov (United States)

    Soltyszewski, Ireneusz; Plocienniczak, Andrzej; Fabricius, Hans Ake; Kornienko, Igor; Vodolazhsky, Dmitrij; Parson, Walther; Hradil, Roman; Schmitter, Hermann; Ivanov, Pavel; Kuzniar, Piotr; Malyarchuk, Boris A; Grzybowski, Tomasz; Woźniak, Marcin; Henke, Jurgen; Henke, Lotte; Olkhovets, Sergiv; Voitenko, Vladimir; Lagus, Vita; Ficek, Andrej; Minárik, Gabriel; de Knijff, Peter; Rebała, Krzysztof; Wysocka, Joanna; Kapińska, Ewa; Cybulska, Lidia; Mikulich, Alexei I; Tsybovsky, Iosif S; Szczerkowska, Zofia; Krajewski, Paweł; Ploski, Rafał

    2008-06-01

    The purpose of this study was to evaluate the homogeneity of Polish populations with respect to STRs chosen as core markers of the Polish Forensic National DNA Intelligence Database, and to provide reference allele frequencies and to explore the genetic interrelationship between Poland and neighboring countries. The allele frequency distribution of 10 STRs included in the SGMplus kit was analyzed among 2176 unrelated individuals from 6 regional Polish populations and among 4321 individuals from Germany (three samples), Austria, The Netherlands, Sweden, Czech Republic, Slovakia, Belarus, Ukraine and the Russian Federation (six samples). The statistical approach consisted of AMOVA, calculation of pairwise Rst values and analysis by multidimensional scaling. We found homogeneity of present day Poland and consistent differences between Polish and German populations which contrasted with relative similarities between Russian and German populations. These discrepancies between genetic and geographic distances were confirmed by analysis of an independent data set on Y chromosome STRs. Migrations of Goths, Viking influences, German settlements in the region of Volga river and/or forced population resettlements and other events related to World War II are the historic events which might have caused these finding.

  4. Biosampling strategies for emerging drugs of abuse: towards the future of toxicological and forensic analysis.

    Science.gov (United States)

    Mercolini, Laura; Protti, Michele

    2016-10-25

    The term "new psychoactive substances" refers to emerging drugs of abuse whose chemical structure and psychoactive effects are similar to other already known compounds, often providing a "legal" alternative to internationally regulated drugs and mostly available via on-line retail sites. There are several categories of new psychoactive substances, such as synthetic cannabinoids, cathinone analogues, phenethylamines, tryptamines, and the need to identify and quantify an unprecedented and growing number of new compounds represents a unique challenge for toxicological and forensic analysis. The purpose of this review is to highlight biosampling, sample preparation and analysis of the most important classes of emerging drugs of abuse in biological matrices, focusing on alternatives to classical blood and urine "in tube" approach, still representing the standard routine for bioanalysis, despite inherent flaws regarding handling, stability and process feasibility. Chromatographic techniques coupled to mass spectrometry are usually exploited to identify and quantify new psychoactive substances; due to their high sensitivity and selectivity, it is possible to determine low concentrations not only in plasma and urine, but also in alternative matrices like dried blood spots, oral fluid, hair, other body fluids and tissues. Current literature on analytical methodologies applied to these samples is still limited and a more thorough validation is often required, including a comparison among the results obtained from conventional approaches and from innovative strategies, in order to determine their actual suitability. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Validation of the AmpFlSTR« SEfiler Plus(TM) PCR Amplification kit for forensic STR analysis

    DEFF Research Database (Denmark)

    Fredslund, Stine Frisk; Mogensen, Helle Smidt; Morling, Niels

    2009-01-01

    Validation of the AmpFlSTR« SEfiler Plus(TM) PCR Amplification kit with 29 and 30 PCR cycles for forensic STR analysis demonstrated that the kit had fewer artefacts than the AmpFlSTR« SGM Plus(TM) kit (28 PCR cycles). The SEfiler Plus kit was more sensitive and devoid of colour artefacts, but sho......, but showed more stutters, drop-ins, drop-outs and allelic imbalances...

  6. Population-Sequencing as a Biomarker of Burkholderia mallei and Burkholderia pseudomallei Evolution through Microbial Forensic Analysis

    Directory of Open Access Journals (Sweden)

    John P. Jakupciak

    2013-01-01

    Full Text Available Large-scale genomics projects are identifying biomarkers to detect human disease. B. pseudomallei and B. mallei are two closely related select agents that cause melioidosis and glanders. Accurate characterization of metagenomic samples is dependent on accurate measurements of genetic variation between isolates with resolution down to strain level. Often single biomarker sensitivity is augmented by use of multiple or panels of biomarkers. In parallel with single biomarker validation, advances in DNA sequencing enable analysis of entire genomes in a single run: population-sequencing. Potentially, direct sequencing could be used to analyze an entire genome to serve as the biomarker for genome identification. However, genome variation and population diversity complicate use of direct sequencing, as well as differences caused by sample preparation protocols including sequencing artifacts and mistakes. As part of a Department of Homeland Security program in bacterial forensics, we examined how to implement whole genome sequencing (WGS analysis as a judicially defensible forensic method for attributing microbial sample relatedness; and also to determine the strengths and limitations of whole genome sequence analysis in a forensics context. Herein, we demonstrate use of sequencing to provide genetic characterization of populations: direct sequencing of populations.

  7. Advanced in the Forensic Analysis of Glass Fragments with a Focus on Refractive Index and Elemental Analysis.

    Science.gov (United States)

    Almirall, J R; Trejos, T

    2006-07-01

    Advances in technology provide forensic scientists with better tools to detect, to identify, and to individualize small amounts of trace evidence that have been left at a crime scene. The analysis of glass fragments can be useful in solving cases such as hit and run, burglaries, kidnappings, and bombings. The value of glass as "evidentiary material" lies in its inherent characteristics such as: (a) it is a fragile material that is often broken and hence commonly found in various types of crime scenes, (b) it can be easily transferred from the broken source to the scene, suspect, and/or victim, (c) it is relatively persistent, (d) it is chemically stable, and (e) it has measurable physical and chemical properties that can provide significant evidence of an association between the recovered glass fragments and the source of the broken glass. Forensic scientists have dedicated considerable effort to study and improve the detection and discrimination capabilities of analytical techniques in order to enhance the quality of information obtained from glass fragments. This article serves as a review of the developments in the application of both traditional and novel methods of glass analysis. The greatest progress has been made with respect to the incorporation of automated refractive index measurements and elemental analysis to the analytical scheme. Glass examiners have applied state-of-the-art technology including elemental analysis by sensitive methods such as ICPMS and LA-ICP-MS. A review of the literature regarding transfer, persistence, and interpretation of glass is also presented. Copyright © 2006 Central Police University.

  8. Parzen neural networks: Fundamentals, properties, and an application to forensic anthropology.

    Science.gov (United States)

    Trentin, Edmondo; Lusnig, Luca; Cavalli, Fabio

    2018-01-01

    A novel, unsupervised nonparametric model of multivariate probability density functions (pdf) is introduced, namely the Parzen neural network (PNN). The PNN is intended to overcome the major limitations of traditional (either statistical or neural) pdf estimation techniques. Besides being profitably simple, the PNN turns out to have nice properties in terms of unbiased modeling capability, asymptotic convergence, and efficiency at test time. Several matters pertaining the practical application of the PNN are faced in the paper, too. Experiments are reported, involving (i) synthetic datasets, and (ii) a challenging sex determination task from 1400 scout-view CT-scan images of human crania. Incidentally, the empirical evidence entails also some conclusions of high anthropological relevance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. New perspectives in forensic anthropology.

    Science.gov (United States)

    Dirkmaat, Dennis C; Cabo, Luis L; Ousley, Stephen D; Symes, Steven A

    2008-01-01

    A critical review of the conceptual and practical evolution of forensic anthropology during the last two decades serves to identify two key external factors and four tightly inter-related internal methodological advances that have significantly affected the discipline. These key developments have not only altered the current practice of forensic anthropology, but also its goals, objectives, scope, and definition. The development of DNA analysis techniques served to undermine the classic role of forensic anthropology as a field almost exclusively focused on victim identification. The introduction of the Daubert criteria in the courtroom presentation of scientific testimony accompanied the development of new human comparative samples and tools for data analysis and sharing, resulting in a vastly enhanced role for quantitative methods in human skeletal analysis. Additionally, new questions asked of forensic anthropologists, beyond identity, required sound scientific bases and expanded the scope of the field. This environment favored the incipient development of the interrelated fields of forensic taphonomy, forensic archaeology, and forensic trauma analysis, fields concerned with the reconstruction of events surrounding death. Far from representing the mere addition of new methodological techniques, these disciplines (especially, forensic taphonomy) provide forensic anthropology with a new conceptual framework, which is broader, deeper, and more solidly entrenched in the natural sciences. It is argued that this new framework represents a true paradigm shift, as it modifies not only the way in which classic forensic anthropological questions are answered, but also the goals and tasks of forensic anthropologists, and their perception of what can be considered a legitimate question or problem to be answered within the field.

  10. iPhone Forensics Recovering Evidence, Personal Data, and Corporate Assets

    CERN Document Server

    Zdziarski, Jonathan

    2008-01-01

    With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch.

  11. Analysis of neural networks

    CERN Document Server

    Heiden, Uwe

    1980-01-01

    The purpose of this work is a unified and general treatment of activity in neural networks from a mathematical pOint of view. Possible applications of the theory presented are indica­ ted throughout the text. However, they are not explored in de­ tail for two reasons : first, the universal character of n- ral activity in nearly all animals requires some type of a general approach~ secondly, the mathematical perspicuity would suffer if too many experimental details and empirical peculiarities were interspersed among the mathematical investigation. A guide to many applications is supplied by the references concerning a variety of specific issues. Of course the theory does not aim at covering all individual problems. Moreover there are other approaches to neural network theory (see e.g. Poggio-Torre, 1978) based on the different lev­ els at which the nervous system may be viewed. The theory is a deterministic one reflecting the average be­ havior of neurons or neuron pools. In this respect the essay is writt...

  12. Transmission analysis in WDM networks

    DEFF Research Database (Denmark)

    Rasmussen, Christian Jørgen

    1999-01-01

    This thesis describes the development of a computer-based simulator for transmission analysis in optical wavelength division multiplexing networks. A great part of the work concerns fundamental optical network simulator issues. Among these issues are identification of the versatility and user...... the different component models are invoked during the simulation of a system. A simple set of rules which makes it possible to simulate any network architectures is laid down. The modelling of the nonlinear fibre and the optical receiver is also treated. The work on the fibre concerns the numerical solution...

  13. Modular analysis of biological networks.

    Science.gov (United States)

    Kaltenbach, Hans-Michael; Stelling, Jörg

    2012-01-01

    The analysis of complex biological networks has traditionally relied on decomposition into smaller, semi-autonomous units such as individual signaling pathways. With the increased scope of systems biology (models), rational approaches to modularization have become an important topic. With increasing acceptance of de facto modularity in biology, widely different definitions of what constitutes a module have sparked controversies. Here, we therefore review prominent classes of modular approaches based on formal network representations. Despite some promising research directions, several important theoretical challenges remain open on the way to formal, function-centered modular decompositions for dynamic biological networks.

  14. Forensic analysis of tempered sheet glass by particle induced X-ray emission (PIXE)

    Energy Technology Data Exchange (ETDEWEB)

    Jisonna, L.J. [Department of Chemistry and Department of Physics, Hope College, Holland, MI 49422-9000 (United States); DeYoung, P.A., E-mail: deyoung@hope.ed [Department of Chemistry and Department of Physics, Hope College, Holland, MI 49422-9000 (United States); Ferens, J.; Hall, C.; Lunderberg, J.M.; Mears, P. [Department of Chemistry and Department of Physics, Hope College, Holland, MI 49422-9000 (United States); Padilla, D. [Department of Physics, San Diego State University, San Diego, CA 92182-1233 (United States); Peaslee, G.F. [Department of Chemistry and Department of Physics, Hope College, Holland, MI 49422-9000 (United States); Sampson, R. [Department of Physics, Columbia University, New York, NY 10027 (United States)

    2011-05-15

    Highlights: {yields} PIXE was found to give the same results for trace elements in glass as ICP. {yields} PIXE can non-destructively determine trace element concentrations in auto glass. {yields} Measured Ca, Fe, Ti, Mn, and Sr in auto glass with PIXE. -- Abstract: The elemental concentrations of five trace elements in tempered sheet glass fragments were determined using particle-induced X-ray emission (PIXE) spectrometry. The trace element concentrations for calcium, iron, manganese, strontium, and titanium are compared to those obtained by inductively-coupled plasma-atomic emission spectrometry (ICP-AES) following complete digestion by hydrofluoric acid. For these five elements, the absolute concentrations obtained by both methods are shown to agree well over a wide range of concentrations. The limits of detection for trace elements are typically lower for the ICP-AES method. However, we show that the concentrations of these five elements can be accurately measured by the PIXE method. Since PIXE is an entirely non-destructive method, there exists a niche for this technique to be used as a complement to the more sensitive ICP-AES technique in the forensic analysis of sheet glass.

  15. Computer analysis of ATR-FTIR spectra of paint samples for forensic purposes

    Science.gov (United States)

    Szafarska, Małgorzata; Woźniakiewicz, Michał; Pilch, Mariusz; Zięba-Palus, Janina; Kościelniak, Paweł

    2009-04-01

    A method of subtraction and normalization of IR spectra (MSN-IR) was developed and successfully applied to extract mathematically the pure paint spectrum from the spectrum of paint coat on different bases, both acquired by the Attenuated Total Reflectance Fourier Transform Infrared (ATR-FTIR) technique. The method consists of several stages encompassing several normalization and subtraction processes. The similarity of the spectrum obtained with the reference spectrum was estimated by means of the normalized Manhattan distance. The utility and performance of the method proposed were tested by examination of five different paints sprayed on plastic (polyester) foil and on fabric materials (cotton). It was found that the numerical algorithm applied is able - in contrast to other mathematical approaches conventionally used for the same aim - to reconstruct a pure paint IR spectrum effectively without a loss of chemical information provided. The approach allows the physical separation of a paint from a base to be avoided, hence a time and work-load of analysis to be considerably reduced. The results obtained prove that the method can be considered as a useful tool which can be applied to forensic purposes.

  16. Applications of a glazing incidence X-ray fluorescence analysis to forensic samples

    International Nuclear Information System (INIS)

    Ninomiya, Toshio; Nomura, Shigeaki; Taniguchi, Kazuo; Ikeda, Shigero.

    1995-01-01

    A glazing incidence X-ray fluorescence analysis (GIXF) has been applied to forensic samples: a counterfeit 100-dollar bill, fragments of polyvinyl tapes, a trace of semen, illegal drugs, fingerprints and fake V.S.O.P brandy. Strontium could not be detected on the magnet-respondent letter of the counterfeit bill and Br was detected on the magnet-nonrespondent part of the counterfeit bill, while such phenomena could not be noticed on a true bill. Fragments of black vinyl tapes related to a sexual assault case could be discriminated from each other. Zinc as a characteristic ingredient could be detected in a trace of semen. Bromine was detected in each of what is called a pure methamphetamine crystal and K, Ca, Fe, Zn etc. were detected in heroin powders. Lead was sharply detected in gunshot residues attached to a finger after gunfiring. Sulfur as a contaminant was abundant in fake V.S.O.P brandy, while no S was detected in genuine V.S.O.P brandy. (author)

  17. Applications of a glazing incidence X-ray fluorescence analysis to forensic samples

    Energy Technology Data Exchange (ETDEWEB)

    Ninomiya, Toshio [Hyogo Prefecture, Kobe (Japan). Forensic Science Lab.; Nomura, Shigeaki; Taniguchi, Kazuo; Ikeda, Shigero

    1995-06-01

    A glazing incidence X-ray fluorescence analysis (GIXF) has been applied to forensic samples: a counterfeit 100-dollar bill, fragments of polyvinyl tapes, a trace of semen, illegal drugs, fingerprints and fake V.S.O.P brandy. Strontium could not be detected on the magnet-respondent letter of the counterfeit bill and Br was detected on the magnet-nonrespondent part of the counterfeit bill, while such phenomena could not be noticed on a true bill. Fragments of black vinyl tapes related to a sexual assault case could be discriminated from each other. Zinc as a characteristic ingredient could be detected in a trace of semen. Bromine was detected in each of what is called a pure methamphetamine crystal and K, Ca, Fe, Zn etc. were detected in heroin powders. Lead was sharply detected in gunshot residues attached to a finger after gunfiring. Sulfur as a contaminant was abundant in fake V.S.O.P brandy, while no S was detected in genuine V.S.O.P brandy. (author).

  18. Analysis of degraded papers by infrared and Raman spectroscopy for forensic purposes

    Science.gov (United States)

    Zięba-Palus, J.; Wesełucha-Birczyńska, A.; Trzcińska, B.; Kowalski, R.; Moskal, P.

    2017-07-01

    Paper being the basis of different documents is often the subject of forensic examination. Growing number of bogus or in other manner fraudulently alternated documents causes necessity of identification of individual paper sheets and discrimination between sheets being the parts of analyzed questioned document. Frequently it is necessary to distinguish between paper of the same type but of a different age. Thus, it is essential to know whether the degradation process of paper influences the possibility of differentiation between paper samples. Samples of five types of office paper from different manufacturers were artificially aged in a climatic chamber under 65% relative humidity in air at 90 °C for various periods of time up to 35 days. The conditioned samples were examined by the use of infrared and Raman spectroscopy. Three cards of each paper type were chosen for the experiment. Three different spots on each paper card were measured to assure reproducibility of the experiment in both spectroscopic methods. The possibility of differentiation between aged samples was evaluated. The 2D correlation analysis based on the Noda's method was carried out using ATR FTIR spectra as an input data for generating the correlation maps. It was found that pattern of 2D maps allow to distinguish tested paper samples, identified its components and get insight into paper degradation mechanism.

  19. Raman spectroscopy and capillary electrophoresis applied to forensic colour inkjet printer inks analysis.

    Science.gov (United States)

    Król, Małgorzata; Karoly, Agnes; Kościelniak, Paweł

    2014-09-01

    Forensic laboratories are increasingly engaged in the examination of fraudulent documents, and what is important, in many cases these are inkjet-printed documents. That is why systematic approaches to inkjet printer inks comparison and identification have been carried out by both non-destructive and destructive methods. In this study, micro-Raman spectroscopy and capillary electrophoresis (CE) were applied to the analysis of colour inkjet printer inks. Micro-Raman spectroscopy was used to study the chemical composition of colour inks in situ on a paper surface. It helps to characterize and differentiate inkjet inks, and can be used to create a spectra database of inks taken from different cartridge brands and cartridge numbers. Capillary electrophoresis in micellar electrophoretic capillary chromatography mode was applied to separate colour and colourless components of inks, enabling group identification of those components which occur in a sufficient concentration (giving intensive peaks). Finally, on the basis of the obtained results, differentiation of the analysed inks was performed. Twenty-three samples of inkjet printer inks were examined and the discriminating power (DP) values for both presented methods were established in the routine work of experts during the result interpretation step. DP was found to be 94.0% (Raman) and 95.6% (CE) when all the analysed ink samples were taken into account, and it was 96.7% (Raman) and 98.4% (CE), when only cartridges with different index numbers were considered. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. Simulation of attenuated total reflection infrared absorbance spectra: applications to automotive clear coat forensic analysis.

    Science.gov (United States)

    Lavine, Barry K; Fasasi, Ayuba; Mirjankar, Nikhil; Nishikida, Koichi; Campbell, Jay

    2014-01-01

    Attenuated total reflection (ATR) is a widely used sampling technique in infrared (IR) spectroscopy because minimal sample preparation is required. Since the penetration depth of the ATR analysis beam is quite shallow, the outer layers of a laminate or multilayered paint sample can be preferentially analyzed with the entire sample intact. For this reason, forensic laboratories are taking advantage of ATR to collect IR spectra of automotive paint systems that may consist of three or more layers. However, the IR spectrum of a paint sample obtained by ATR will exhibit distortions, e.g., band broadening and lower relative intensities at higher wavenumbers, compared with its transmission counterpart. This hinders library searching because most library spectra are measured in transmission mode. Furthermore, the angle of incidence for the internal reflection element, the refractive index of the clear coat, and surface contamination due to inorganic contaminants can profoundly influence the quality of the ATR spectrum obtained for automotive paints. A correction algorithm to allow ATR spectra to be searched using IR transmission spectra of the paint data query (PDQ) automotive database is presented. The proposed correction algorithm to convert transmission spectra from the PDQ library to ATR spectra is able to address distortion issues such as the relative intensities and broadening of the bands, and the introduction of wavelength shifts at lower frequencies, which prevent library searching of ATR spectra using archived IR transmission data.

  1. Forensic psychologist

    Directory of Open Access Journals (Sweden)

    Tinkara Pavšič Mrevlje

    2011-04-01

    Full Text Available The paper is a review of different issues that a forensic psychologists encounter at work. Forensic assessment might be needed in civil law cases, administrative procedures and in criminal law cases. The paper focuses on referrals in criminal law cases regarding matters such as assessing competence to stand trial, criminal responsibility and violence risk assessment. Finally, the role of expert testimony on eyewitness memory, which is not used in practice in Slovenia yet, is presented.

  2. Elemental analysis of forensic glasses by inductively coupled plasma mass spectrometry

    Science.gov (United States)

    Almirall, Jose R.; Duckworth, Douglas C.; Bayne, Charles K.; Morton, Sherman A.; Smith, David H.; Koons, Robert D.; Furton, Kenneth G.

    1999-02-01

    Flat glass is a common type of evidence collected from the scenes of crimes such as burglaries, vandalism, and hit-and- run accidents. The usefulness of such evidence lies in the ability to associate the glass from the scene (or a suspect) to the original source. Physical and chemical analysis of the glass can be used for discrimination between the possible sources of glass. If the sample is large enough, physical attributes such as fracture matches, density, color, and thickness can be employed for comparison between a recovered fragment(s) to the suspect source. More commonly, refractive index (RI) comparisons are employed. Due to the improved control over glass manufacturing processes, RI values often cannot differentiate glasses where approximately 6 - 9% of casework samples are not expected to be distinguished by RI alone even if they originated from different sources. Employing methods such as NAA, XRF, ICP-AES, and ICP-MS for the comparison of trace elemental compositions has been shown to be more discriminating than RI comparisons. The multielement capability and the sensitivity of ICP-AES and ICP-MS provide for excellent discrimination power. In this work, the sources of variability in ICP-MS of glass analysis are investigated to determine possible sources of variation. The sources of variation examined include errors due to sample preparation, instrument accuracy and precision, and interlaboratory reproducibility. Other sources of variation include inhomogeneity across a sheet of glass from the same source. Analysis of variance has been applied to our ICP-MS analysis of NIST standards and to the interlaboratory comparisons of float glass samples collected across a sheet in a production facility. The results of these experiments allows for a more accurate interpretation of forensic glass data and a better understanding of the discriminating power (absolute and practical) of ICP-MS.

  3. Antenna analysis using neural networks

    Science.gov (United States)

    Smith, William T.

    1992-01-01

    Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary). A comparison between the simulated and actual W-L techniques is shown for a triangular-shaped pattern. Dolph-Chebyshev is a different class of synthesis technique in that D-C is used for side lobe control as opposed to pattern

  4. Paternity analysis based on NGM SElect system in the Medical and Forensic Genetics Laboratory, Department of Forensic Medicine, Medical University of Lodz

    Directory of Open Access Journals (Sweden)

    Beata Markiewicz-Knyziak

    2015-08-01

    Full Text Available The aim of the study was to evaluate the usefulness of the NGM SElect multiplex kit for paternity testing in the population of central Poland, and compare it with the IDENTIFILER system. The study material consisted of buccal swabs taken from individuals who reported to the Medical and Forensic Genetics Laboratory in Lodz. Samples from 450 trio cases of disputed paternity carried out in 2010–2014 were investigated. Genomic DNA was extracted from buccal swabs collected from 1,350 individuals using the Swab kit (A&A Biotechnology according to the manufacturer’s protocol. DNA amplification was performed using the AmpFℓSTR ® NGM Select TM PCR Amplification Kit (Life Technologies. PCR products were separated by capillary electrophoresis using HID 3500 Genetic Analyzer. In the analyzed cases with paternity confirmation in the NGM SElect system, the maximum value of PI was 3.9 × 10 12 , which corresponds to the probability of paternity W = 99.9999999999%. It was thus significantly higher than analogical parameters obtained in the IDENTIFILER system (PI = 6.0 × 10 10 , W = 99.99999999%. The NGM SElect kit was unable to resolve just one case out of 450, which represents only 0.2% of all analyzed disputed paternity cases. The study showed the SE33 (ACTBP2 locus to have the highest evidence value in paternity analysis out of all investigated autosomal STRs.

  5. Reverse engineering--rapid prototyping of the skull in forensic trauma analysis.

    Science.gov (United States)

    Kettner, Mattias; Schmidt, Peter; Potente, Stefan; Ramsthaler, Frank; Schrodt, Michael

    2011-07-01

    Rapid prototyping (RP) comprises a variety of automated manufacturing techniques such as selective laser sintering (SLS), stereolithography, and three-dimensional printing (3DP), which use virtual 3D data sets to fabricate solid forms in a layer-by-layer technique. Despite a growing demand for (virtual) reconstruction models in daily forensic casework, maceration of the skull is frequently assigned to ensure haptic evidence presentation in the courtroom. Owing to the progress in the field of forensic radiology, 3D data sets of relevant cases are usually available to the forensic expert. Here, we present a first application of RP in forensic medicine using computed tomography scans for the fabrication of an SLS skull model in a case of fatal hammer impacts to the head. The report is intended to show that this method fully respects the dignity of the deceased and is consistent with medical ethics but nevertheless provides an excellent 3D impression of anatomical structures and injuries. © 2011 American Academy of Forensic Sciences.

  6. [Forensic analysis of death caused by fat embolism: A study of 20 autopsy cases].

    Science.gov (United States)

    Zhou, Lan; Mu, Jiao; Dong, Hong-Mei; Zhang, Ji

    2013-12-01

    To analyze the general and forensic pathological characteristics of death due to fat embolism syndrome (FES) and to provide reference data for forensic identification. Twenty autopsy cases due to FES were selected from the forensic center of a medical college from 1999 to 2012. The general and forensic pathological characteristics such as the ways and types of injuries, clinical manifestation and the pathological changes were summarized. Fat embolism mainly occurred after long bone fracture or a large area of soft tissue injury with the majority of cases being fat embolism of lung and occasional cases being combined embolisms of lung and brain as well. The onset of symptoms appeared shortly after the injury or surgery. Lipid droplets could be observed within small pulmonary vessels and verified by special staining. There are particular characteristics in death due to FES in concern with types of injuries, onset of symptoms and pathological findings. In order to find out the direct evidence of FES, special staining (oil red O staining) can be used in the forensic identification.

  7. Thermal analysis as an aid to forensics: Alkane melting and oxidative stability of wool

    International Nuclear Information System (INIS)

    Alan Riga, D.

    1998-01-01

    Interdisciplinary methods and thermal analytical techniques in particular are effective tools in aiding the identification and characterization of materials in question involved in civil or criminal law. Forensic material science uses systematic knowledge of the physical or material world gained through analysis, observation and experimentation. Thermal analytical data can be used to aid the legal system in interpreting technical variations in quite often a complex system.Calorimetry and thermal microscopic methods helped define a commercial product composed of alkanes that was involved in a major law suit. The solid-state structures of a number of normal alkanes have unique crystal structures. These alkanes melt and freeze below room temperature to more than 60C below zero. Mixtures of specific alkanes have attributes of pure chemicals. The X-ray diffraction structure of a mixture of alkanes is the same as a pure alkane, but the melting and freezing temperature are significantly lower than predicted. The jury ruled that the product containing n-alkanes had the appropriate melting characteristics. The thermal-physical properties made a commercial fluid truly unique and there was no advertising infringement according to the law and the jury trialA combination of thermogravimetry, differential thermal analysis, infrared spectroscopy and macrophotography were used to conduct an extensive modeling and analysis of physical evidence obtained in a mobile home fire and explosion. A person's death was allegedly linked to the misuse of a kerosene space heater. The thermal analytical techniques showed that external heating was the cause of the space heater's deformation, not a firing of the heater with gasoline and kerosene. (Copyright (c) 1998 Elsevier Science B.V., Amsterdam. All rights reserved.)

  8. Thermal analysis as an aid to forensics: Alkane melting and oxidative stability of wool

    Energy Technology Data Exchange (ETDEWEB)

    Alan Riga, D. [Professor of Chemistry, Cleveland State University and TechCon Inc., 6325 Aldenham Dr., Cleveland, OH 44143-3331 (United States)

    1998-12-21

    Interdisciplinary methods and thermal analytical techniques in particular are effective tools in aiding the identification and characterization of materials in question involved in civil or criminal law. Forensic material science uses systematic knowledge of the physical or material world gained through analysis, observation and experimentation. Thermal analytical data can be used to aid the legal system in interpreting technical variations in quite often a complex system.Calorimetry and thermal microscopic methods helped define a commercial product composed of alkanes that was involved in a major law suit. The solid-state structures of a number of normal alkanes have unique crystal structures. These alkanes melt and freeze below room temperature to more than 60C below zero. Mixtures of specific alkanes have attributes of pure chemicals. The X-ray diffraction structure of a mixture of alkanes is the same as a pure alkane, but the melting and freezing temperature are significantly lower than predicted. The jury ruled that the product containing n-alkanes had the appropriate melting characteristics. The thermal-physical properties made a commercial fluid truly unique and there was no advertising infringement according to the law and the jury trialA combination of thermogravimetry, differential thermal analysis, infrared spectroscopy and macrophotography were used to conduct an extensive modeling and analysis of physical evidence obtained in a mobile home fire and explosion. A person's death was allegedly linked to the misuse of a kerosene space heater. The thermal analytical techniques showed that external heating was the cause of the space heater's deformation, not a firing of the heater with gasoline and kerosene. (Copyright (c) 1998 Elsevier Science B.V., Amsterdam. All rights reserved.)

  9. NET-2 Network Analysis Program

    International Nuclear Information System (INIS)

    Malmberg, A.F.

    1974-01-01

    The NET-2 Network Analysis Program is a general purpose digital computer program which solves the nonlinear time domain response and the linearized small signal frequency domain response of an arbitrary network of interconnected components. NET-2 is capable of handling a variety of components and has been applied to problems in several engineering fields, including electronic circuit design and analysis, missile flight simulation, control systems, heat flow, fluid flow, mechanical systems, structural dynamics, digital logic, communications network design, solid state device physics, fluidic systems, and nuclear vulnerability due to blast, thermal, gamma radiation, neutron damage, and EMP effects. Network components may be selected from a repertoire of built-in models or they may be constructed by the user through appropriate combinations of mathematical, empirical, and topological functions. Higher-level components may be defined by subnetworks composed of any combination of user-defined components and built-in models. The program provides a modeling capability to represent and intermix system components on many levels, e.g., from hole and electron spatial charge distributions in solid state devices through discrete and integrated electronic components to functional system blocks. NET-2 is capable of simultaneous computation in both the time and frequency domain, and has statistical and optimization capability. Network topology may be controlled as a function of the network solution. (U.S.)

  10. Column: File Cabinet Forensics

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2011-12-01

    Full Text Available Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky, the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering.(see PDF for full column

  11. A review on nuclear forensic methodology for analysis of nuclear material of unknown origin

    International Nuclear Information System (INIS)

    Deshmukh, A.V.; Raghav, N.K.; Fatangare, N.M.; Jagtap, S.S.

    2014-01-01

    With the growing use of nuclear power and threat from illegal nuclear smuggling nuclear forensic provides an aid to the law enforcement to trace back modus operandi of such threats. Extensive nuclear proliferation, race among countries to acquire nuclear capability and global terrorism scenario has mandated Nuclear Forensic Science technology to tackle nuclear threats. Gamma spectrometry, alpha spectrometry, thermal ionization mass spectrometry, inductively coupled plasma mass spectrometry are employed for characterization and relative isotopic composition determinant of Nuclear material and techniques like SEM transmission electron TEM, FT-IR, GC-MS, Electrophoretic technique are used to characterize the contaminated materials in order to deceive investigative agencies. The present paper provide systematic forensic methodology for nuclear and radioactive materials encountered at any crime scene due to any accidental discharges or military activities. (author)

  12. Analysis of Forensic Autopsy in 120 Cases of Medical Disputes Among Different Levels of Institutional Settings.

    Science.gov (United States)

    Yu, Lin-Sheng; Ye, Guang-Hua; Fan, Yan-Yan; Li, Xing-Biao; Feng, Xiang-Ping; Han, Jun-Ge; Lin, Ke-Zhi; Deng, Miao-Wu; Li, Feng

    2015-09-01

    Despite advances in medical science, the causes of death can sometimes only be determined by pathologists after a complete autopsy. Few studies have investigated the importance of forensic autopsy in medically disputed cases among different levels of institutional settings. Our study aimed to analyze forensic autopsy in 120 cases of medical disputes among five levels of institutional settings between 2001 and 2012 in Wenzhou, China. The results showed an overall concordance rate of 55%. Of the 39% of clinically missed diagnosis, cardiovascular pathology comprises 55.32%, while respiratory pathology accounts for the remaining 44. 68%. Factors that increase the likelihood of missed diagnoses were private clinics, community settings, and county hospitals. These results support that autopsy remains an important tool in establishing causes of death in medically disputed case, which may directly determine or exclude the fault of medical care and therefore in helping in resolving these cases. © 2015 American Academy of Forensic Sciences.

  13. Postmortem bone marrow analysis in forensic science: study of 73 cases and review of the literature.

    Science.gov (United States)

    Tattoli, Lucia; Tsokos, Michael; Sautter, Julia; Anagnostopoulos, Joannis; Maselli, Eloisa; Ingravallo, Giuseppe; Delia, Mario; Solarino, Biagio

    2014-01-01

    In forensic sciences, bone marrow (BM) is an alternative matrix in postmortem toxicology because of its good resistance to autolysis and contaminations. Nevertheless, few studies have been focused on postmortem BM morphological changes after pathological stimuli. We examined 73 BM samples from forensic autopsies; causes of death were both natural and traumatic. BM samples were collected from the sternum by needle aspiration and biopsy; in selected cases, immunohistochemistry was performed. Few autolytic changes were found; BM cellularity decreased with increasing age and postmortem interval. Notable cell changes were detected in 45 cases (61.64%): neoplastic (n=4), and non-neoplastic BM findings (n=41), including multiorgan failure/sepsis (n=26), myelodisplastic-like conditions (n=11), and anaphylactic reactions (n=4). The results showed that BM cellularity supported circumstantial and autopsy findings, suggesting that BM samples could be a useful tool in forensic science applications. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.

    Science.gov (United States)

    Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin

    2010-07-01

    In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.

  15. Network Analysis Tools: from biological networks to clusters and pathways.

    Science.gov (United States)

    Brohée, Sylvain; Faust, Karoline; Lima-Mendez, Gipsi; Vanderstocken, Gilles; van Helden, Jacques

    2008-01-01

    Network Analysis Tools (NeAT) is a suite of computer tools that integrate various algorithms for the analysis of biological networks: comparison between graphs, between clusters, or between graphs and clusters; network randomization; analysis of degree distribution; network-based clustering and path finding. The tools are interconnected to enable a stepwise analysis of the network through a complete analytical workflow. In this protocol, we present a typical case of utilization, where the tasks above are combined to decipher a protein-protein interaction network retrieved from the STRING database. The results returned by NeAT are typically subnetworks, networks enriched with additional information (i.e., clusters or paths) or tables displaying statistics. Typical networks comprising several thousands of nodes and arcs can be analyzed within a few minutes. The complete protocol can be read and executed in approximately 1 h.

  16. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  17. [Development of forensic thanatology through the prism of analysis of postmortem protocols collected at the Department of Forensic Medicine, Jagiellonian University].

    Science.gov (United States)

    Konopka, Tomasz

    2011-01-01

    When assessed based on the analysis of postmortem protocols, the successes of forensic thanatology appear to differ from those that might be assumed using as the foundation a review of publications and textbooks. The greatest achievements date back to as early as the 18th and 19th centuries, when the morphological changes observed in the majority of types of deaths resulting from disease-associated and traumatic causes were described. Within the past 130 years, however, or in other words, in the period when autopsy protocols were written that are today collected in the archives of the Krakow Department of Forensic Medicine, the causes and mechanisms of death became understood even when the said factors were associated with discrete postmortem changes only or no no such changes whatsoever were left. At the end of the 19th century and for a long time afterwards, a difficult problem was posed by sudden deaths, where the postmortem examinations demonstrated solely atherosclerosis and the cause of death was described as "heart palsy". As it turned out, a great portion of such deaths represented individuals with myocardial infarction; in spite of its evident macroscopic presentation, the diagnostic management of the disease was progressing very slowly. Myocardial infarction, known at least since 1912, was associated by forensic medicine with the phenomenon of sudden death only in the forties, and the ability to detect myocardial infarction in practice developed only in the fifties of the last century. The achievement of the present dissertation is the formulation of a theory ascribing such a long delay in macroscopic diagnostics of myocardial infarction to forensic medicine specialists being attached to and fond of employing the "in situ" autopsy technique, which was unfavorable from the viewpoint of heart examination, since the organ was not dissected free and removed from the body in the course of a postmortem examination. When autopsies started to concentrate on

  18. Statistical analysis of network data with R

    CERN Document Server

    Kolaczyk, Eric D

    2014-01-01

    Networks have permeated everyday life through everyday realities like the Internet, social networks, and viral marketing. As such, network analysis is an important growth area in the quantitative sciences, with roots in social network analysis going back to the 1930s and graph theory going back centuries. Measurement and analysis are integral components of network research. As a result, statistical methods play a critical role in network analysis. This book is the first of its kind in network research. It can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. This text builds on Eric D. Kolaczyk’s book Statistical Analysis of Network Data (Springer, 2009).

  19. Efficacy of nuclear forensics

    International Nuclear Information System (INIS)

    Kazi, Reshmi

    2011-01-01

    In a strange turn of history, the threat of global nuclear war has gone down, but the risk of a nuclear attack has gone up. The danger of nuclear terrorism and ways to thwart it, tackle it and manage it in the event of an attack is increasingly gaining the attention of nuclear analysts all over the world. There is rising awareness among nuclear experts to develop mechanisms to prevent, deter and deal with the threat of nuclear terrorism. Nuclear specialists are seeking to develop and improve the science of nuclear forensics so as to provide faster analysis during a crisis. Nuclear forensics can play an important role in detecting illicit nuclear materials to counter trafficking in nuclear and radiological materials. An effective nuclear forensic and attribution strategy can enable policy makers, decision makers and technical managers to respond to situations involving interception of special nuclear materials

  20. Optimized mtDNA Control Region Primer Extension Capture Analysis for Forensically Relevant Samples and Highly Compromised mtDNA of Different Age and Origin

    Directory of Open Access Journals (Sweden)

    Mayra Eduardoff

    2017-09-01

    Full Text Available The analysis of mitochondrial DNA (mtDNA has proven useful in forensic genetics and ancient DNA (aDNA studies, where specimens are often highly compromised and DNA quality and quantity are low. In forensic genetics, the mtDNA control region (CR is commonly sequenced using established Sanger-type Sequencing (STS protocols involving fragment sizes down to approximately 150 base pairs (bp. Recent developments include Massively Parallel Sequencing (MPS of (multiplex PCR-generated libraries using the same amplicon sizes. Molecular genetic studies on archaeological remains that harbor more degraded aDNA have pioneered alternative approaches to target mtDNA, such as capture hybridization and primer extension capture (PEC methods followed by MPS. These assays target smaller mtDNA fragment sizes (down to 50 bp or less, and have proven to be substantially more successful in obtaining useful mtDNA sequences from these samples compared to electrophoretic methods. Here, we present the modification and optimization of a PEC method, earlier developed for sequencing the Neanderthal mitochondrial genome, with forensic applications in mind. Our approach was designed for a more sensitive enrichment of the mtDNA CR in a single tube assay and short laboratory turnaround times, thus complying with forensic practices. We characterized the method using sheared, high quantity mtDNA (six samples, and tested challenging forensic samples (n = 2 as well as compromised solid tissue samples (n = 15 up to 8 kyrs of age. The PEC MPS method produced reliable and plausible mtDNA haplotypes that were useful in the forensic context. It yielded plausible data in samples that did not provide results with STS and other MPS techniques. We addressed the issue of contamination by including four generations of negative controls, and discuss the results in the forensic context. We finally offer perspectives for future research to enable the validation and accreditation of the PEC MPS

  1. Radiochronology in nuclear forensics

    International Nuclear Information System (INIS)

    Alamelu, D.

    2016-01-01

    Nuclear forensics corresponds to the forensic analysis of nuclear materials. The samples analysed may either be those that are confiscated during any act of smuggling or that is retrieved from a postexplosion debris. The characterisation of the material is based on the isotopic composition, physical and chemical compositions, age and history of the material which are determined by suitable analytical techniques. The interpretation of the analytical results is necessary to understand the details of the material such as its provenance, the industrial history of the material as well as the implications of the probable use of the material

  2. Is parricide a stable phenomenon? An analysis of parricide offenders in a forensic hospital

    Directory of Open Access Journals (Sweden)

    Lisieux Elaine de Borba-Telles

    2017-01-01

    Conclusions: Regarding weapon usage and the characteristics of victims and offenders, the observed pattern is consistent with previous researches, which allows concluding that the phenomenon of parricide is relatively stable and homogeneous. A forensic psychiatric evaluation of parricide offenders should be warranted given the high prevalence of mental illness among them.

  3. Nuclear forensic analysis capabilities and experience at the Oak Ridge Y-12 National Security Complex

    International Nuclear Information System (INIS)

    Hembree, D.M.; Carter, J.A.; Hinton, E.R. Jr.

    2002-01-01

    Full text: The Oak Ridge Y-12 National Security Complex has been involved in the U.S. nuclear weapons program since the program's inception in the 1940's. Known as the U.S. 'Fort Knox of uranium', the site is also a repository of unique expertise and experience related to enriched uranium and other weapons-related materials. Y-12's Analytical Chemistry Organization (ACO) contains a wide range of analytical instrumentation that has demonstrated the ability to provide important forensic information in a short period of time. This rapid response capability is in part due to having all of the analytical instrumentation and expertise contained in one building, within one organization. Rapid-response teams are easily formed to quickly obtain key information. The infrastructure to handle nuclear materials, e.g. chain-of-custody, radiological control, information management, etc. is maintained for normal operations. As a result, the laboratory has demonstrated the capability for rapid response times for nuclear forensic samples. This poster presentation will discuss Y-12's analytical capabilities and the importance of key instruments and highly trained personnel in providing critical information. The laboratory has collaborated with both state and federal law enforcement agencies to analyze non-nuclear forensic evidence. Y-12's participation in two nuclear forensic events, as part of multi-laboratory teams, will be described. (author)

  4. [Forensic Analysis of 6 Cases of Sudden Death due to Hyperthyroid Heart Disease].

    Science.gov (United States)

    Zhang, M Z; Li, B X; Zhao, R; Guan, D W; Zhang, G H; Wu, X; Zhu, B L; Li, R B

    2017-10-01

    To analyse the cases of sudden death due to hyperthyroid heart disease, and explore the general information of deaths and the forensic pathological characteristics to provide reference evidence for forensic identification of such cases. Six cases of sudden death due to hyperthyroid heart disease between 2001 and 2016 were selected from School of Forensic Medicine, China Medical University. The general information (gender and age), clinical manifestations, medical history, anatomical and histopathological findings, biochemical parameters and cause of death were analysed retrospectively. Most of the 6 patients had definite history of hyperthyroidism, and they all showed certain degrees of symptoms of cardiovascular disease; had obvious incentive factors of death; histopathological examination of thyroid conformed to the performances of diffuse toxic goiter; with increase of cardiac weight, dilatation of cardiac chambers, myocardial hypertrophy and focal necrosis; postmortem biochemical analyses of pericardial fluid could be used as an additional method for diagnostic of sudden death due to hyperthyroid heart disease. The identification of death due to hyperthyroid heart disease should be based on the clinical history and the results of autopsy, histopathological examination, postmortem toxicology tests. The postmortem biochemical detection of thyroid and cardiac function should be performed if necessary. Copyright© by the Editorial Department of Journal of Forensic Medicine

  5. Analysis of suspected wildlife crimes submitted for forensic examinations in Scotland.

    Science.gov (United States)

    Millins, Caroline; Howie, Fiona; Everitt, Charles; Shand, Michael; Lamm, Catherine

    2014-09-01

    This study describes the occurrence of suspected wildlife crimes submitted for forensic examination in Scotland in 2010. The study aims were to determine which types of crimes were committed, which species were targeted, and the outcome of investigations, in order to assess the contribution of forensic examinations in the prosecution of wildlife crimes. Information on suspected wildlife crimes submitted between January 1 and December 31, 2010 to the SAC Consulting: Veterinary Services Disease Surveillance Centers, Science and Advice for Scottish Agriculture, and to the University of Glasgow, was used. The location of suspected crimes, the species targeted, cause of death, and types of the 188 submitted wildlife crimes were summarized. More information regarding cases involving birds were submitted than cases involving mammals, and included 114 raptors, 14 waterfowl, and 22 "other bird species." Mammal cases (n = 38) included 12 badgers, 8 foxes, 7 deer, 4 hares, and 7 "other mammals." The cause of death was determined in 124 suspected crimes; malicious or accidental trauma was the most likely cause of death in 72, and 33 were poisoned. Forensic evidence supporting criminal activity was found in 53 cases, and poisoning was the most frequent crime recorded. At least five individuals were successfully prosecuted, representing 2.7 % of submissions. It was challenging to track cases from submission through to prosecution and laboratories conducting forensic investigations were often not informed of the outcome of prosecutions or court decisions.

  6. Pilot-Reported Beta-Blockers Identified by Forensic Toxicology Analysis of Postmortem Specimens.

    Science.gov (United States)

    Canfield, Dennis V; Dubowski, Kurt M; Whinnery, James M; Forster, Estrella M

    2018-01-01

    This study compared beta-blockers reported by pilots with the medications found by postmortem toxicology analysis of specimens received from fatal aviation accidents between 1999 and 2015. Several studies have compared drugs using the standard approach: Compare the drug found by toxicology analysis with the drug reported by the pilot. This study uniquely examined first the pilot-reported medication and then compared it to that detected by toxicology analysis. This study will serve two purposes: (i) to determine the capability of a toxicology laboratory to detect reported medications, and (ii) to identify pilots with medications below detectable limits. All information required for this study was extracted from the Toxicology Data Base system and was searched using ToxFlo or SQL Server Management Studio. The following information was collected and analyzed: pilot-reported trade and/or generic drug, date specimens received, time of accident, type of aviation operations (CFR), state, pilot level, age, class of medical, specimen type, specimen concentration, dose reported, frequency reported associated with the accident, quantity reported, National Transportation Safety Board (NTSB) accident event number, and all NTSB reports. There were 319 pilots that either reported taking a beta-blocker or were found to be taking a beta-blocker by postmortem toxicology analysis. Time of death, therapeutic concentration and specimen type were found to be factors in the ability of the laboratory to detect beta-blockers. Beta-blockers taken by pilots will, in most cases, be found by a competent postmortem forensic toxicology laboratory at therapeutic concentrations. The dose taken by the pilot was not found to be a factor in the ability of the laboratory to identify beta-blockers. Time of dose, route of administration, specimen tested and therapeutic concentration of the drug were found to be factors in the ability of the laboratory to identify beta-blockers in postmortem specimens

  7. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  8. Acceptability criteria for linear dependence in validating UV-spectrophotometric methods of quantitative determination in forensic and toxicological analysis

    Directory of Open Access Journals (Sweden)

    L. Yu. Klimenko

    2014-08-01

    Full Text Available Introduction. This article is the result of authors’ research in the field of development of the approaches to validation of quantitative determination methods for purposes of forensic and toxicological analysis and devoted to the problem of acceptability criteria formation for validation parameter «linearity/calibration model». The aim of research. The purpose of this paper is to analyse the present approaches to acceptability estimation of the calibration model chosen for method description according to the requirements of the international guidances, to form the own approaches to acceptability estimation of the linear dependence when carrying out the validation of UV-spectrophotometric methods of quantitative determination for forensic and toxicological analysis. Materials and methods. UV-spectrophotometric method of doxylamine quantitative determination in blood. Results. The approaches to acceptability estimation of calibration models when carrying out the validation of bioanalytical methods is stated in international papers, namely «Guidance for Industry: Bioanalytical method validation» (U.S. FDA, 2001, «Standard Practices for Method Validation in Forensic Toxicology» (SWGTOX, 2012, «Guidance for the Validation of Analytical Methodology and Calibration of Equipment used for Testing of Illicit Drugs in Seized Materials and Biological Specimens» (UNODC, 2009 and «Guideline on validation of bioanalytical methods» (ЕМА, 2011 have been analysed. It has been suggested to be guided by domestic developments in the field of validation of analysis methods for medicines and, particularly, by the approaches to validation methods in the variant of the calibration curve method for forming the acceptability criteria of the obtained linear dependences when carrying out the validation of UV-spectrophotometric methods of quantitative determination for forensic and toxicological analysis. The choice of the method of calibration curve is

  9. [Advances of forensic entomology in China].

    Science.gov (United States)

    Lan, Ling-mei; Liao, Zhi-gang; Chen, Yao-qing; Yao, Yue; Li, Jian-bo; Li, Mao-yang; Cai, Ji-feng

    2006-12-01

    Forensic entomology is a branch of forensic medicine, which applies studies of insects and arthropods to getting evidence for court and has an analogous advantage in the estimation of the postmortem interval (PMI) and other questions of forensic relevance. The paper expounds its definition and contents and reviews some progress of the studies in some aspects in China such as the constitution and succession of insect community on the different cadavers, the applications of morphological features of insects and the technology of analysis of deoxyribonucleic acid (DNA) in forensic entomology, and forensic entomological toxicology etc.

  10. Forensic Applications of LIBS

    Science.gov (United States)

    Hark, Richard R.; East, Lucille J.

    Forensic science is broadly defined as the application of science to matters of the law. Practitioners typically use multidisciplinary scientific techniques for the analysis of physical evidence in an attempt to establish or exclude an association between a suspect and the scene of a crime.

  11. Analysis of Semantic Networks using Complex Networks Concepts

    DEFF Research Database (Denmark)

    Ortiz-Arroyo, Daniel

    2013-01-01

    In this paper we perform a preliminary analysis of semantic networks to determine the most important terms that could be used to optimize a summarization task. In our experiments, we measure how the properties of a semantic network change, when the terms in the network are removed. Our preliminar...

  12. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  13. Forensic culture as epistemic culture: the sociology of forensic science.

    Science.gov (United States)

    Cole, Simon A

    2013-03-01

    This paper explores whether we can interpret the notion of 'forensic culture' as something akin to what Knorr-Cetina called an 'epistemic culture'. Can we speak of a 'forensic culture', and, if so, how is it similar to, or different from, other epistemic cultures that exist in what is conventionally called 'science'? This question has important policy implications given the National Academy Science's (NAS) recent identification of 'culture' as one of the problems at the root of what it identified as 'serious deficiencies' in U.S. forensic science and 'scientific culture' as an antidote to those problems. Finding the NAS's characterisation of 'scientific culture' overly general and naïve, this paper offers a preliminary exploration of what might be called a 'forensic culture'. Specifically, the paper explores the way in which few of the empirical findings accumulated by sociologists of science about research science seem to apply to forensic science. Instead, forensic science seems to have developed a distinct culture for which a sociological analysis will require new explanatory tools. Faithful sociological analysis of 'forensic culture' will be a necessary prerequisite for the kind of culture change prescribed by external reformist bodies like the NAS. Copyright © 2012. Published by Elsevier Ltd.

  14. [Forensic entomology].

    Science.gov (United States)

    Açikgöz, Halide Nihal

    2010-01-01

    Odour of the animal or human corpses immediately after death is very attractive for insects and other invertebrates. Blue and green bottle flies from the Calliphoridae family are the first colonizers of cadaver and immediately later necrophagous Diptera from the Sarcophagidae family settle on the same corpse. It is essential to determine the time past after death for elucidating the event in case of the homicide or suspicious death, and it is directly proportional to the post mortem interval expected time, which is based upon the speed of the larval growth. In this article, we purposed to stress the special interest of forensic entomology for the scientists who will apply this science in their forensic researches and case studies, and also to provide information to our judges, prosecutors and law enforcement agents in order to consider the entomological samples to be reliable and applicable evidences as biological stains and hairs. We are of the opinion that if any forensic entomologist is called to the crime scene or if the evidences are collected and then delivered to an entomologist, the forensic cases will be elucidated faster and more accurately.

  15. Geoethics and Forensic Geology

    Science.gov (United States)

    Donnelly, Laurance

    2017-04-01

    The International Union of Geological Sciences (IUGS), Initiative on Forensic Geology (IFG) was set up in 2011 to promote and develop the applications of geology to policing and law enforcement throughout the world. This includes the provision of crime scene examinations, searches to locate graves or items of interest that have been buried beneath the ground surface as part of a criminal act and geological trace analysis and evidence. Forensic geologists may assist the police and law enforcement in a range of ways including for example; homicide, sexual assaults, counter terrorism, kidnapping, humanitarian incidents, environmental crimes, precious minerals theft, fakes and fraudulent crimes. The objective of this paper is to consider the geoethical aspects of forensic geology. This includes both delivery to research and teaching, and contribution to the practical applications of forensic geology in case work. The case examples cited are based on the personal experiences of the authors. Often, the technical and scientific aspect of forensic geology investigation may be the most straightforward, after all, this is what the forensic geologist has been trained to do. The associated geoethical issues can be the most challenging and complex to manage. Generally, forensic geologists are driven to carry-out their research or case work with integrity, honesty and in a manner that is law abiding, professional, socially acceptable and highly responsible. This is necessary in advising law enforcement organisations, society and the scientific community that they represent. As the science of forensic geology begins to advance around the world it is desirable to establish a standard set of principles, values and to provide an agreed ethical a framework. But what are these core values? Who is responsible for producing these? How may these become enforced? What happens when geoethical standards are breached? This paper does not attempt to provide all of the answers, as further work

  16. Complex Network Analysis of Guangzhou Metro

    OpenAIRE

    Yasir Tariq Mohmand; Fahad Mehmood; Fahd Amjad; Nedim Makarevic

    2015-01-01

    The structure and properties of public transportation networks can provide suggestions for urban planning and public policies. This study contributes a complex network analysis of the Guangzhou metro. The metro network has 236 kilometers of track and is the 6th busiest metro system of the world. In this paper topological properties of the network are explored. We observed that the network displays small world properties and is assortative in nature. The network possesses a high average degree...

  17. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  18. The state of nuclear forensics

    International Nuclear Information System (INIS)

    Kristo, Michael J.; Tumey, Scott J.

    2013-01-01

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  19. The state of nuclear forensics

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, Michael J. [Chemical Sciences Division, Lawrence Livermore National Laboratory, P.O. Box 808, L-186, Livermore, CA 94551 (United States); Tumey, Scott J., E-mail: tumey2@llnl.gov [Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory, P.O. Box 808, L-397, Livermore, CA 94551 (United States)

    2013-01-15

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  20. A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis

    OpenAIRE

    Doyoddorj, Munkhbaatar; Rhee, Kyung-Hyune

    2011-01-01

    Part 2: Workshop; International audience; Nowadays, digital images and videos have become increasingly popular over the Internet and bring great social impact to a wide audience. In the meanwhile, technology advancement allows people to easily alter the content of digital multimedia and brings serious concern on the trustworthiness of online multimedia information. In this paper, we propose a new framework for multimedia forensics by using compact side information based on reversible watermar...

  1. Near-real-time Forensic Disaster Analysis: experiences from hurricane Sandy

    Science.gov (United States)

    Kunz, Michael; Mühr, Bernhard; Schröter, Kai; Kunz-Plapp, Tina; Daniell, James; Khazai, Bijan; Wenzel, Friedemann; Vannieuwenhuyse, Marjorie; Comes, Tina; Münzberg, Thomas; Elmer, Florian; Fohringer, Joachim; Lucas, Christian; Trieselmann, Werner; Zschau, Jochen

    2013-04-01

    Hurricane Sandy was the last tropical cyclone of the 2012 Northern Atlantic Hurricane season that made landfall. It moved on an unusual track from the Caribbean to the East Coast of the United States from 24 to 30 October as a Category 1 and 2 Hurricane according to the Saffir-Simpson Scale. Along its path, the severe storm event caused widespread damage including almost 200 fatalities. In the early hours of 30 October, Sandy made landfall near Atlantic City, N.J. Sandy was an extraordinary event due to its multihazard nature and several cascading effects in the aftermath. From the hydro-meteorological perspective, most unusual was the very large spatial extent of up to 1,700 km. High wind speeds were associated with record breaking storm surges at the U.S. Mid- Atlantic and New England Coast during high (astronomical) tide, leading to widespread flooding. Though Sandy was not the most severe storm event in terms of wind speed and precipitation, the impact in the U.S. was enormous with total damage estimates of up to 90 billion US (own estimate from Dec. 2012). Although much better data emerge weeks after such an event, the Forensic Disaster Analysis (FDA) Task Force of the Center for Disaster Management and Risk Reduction Technology (CEDIM) made an effort to obtain a comprehensive and holistic overview of the causes, hazardous effects and consequences associated with Sandy immediately after landfall at the U.S. coast on 30 October 2012. This was done in an interdisciplinary way by collecting and compiling scattered and distributed information from available databases and sources via the Internet, by applying own methodologies and models for near-real time analyses developed in recent years, and by expert knowledge. This contribution gives an overview about the CEDIM-FDA analyses' results. It describes the situation that led to the extraordinary event, highlights the interaction of the tropical cyclone with other hydro-meteorological events, and examines the

  2. Effect of electron beam irradiation on forensic evidence. 2. Analysis of writing inks on porous surfaces.

    Science.gov (United States)

    Ramotowski, Robert S; Regen, Erin M

    2007-05-01

    The effect of electron beam irradiation on a series of different writing inks is described. As the anthrax-tainted letters were discovered in October 2001, the U.S. government began to experiment with the use of the electron beam irradiation process for destroying such biological agents. Plans initially considered a large-scale countrywide use of this technology. However, over time the scope of this plan as well as the radiation dosage were reduced, especially when some adverse consequences to mailed items subjected to this process were observed. Little data existed at the time to characterize what level of damage might be expected to occur with common items sent through the mail. This was especially important to museums and other institutions that routinely ship valuable and historic items through the mail. Although the Smithsonian Institution initiated some studies of the effect of electron beam irradiation on archived materials, little data existed on the effect that this process would have on forensic evidence. Approximately 97 different black, blue, red, green, and yellow writing inks were selected. Writing ink types included ballpoint, gel, plastic/felt tip, and rollerball. All noncontrol samples were subjected to standard mail irradiation conditions used by the U.S. Postal Service at the time this experiment was performed. A video spectral comparator and thin-layer chromatography (TLC) analysis were used to evaluate both the control and the irradiated samples. Some published studies reported changes in the presence/absence of dye bands in the chromatograms of irradiated writing inks. Some of these studies report the formation of additional dye bands on the chromatogram while others report missing dye bands. However, using standard testing guidelines and procedures, none of the 97 irradiated inks tested were found to show any significant optical or chemical differences from the control samples. In addition, random testing of some of the ink samples using a

  3. Effects of printing and ninhydrin treatment on forensic analysis of paper.

    Science.gov (United States)

    Itamiya, Hiromi; Sugita, Ritsuko

    2015-10-01

    Paper is ubiquitous in human activities and can be found as evidence in the commission of many crimes such as threatening letters, deceptive advertisements and counterfeiting banknotes. To link the paper evidence to a source is a comparative process that is hampered when a blank paper is compared to a paper that has been submitted to printing or other treatments such as ninhydrin for the detection of fingermarks. During a forensic investigation, printed paper is analyzed with various instruments after fingerprint examination. In this study, the effects of printing and ninhydrin treatment on forensic paper examination of grammage, thickness, fillers, and pulp composition were studied. Grammage and thickness were increased by full-page double-sided printing, and grammage depended on the type of printer. The effects of printing on the analytical data about fillers and pulp composition were negligible, and ninhydrin treatment affected only paper thickness. These minor effects notwithstanding, the results indicate that conventional analytical methods used in forensic science for examining papers can be applied. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  4. Isolation and genetic analysis of pure cells from forensic biological mixtures: The precision of a digital approach.

    Science.gov (United States)

    Fontana, F; Rapone, C; Bregola, G; Aversa, R; de Meo, A; Signorini, G; Sergio, M; Ferrarini, A; Lanzellotto, R; Medoro, G; Giorgini, G; Manaresi, N; Berti, A

    2017-07-01

    Latest genotyping technologies allow to achieve a reliable genetic profile for the offender identification even from extremely minute biological evidence. The ultimate challenge occurs when genetic profiles need to be retrieved from a mixture, which is composed of biological material from two or more individuals. In this case, DNA profiling will often result in a complex genetic profile, which is then subject matter for statistical analysis. In principle, when more individuals contribute to a mixture with different biological fluids, their single genetic profiles can be obtained by separating the distinct cell types (e.g. epithelial cells, blood cells, sperm), prior to genotyping. Different approaches have been investigated for this purpose, such as fluorescent-activated cell sorting (FACS) or laser capture microdissection (LCM), but currently none of these methods can guarantee the complete separation of different type of cells present in a mixture. In other fields of application, such as oncology, DEPArray™ technology, an image-based, microfluidic digital sorter, has been widely proven to enable the separation of pure cells, with single-cell precision. This study investigates the applicability of DEPArray™ technology to forensic samples analysis, focusing on the resolution of the forensic mixture problem. For the first time, we report here the development of an application-specific DEPArray™ workflow enabling the detection and recovery of pure homogeneous cell pools from simulated blood/saliva and semen/saliva mixtures, providing full genetic match with genetic profiles of corresponding donors. In addition, we assess the performance of standard forensic methods for DNA quantitation and genotyping on low-count, DEPArray™-isolated cells, showing that pure, almost complete profiles can be obtained from as few as ten haploid cells. Finally, we explore the applicability in real casework samples, demonstrating that the described approach provides complete

  5. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these

  6. DNA Commission of the International Society for Forensic Genetics (ISFG): an update of the recommendations on the use of Y-STRs in forensic analysis

    DEFF Research Database (Denmark)

    Gusmão, L; Butler, John M; Carracedo, Angel

    2006-01-01

    The DNA Commission of the International Society of Forensic Genetics (ISFG) regularly publishes guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. A previous recommendation published in 2001 has already addressed Y-chromosome po......The DNA Commission of the International Society of Forensic Genetics (ISFG) regularly publishes guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. A previous recommendation published in 2001 has already addressed Y......-chromosome polymorphisms, with particular emphasis on short tandem repeats (STRs). Since then, the use of Y-STRs has become very popular, and a numerous new loci have been introduced. The current recommendations address important aspects to clarify problems regarding the nomenclature, the definition of loci and alleles...

  7. DNA Commission of the International Society for Forensic Genetics (ISFG): an update of the recommendations on the use of Y-STRs in forensic analysis

    DEFF Research Database (Denmark)

    Gusmão, L; Butler, J M; Carracedo, A

    2006-01-01

    The DNA Commission of the International Society of Forensic Genetics (ISFG) regularly publishes guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. A previous recommendation published in 2001 has already addressed Y-chromosome po......The DNA Commission of the International Society of Forensic Genetics (ISFG) regularly publishes guidelines and recommendations concerning the application of DNA polymorphisms to the problems of human identification. A previous recommendation published in 2001 has already addressed Y......-chromosome polymorphisms, with particular emphasis on short tandem repeats (STRs). Since then, the use of Y-STRs has become very popular, and numerous new loci have been introduced. The current recommendations address important aspects to clarify problems regarding the nomenclature, the definition of loci and alleles...

  8. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  9. Digital Forensics to Intelligent Forensics

    Directory of Open Access Journals (Sweden)

    Alastair Irons

    2014-09-01

    Full Text Available In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.

  10. Integrated Fourier transform infrared spectroscopy and gas chromatography tandem mass spectrometry for forensic engine lubricating oil and biodiesel analysis

    International Nuclear Information System (INIS)

    Shang, D.

    2009-01-01

    Gas chromatography/mass spectrometry(GC/MS) is commonly used for oil fingerprinting and provides investigators with good forensic data. However, new challenges face oil spill forensic chemistry with the growing use of biodiesel as well as the recycling and reprocessing of used oil, particularly lubricating oils. This paper demonstrated that Fourier transform infrared (FTIR) spectroscopy may be a fast, cost effective and complementary method for forensic analysis of biodiesels (fatty acid methyl esters) and lubricating oils. Attenuated total reflectance (ATR)-FTIR spectroscopy was shown to be an interesting analytic method because of its use in monitoring and quantifying minor chemical compounds in sample matrices and its ability to identify a broad range or organic compounds. Unlike chromatography, FTIR spectroscopy with ATR can provide results without compound separation or lengthy sample preparation steps. This study described the combined use of GC and ATR-FTIR in environmental oil spill identification through the matching of source lube oil samples with artificially weathered samples. Samples recovered from a biodiesel spill incident were also investigated. ATR-FTIR provided detailed spectral information for rapid lube oil differentiation. This study was part of a continuing effort to develop a methodology to deal with chemical spills of unknown origin, which is an important aspect in environmental protection and emergency preparedness. This method was only successfully applied to the short term artificially weathered and fresh lube oil characterization, and to limited cases of biodiesel spills. It was concluded that further validation tests are needed to determine if this method can be applied to real-world weather lube oil samples. 10 refs., 11 figs.

  11. Forensic analysis of explosives using isotope ratio mass spectrometry (IRMS)--preliminary study on TATP and PETN.

    Science.gov (United States)

    Benson, Sarah J; Lennard, Christopher J; Maynard, Philip; Hill, David M; Andrew, Anita S; Roux, Claude

    2009-06-01

    The application of isotopic techniques to investigations requiring the provision of evidence to a Court is limited. The objective of this research was to investigate the application of light stable isotopes and isotope ratio mass spectrometry (IRMS) to solve complex forensic cases by providing a level of discrimination not achievable utilising traditional forensic techniques. Due to the current threat of organic peroxide explosives, such as triacetone triperoxide (TATP), research was undertaken to determine the potential of IRMS to differentiate samples of TATP that had been manufactured utilising different starting materials and/or manufacturing processes. In addition, due to the prevalence of pentaerythritoltetranitrate (PETN) in detonators, detonating cord, and boosters, the potential of the IRMS technique to differentiate PETN samples from different sources was also investigated. Carbon isotope values were measured in fourteen TATP samples, with three definite groups appearing in the initial sample set based on the carbon data alone. Four additional TATP samples (in a second set of samples) were distinguishable utilising the carbon and hydrogen isotopic compositions individually, and also in combination with the oxygen isotope values. The 3D plot of the carbon, oxygen and hydrogen data demonstrated the clear discrimination of the four samples of TATP. The carbon and nitrogen isotope values measured from fifteen PETN samples, allowed samples from different sources to be readily discriminated. This paper demonstrates the successful application of IRMS to the analysis of explosives of forensic interest to assist in discriminating samples from different sources. This research represents a preliminary evaluation of the IRMS technique for the measurement of stable isotope values in TATP and PETN samples, and supports the dedication of resources for a full evaluation of this application in order to achieve Court reportable IRMS results.

  12. Forensic toxicology analysis of self-poisoning suicidal deaths in Tehran, Iran; trends between 2011-2015.

    Science.gov (United States)

    Kordrostami, Roya; Akhgari, Maryam; Ameri, Maryam; Ghadipasha, Masoud; Aghakhani, Kamran

    2017-06-13

    Suicide ranks among the top ten causes of death in all age groups all over the world. There are many methods for committing suicide including self-poisoning, firearm and hanging. The aim of the present study was to provide an overview of self-poisoning related suicidal deaths with special focus on forensic toxicology analysis results in Tehran, Iran from 2011 to 2015. All suspicious cases with the the history of self-poisoning were investigated to define the cause and manner of death under the supervision of forensic medicine practitioners. Postmortem samples were analysed in forensic toxicology laboratory to confirm the presence of drugs in cadaver of suicidal cases. Drugs and poisons were analysed using thin layer chromatography, high performance liquid chromatography, gas chromatography/mass spectrometry, headspace gas chromatography and gas chromatography equipped with nitrogen phosphorus detector. Demographic data were collected from autopsy reports of all cases with confirmed self-poisoning suicidal cause of death. Results showed that 674 cases of self-poisoning deaths were investigated during a five-year study period, of which 68.55% were male. The most often used suicide method was self-poisoning in young population. Phosphine gas liberated from aluminum phosphide tablets was the most toxic substance detected in postmortem samples (619 cases) followed by opioids, methamphetamine, organophosphates, cyanide and strychnine. In conclusion self-poisoning suicidal death was predominant in young male population in Tehran, Iran. It seems that free access to suicide means such as drugs and poisons should be restricted by national and health authorities. Not applicable.

  13. Virtual tool mark generation for efficient striation analysis in forensic science

    Energy Technology Data Exchange (ETDEWEB)

    Ekstrand, Laura [Iowa State Univ., Ames, IA (United States)

    2012-01-01

    In 2009, a National Academy of Sciences report called for investigation into the scienti c basis behind tool mark comparisons (National Academy of Sciences, 2009). Answering this call, Chumbley et al. (2010) attempted to prove or disprove the hypothesis that tool marks are unique to a single tool. They developed a statistical algorithm that could, in most cases, discern matching and non-matching tool marks made at di erent angles by sequentially numbered screwdriver tips. Moreover, in the cases where the algorithm misinterpreted a pair of marks, an experienced forensics examiner could discern the correct outcome. While this research served to con rm the basic assumptions behind tool mark analysis, it also suggested that statistical analysis software could help to reduce the examiner's workload. This led to a new tool mark analysis approach, introduced in this thesis, that relies on 3D scans of screwdriver tip and marked plate surfaces at the micrometer scale from an optical microscope. These scans are carefully cleaned to remove noise from the data acquisition process and assigned a coordinate system that mathematically de nes angles and twists in a natural way. The marking process is then simulated by using a 3D graphics software package to impart rotations to the tip and take the projection of the tip's geometry in the direction of tool travel. The edge of this projection, retrieved from the 3D graphics software, becomes a virtual tool mark. Using this method, virtual marks are made at increments of 5 and compared to a scan of the evidence mark. The previously developed statistical package from Chumbley et al. (2010) performs the comparison, comparing the similarity of the geometry of both marks to the similarity that would occur due to random chance. The resulting statistical measure of the likelihood of the match informs the examiner of the angle of the best matching virtual mark, allowing the examiner to focus his/her mark analysis on a smaller range of angles

  14. [Research Progress on Forensic Entomotoxicology].

    Science.gov (United States)

    Liu, Zhi-jiang; Zhai, Xian-dun; Guan, Ling; Mo, Yao-nan

    2015-06-01

    Forensic entomotoxicology is a branch of forensic medicine, which applies entomology, toxicology and other related studies to solve the poisoning cases. It has an obvious advantage in the investigation on poisoning death. Based on the expounding definition and research of entomotoxicology, this paper reviews research progress and application value in some aspects of forensic medicine, such as the effects of drugs/toxins on the growth and development of sarcosaphagous insects and the qualitative and quantitative analysis of the drugs/toxins in the poisoned body tissue.

  15. Analysis Code - Data Analysis in 'Leveraging Multiple Statistical Methods for Inverse Prediction in Nuclear Forensics Applications' (LMSMIPNFA) v. 1.0

    Energy Technology Data Exchange (ETDEWEB)

    2018-03-19

    R code that performs the analysis of a data set presented in the paper ‘Leveraging Multiple Statistical Methods for Inverse Prediction in Nuclear Forensics Applications’ by Lewis, J., Zhang, A., Anderson-Cook, C. It provides functions for doing inverse predictions in this setting using several different statistical methods. The data set is a publicly available data set from a historical Plutonium production experiment.

  16. Forensic identification of trunk mat by trace element analysis of single fiber with laser ablation ICP-MS

    International Nuclear Information System (INIS)

    Hiroma, Yuki; Nakai, Izumi; Hokura, Akiko

    2010-01-01

    The application of LA-ICP-MS (laser ablation inductively coupled plasma mass spectrometry) to the chemical characterization of single trunk mat fibers made of PET was investigated in order to establish a forensic analytical method for the discrimination of samples of different origins. The analytical conditions of LA-ICP-MS equipped with a 213 nm Nd : YAG laser were optimized to analyze trace elements, such as Cu, Sb, and Ba at ppm levels. A total of 31 samples produced by 7 car manufactures in Japan were used for analysis. The concentrations of Li, Mg, Al, P, Ca, Ti, Co, Cu, Ge, Nb, Sb, Ta, and Pb were successfully measured from a single fiber sample with a diameter of ca. 20 μm. It was possible to discriminate all 31 samples based on the analytical results of a single fiber by LA-ICP-MS combined with those of FT-IR and SEM-EDS. LA-ICP-MS has good analytical sensitivity, and requires a much shorter preparation time and a smaller sample size than any other conventional element analysis methods. This paper demonstrates for the first time that this method is practically useful as a powerful tool for the forensic identification of a single trunk mat fiber. (author)

  17. Wavelength dependence on the forensic analysis of glass by nanosecond 266 nm and 1064 nm laser induced breakdown spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Cahoon, Erica M.; Almirall, Jose R.

    2010-05-01

    Laser induced breakdown spectroscopy can be used for the chemical characterization of glass to provide evidence of an association between a fragment found at a crime scene to a source of glass of known origin. Two different laser irradiances, 266 nm and 1064 nm, were used to conduct qualitative and quantitative analysis of glass standards. Single-pulse and double-pulse configurations and lens-to-sample-distance settings were optimized to yield the best laser-glass coupling. Laser energy and acquisition timing delays were also optimized to result in the highest signal-to-noise ratio corresponding to the highest precision and accuracy. The crater morphology was examined and the mass removed was calculated for both the 266 nm and 1064 nm irradiations. The analytical figures of merit suggest that the 266 nm and 1064 nm wavelengths are capable of good performance for the forensic chemical characterization of glass. The results presented here suggest that the 266 nm laser produces a better laser-glass matrix coupling, resulting in a better stoichiometric representation of the glass sample. The 266 nm irradiance is therefore recommended for the forensic analysis and comparison of glass samples.

  18. Nuclear forensic analysis of an unknown uranium ore concentrate sample seized in a criminal investigation in Australia

    International Nuclear Information System (INIS)

    Keegan, Elizabeth; Kristo, Michael J.; Colella, Michael; Robel, Martin; Williams, Ross; Lindvall, Rachel; Eppich, Gary; Roberts, Sarah; Borg, Lars; Gaffney, Amy; Plaue, Jonathan; Wong, Henri; Davis, Joel; Loi, Elaine; Reinhard, Mark; Hutcheon, Ian

    2014-01-01

    In early 2009, a state policing agency raided a clandestine drug laboratory in a suburb of a major city in Australia. While searching the laboratory, they discovered a small glass jar labelled 'Gamma Source' and containing a green powder. The powder was radioactive. This paper documents the detailed nuclear forensic analysis undertaken to characterize and identify the material and determine its provenance. Isotopic and impurity content, phase composition, microstructure and other characteristics were measured on the seized sample, and the results were compared with similar material obtained from the suspected source (ore and ore concentrate material). While an extensive range of parameters were measured, the key 'nuclear forensic signatures' used to identify the material were the U isotopic composition, Pb and Sr isotope ratios, and the rare earth element pattern. These measurements, in combination with statistical analysis of the elemental and isotopic content of the material against a database of uranium ore concentrates sourced from mines located worldwide, led to the conclusion that the seized material (a uranium ore concentrate of natural isotopic abundance) most likely originated from Mary Kathleen, a former Australian uranium mine

  19. Wavelength dependence on the forensic analysis of glass by nanosecond 266 nm and 1064 nm laser induced breakdown spectroscopy

    International Nuclear Information System (INIS)

    Cahoon, Erica M.; Almirall, Jose R.

    2010-01-01

    Laser induced breakdown spectroscopy can be used for the chemical characterization of glass to provide evidence of an association between a fragment found at a crime scene to a source of glass of known origin. Two different laser irradiances, 266 nm and 1064 nm, were used to conduct qualitative and quantitative analysis of glass standards. Single-pulse and double-pulse configurations and lens-to-sample-distance settings were optimized to yield the best laser-glass coupling. Laser energy and acquisition timing delays were also optimized to result in the highest signal-to-noise ratio corresponding to the highest precision and accuracy. The crater morphology was examined and the mass removed was calculated for both the 266 nm and 1064 nm irradiations. The analytical figures of merit suggest that the 266 nm and 1064 nm wavelengths are capable of good performance for the forensic chemical characterization of glass. The results presented here suggest that the 266 nm laser produces a better laser-glass matrix coupling, resulting in a better stoichiometric representation of the glass sample. The 266 nm irradiance is therefore recommended for the forensic analysis and comparison of glass samples.

  20. Modelling live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-06-01

    Full Text Available This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic...

  1. Client-side Skype forensics: an overview

    Science.gov (United States)

    Meißner, Tina; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.

  2. Monitoring As A Helpful Means In Forensic Analysis Of Dams Static Instability Events

    Science.gov (United States)

    Solimene, Pellegrino

    2013-04-01

    Monitoring is a means of controlling the behavior of a structure, which during its operational life is subject to external actions as ordinary loading conditions and disturbing ones; these factors overlap with the random manner defined by the statistical parameter of the return period. The analysis of the monitoring data is crucial to gain a reasoned opinion on the reliability of the structure and its components, and also allows to identify, in the overall operational scenario, the time when preparing interventions aimed at maintaining the optimum levels of functionality and safety. The concept of monitoring in terms of prevention is coupled with the activity of Forensic Engineer who, by Judiciary appointment for the occurrence of an accident, turns its experience -the "Scientific knowledge"- in an "inverse analysis" in which he summed up the results of a survey, which also draws on data sets arising in the course of the constant control of the causes and effects, so to determine the correlations between these factors. His activity aims at giving a contribution to the identification of the typicality of an event, which represents, together with "causal link" between the conduct and events and contra-juridical, the factors judging if there an hypothesis of crime, and therefore liable according to law. In Italy there are about 10,000 dams of varying sizes, but only a small portion of them are considered "large dams" and subjected to a rigorous program of regular inspections and monitoring, in application of specific rules. The rest -"small" dams, conventionally defined as such by the standard, but not for the impact on the area- is affected by a heterogeneous response from the local authorities entrusted with this task: there is therefore a high potential risk scenario, as determined by the presence of not completely controlled structures that insist even on areas heavily populated. Risk can be traced back to acceptable levels if they were implemented with the

  3. A history of forensic anthropology.

    Science.gov (United States)

    Ubelaker, Douglas H

    2018-04-01

    Forensic anthropology represents a dynamic and rapidly evolving complex discipline within anthropology and forensic science. Academic roots extend back to early European anatomists but development coalesced in the Americas through high-profile court testimony, assemblage of documented collections and focused research. Formation of the anthropology section of the American Academy of Forensic Sciences in 1972, the American Board of Forensic Anthropology in 1977/1978 and other organizational advances provided important stimuli for progress. While early pioneers concentrated on analysis of skeletonized human remains, applications today have expanded to include complex methods of search and recovery, the biomechanics of trauma interpretation, isotopic analysis related to diet and region of origin, age estimation of the living and issues related to humanitarian and human rights investigations. © 2018 Wiley Periodicals, Inc.

  4. Electrochemical Study of Delta-9-Tetrahydrocannabinol by Cyclic Voltammetry Using Screen Printed Electrode, Improvements in Forensic Analysis

    Directory of Open Access Journals (Sweden)

    Marco Antonio BALBINO

    2016-12-01

    Full Text Available Rapid screening of seized drugs is a continuing problem for governmental laboratories and customs agents. Recently new and cheaper methods based on electrochemical sensing have been developed for the detection of illicit drugs. Screen printed electrodes are particularly useful in this regard and can provide excellent sensitivity. In this study, a carbon screen printed electrode for the voltammetric analysis of D9-THC was developed. The analysis was performed using cyclic voltammetry with 0.15 mol×L-1 potassium nitrate as a supporting electrolyte. In the analysis, a D9-THC standard solution was added to the surface electrode by a drop coating method. A study of scan rate, time of pre-concentration, and concentration influence parameters showed versatility during the investigation. The high sensitivity, quantitative capability and low limit of detection (1.0 µmol×L-1 demonstrate that this electrochemical method should be an attractive alternative in forensic investigations of seized samples.

  5. Procedures for a harmonised digital forensic process in live forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-09-01

    Full Text Available Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid...

  6. Structural Analysis of Complex Networks

    CERN Document Server

    Dehmer, Matthias

    2011-01-01

    Filling a gap in literature, this self-contained book presents theoretical and application-oriented results that allow for a structural exploration of complex networks. The work focuses not only on classical graph-theoretic methods, but also demonstrates the usefulness of structural graph theory as a tool for solving interdisciplinary problems. Applications to biology, chemistry, linguistics, and data analysis are emphasized. The book is suitable for a broad, interdisciplinary readership of researchers, practitioners, and graduate students in discrete mathematics, statistics, computer science,

  7. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  8. Analysis of trace element compositions in adhesive cloth tapes using high-energy x-ray fluorescence spectrometer with three-dimensional polarization optics for forensic discrimination

    International Nuclear Information System (INIS)

    Goto, Akiko; Hokura, Akiko; Nakai, Izumi

    2008-01-01

    The forensic discrimination of adhesive cloth tapes often used in crimes was developed using a high-energy energy-dispersive X-ray fluorescence spectrometer with 3-dimensional polarization optics. The best measurement condition for discrimination of the tape was as follows: secondary targets, Rh and Al 2 O 3 ; measurement time, 300 s for Rh and 600 s for Al 2 O 3 ; 14 elements (Ca, Ti, Cr, Mn, Fe, Ni, Zn, Sr, Zr, Nb, Mo, Sb, Ba and Pb) were used for discrimination. It is found that the combined information of yarn density and the XRF peak intensity of the 14 elements successfully discriminated 29 out of 31 samples, of which 2 probably had the same origin. This technique is useful for forensic analysis, because it is nondestructive, rapid and easy. Therefore, it can be applied to actual forensic identification. (author)

  9. CETAMA contribution to safeguards and nuclear forensic analysis based on nuclear reference materials

    International Nuclear Information System (INIS)

    Roudil, D.; Rigaux, C.; Rivier, C.; Hubinois, J.C.; Aufore, L.

    2012-01-01

    Measurement quality is crucial for the safety of nuclear facilities: nuclear reference materials (CRM) and interlaboratory programs (ILC), beyond the assessment of analytical measurement quality, play an important role. In the nuclear field, the CETAMA proposes suitable scientific and technical developments, in particular the preparation and certification of CRM used either as analytical standards or as reference samples for ILCs. The growing emphasis on nuclear forensic measurements will require some re-certification of old CRMs. But the future analytical challenges of meeting nuclear fuel cycle needs and of ensuring safeguard performance improvements will also concern the future CRMs. (authors)

  10. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  11. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  12. Analysis of Network Parameters Influencing Performance of Hybrid Multimedia Networks

    Directory of Open Access Journals (Sweden)

    Dominik Kovac

    2013-10-01

    Full Text Available Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP calls or file transfers. Such a heterogeneous system has to be able satisfy all network and end-user requirements which are increasing constantly. Therefore the simulation tools enabling deep analysis in order to find the key performance indicators and factors which influence the overall quality for specific network service the most are highly needed. This paper provides a study on the network parameters like communication technology, routing protocol, QoS mechanism, etc. and their effect on the performance of hybrid multimedia network. The analysis was performed in OPNET Modeler environment and the most interesting results are discussed at the end of this paper

  13. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  14. Multimedia Forensics Is Not Computer Forensics

    Science.gov (United States)

    Böhme, Rainer; Freiling, Felix C.; Gloe, Thomas; Kirchner, Matthias

    The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

  15. Review Essay: Does Qualitative Network Analysis Exist?

    Directory of Open Access Journals (Sweden)

    Rainer Diaz-Bone

    2007-01-01

    Full Text Available Social network analysis was formed and established in the 1970s as a way of analyzing systems of social relations. In this review the theoretical-methodological standpoint of social network analysis ("structural analysis" is introduced and the different forms of social network analysis are presented. Structural analysis argues that social actors and social relations are embedded in social networks, meaning that action and perception of actors as well as the performance of social relations are influenced by the network structure. Since the 1990s structural analysis has integrated concepts such as agency, discourse and symbolic orientation and in this way structural analysis has opened itself. Since then there has been increasing use of qualitative methods in network analysis. They are used to include the perspective of the analyzed actors, to explore networks, and to understand network dynamics. In the reviewed book, edited by Betina HOLLSTEIN and Florian STRAUS, the twenty predominantly empirically orientated contributions demonstrate the possibilities of combining quantitative and qualitative methods in network analyses in different research fields. In this review we examine how the contributions succeed in applying and developing the structural analysis perspective, and the self-positioning of "qualitative network analysis" is evaluated. URN: urn:nbn:de:0114-fqs0701287

  16. Understanding Nuclear Forensics in 5 Questions

    International Nuclear Information System (INIS)

    2014-01-01

    Forensic science, commonly referred to as forensics, is the examination of physical, biological, behavioural and documentary evidence. The goal of forensics is to discover linkages among people, places, things and events. A sub-discipline of forensic science, nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material, which can assist in law enforcement investigations as well as assessments of the potential vulnerabilities associated with the use, production and storage of these materials as part of a nuclear security infrastructure. The analysis of nuclear or other radioactive material seeks to identify what the materials are, how, when, and where the materials were made, and what their intended uses were. Nuclear forensics is an important tool in the fight against illicit trafficking in nuclear and radiological material

  17. Google matrix analysis of directed networks

    Science.gov (United States)

    Ermann, Leonardo; Frahm, Klaus M.; Shepelyansky, Dima L.

    2015-10-01

    In the past decade modern societies have developed enormous communication and social networks. Their classification and information retrieval processing has become a formidable task for the society. Because of the rapid growth of the World Wide Web, and social and communication networks, new mathematical methods have been invented to characterize the properties of these networks in a more detailed and precise way. Various search engines extensively use such methods. It is highly important to develop new tools to classify and rank a massive amount of network information in a way that is adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency using various examples including the World Wide Web, Wikipedia, software architectures, world trade, social and citation networks, brain neural networks, DNA sequences, and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos, and random matrix theory.

  18. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  19. Hot Shoes in the Room: Authentication of Thermal Imaging for Quantitative Forensic Analysis

    Directory of Open Access Journals (Sweden)

    Justin H. J. Chua

    2018-01-01

    Full Text Available Thermal imaging has been a mainstay of military applications and diagnostic engineering. However, there is currently no formalised procedure for the use of thermal imaging capable of standing up to judicial scrutiny. Using a scientifically sound characterisation method, we describe the cooling function of three common shoe types at an ambient room temperature of 22 °C (295 K based on the digital output of a consumer-grade FLIR i50 thermal imager. Our method allows the reliable estimation of cooling time from pixel intensity values within a time interval of 3 to 25 min after shoes have been removed. We found a significant linear relationship between pixel intensity level and temperature. The calibration method allows the replicable determination of independent thermal cooling profiles for objects without the need for emissivity values associated with non-ideal black-body thermal radiation or system noise functions. The method has potential applications for law enforcement and forensic research, such as cross-validating statements about time spent by a person in a room. The use of thermal images can thus provide forensic scientists, law enforcement officials, and legislative bodies with an efficient and cost-effective tool for obtaining and interpreting time-based evidence.

  20. In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes.

    Science.gov (United States)

    McDown, Robert J; Varol, Cihan; Carvajal, Leonardo; Chen, Lei

    2016-01-01

    The comparison studies on random access memory (RAM) acquisition tools are either limited in metrics or the selected tools were designed to be executed in older operating systems. Therefore, this study evaluates widely used seven shareware or freeware/open source RAM acquisition forensic tools that are compatible to work with the latest 64-bit Windows operating systems. These tools' user interface capabilities, platform limitations, reporting capabilities, total execution time, shared and proprietary DLLs, modified registry keys, and invoked files during processing were compared. We observed that Windows Memory Reader and Belkasoft's Live Ram Capturer leaves the least fingerprints in memory when loaded. On the other hand, ProDiscover and FTK Imager perform poor in memory usage, processing time, DLL usage, and not-wanted artifacts introduced to the system. While Belkasoft's Live Ram Capturer is the fastest to obtain an image of the memory, Pro Discover takes the longest time to do the same job. © 2015 American Academy of Forensic Sciences.

  1. Social network analysis community detection and evolution

    CERN Document Server

    Missaoui, Rokia

    2015-01-01

    This book is devoted to recent progress in social network analysis with a high focus on community detection and evolution. The eleven chapters cover the identification of cohesive groups, core components and key players either in static or dynamic networks of different kinds and levels of heterogeneity. Other important topics in social network analysis such as influential detection and maximization, information propagation, user behavior analysis, as well as network modeling and visualization are also presented. Many studies are validated through real social networks such as Twitter. This edit

  2. Extending the Advanced Forensic Format to accommodate Multiple Data Sources, Logical Evidence, Arbitrary Information and Forensic Workflow

    OpenAIRE

    Cohen, Michael; Garfinkel, Simson; Schatz, Bradley

    2009-01-01

    DFRWS 2009, Montreal, Canada. The article of record as published may be found at http://dx.doi.org/10.1016/j.diin.2009.06.010 Refereed Conference Paper Forensic analysis requires the acquisition and management of many different types of evidence, including individual disk drives, RAID sets, network packets, memory images, and extracted files. Often the same evidence is reviewed by several different tools or examiners in different locations. We propose a backwards-compatible ...

  3. Network analysis literacy a practical approach to the analysis of networks

    CERN Document Server

    Zweig, Katharina A

    2014-01-01

    Network Analysis Literacy focuses on design principles for network analytics projects. The text enables readers to: pose a defined network analytic question; build a network to answer the question; choose or design the right network analytic methods for a particular purpose, and more.

  4. Forensic geotechnical engineering

    CERN Document Server

    Babu, GL

    2016-01-01

    In this edited volume on advances in forensic geotechnical engineering, a number of technical contributions by experts and professionals in this area are included. The work is the outcome of deliberations at various conferences in the area conducted by Prof. G.L. Sivakumar Babu and Dr. V.V.S. Rao as secretary and Chairman of Technical Committee on Forensic Geotechnical Engineering of International Society for Soil Mechanics and Foundation Engineering (ISSMGE). This volume contains papers on topics such as guidelines, evidence/data collection, distress characterization, use of diagnostic tests (laboratory and field tests), back analysis, failure hypothesis formulation, role of instrumentation and sensor-based technologies, risk analysis, technical shortcomings. This volume will prove useful to researchers and practitioners alike.

  5. La geomatica forense e il Forensic GIS

    Directory of Open Access Journals (Sweden)

    Renzo Carlucci

    2013-03-01

    Full Text Available La Conferenza ASITA 2012, tenutasi lo scorso novembre a Vicenza, ha rivelato una piacevole sorpresa con unasessione speciale che ha visto magistrati, avvocati e geomatici coinvolti per discutere l'aspetto relativo all’impattodella determinazione scientifica in iter giudiziari quali i contesti investigativi e processuali.AbstractIn the ASITA Conference 2012, held last November in Vicenza,a special session on “Forensic geomatics”, with judges and lawyers involved to discuss a very important aspect about the impact of scientific geomatics determinations arising during the judicial process of contexts analysis and investigative proceedings. 

  6. La geomatica forense e il Forensic GIS

    Directory of Open Access Journals (Sweden)

    Renzo Carlucci

    2013-03-01

    Full Text Available La Conferenza ASITA 2012, tenutasi lo scorso novembre a Vicenza, ha rivelato una piacevole sorpresa con unasessione speciale che ha visto magistrati, avvocati e geomatici coinvolti per discutere l'aspetto relativo all’impattodella determinazione scientifica in iter giudiziari quali i contesti investigativi e processuali. Abstract In the ASITA Conference 2012, held last November in Vicenza,a special session on “Forensic geomatics”, with judges and lawyers involved to discuss a very important aspect about the impact of scientific geomatics determinations arising during the judicial process of contexts analysis and investigative proceedings.

  7. Forensic entomology: a template for forensic acarology?

    Science.gov (United States)

    Turner, Bryan

    2009-10-01

    Insects are used in a variety of ways in forensic science and the developing area of forensic acarology may have a similar range of potential. This short account summarises the main ways in which entomology currently contributes to forensic science and discusses to what extent acarology might also contribute in these areas.

  8. Raman hyperspectral imaging in conjunction with independent component analysis as a forensic tool for explosive analysis: The case of an ATM explosion.

    Science.gov (United States)

    Almeida, Mariana Ramos; Logrado, Lucio Paulo Lima; Zacca, Jorge Jardim; Correa, Deleon Nascimento; Poppi, Ronei Jesus

    2017-11-01

    In this work, Raman hyperspectral imaging, in conjunction with independent component analysis, was employed as an analytical methodology to detect an ammonium nitrate fuel oil (ANFO) explosive in banknotes after an ATM explosion experiment. The proposed methodology allows for the identification of the ANFO explosive without sample preparation or destroying the sample, at quantities as small as 70μgcm -2 . The explosive was identified following ICA data decomposition by the characteristic nitrate band at 1044cm -1 . The use of Raman hyperspectral imaging and independent component analysis shows great potential for identifying forensic samples by providing chemical and spatial information. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Networks and Bargaining in Policy Analysis

    DEFF Research Database (Denmark)

    Bogason, Peter

    2006-01-01

    A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today.......A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today....

  10. Forensic Taxonomy of Android Social Apps.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2017-03-01

    An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. © 2016 American Academy of Forensic Sciences.

  11. Analysis of Recurrent Analog Neural Networks

    Directory of Open Access Journals (Sweden)

    Z. Raida

    1998-06-01

    Full Text Available In this paper, an original rigorous analysis of recurrent analog neural networks, which are built from opamp neurons, is presented. The analysis, which comes from the approximate model of the operational amplifier, reveals causes of possible non-stable states and enables to determine convergence properties of the network. Results of the analysis are discussed in order to enable development of original robust and fast analog networks. In the analysis, the special attention is turned to the examination of the influence of real circuit elements and of the statistical parameters of processed signals to the parameters of the network.

  12. X-ray computed tomography datasets for forensic analysis of vertebrate fossils

    Science.gov (United States)

    Rowe, Timothy B.; Luo, Zhe-Xi; Ketcham, Richard A.; Maisano, Jessica A.; Colbert, Matthew W.

    2016-01-01

    We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils. PMID:27272251

  13. Biomedical and Forensic Applications of Combined Catalytic Hydrogenation-Stable Isotope Ratio Analysis

    Directory of Open Access Journals (Sweden)

    Mark A. Sephton

    2007-01-01

    Full Text Available Studies of biological molecules such as fatty acids and the steroid hormones have the potential to benefit enormously from stable carbon isotope ratio measurements of individual molecules. In their natural form, however, the body’s molecules interact too readily with laboratory equipment designed to separate them for accurate measurements to be made.Some methods overcome this problem by adding carbon to the target molecule, but this can irreversibly overprint the carbon source ‘signal’. Hydropyrolysis is a newly-applied catalytic technique that delicately strips molecules of their functional groups but retains their carbon skeletons and stereochemistries intact, allowing precise determination of the carbon source. By solving analytical problems, the new technique is increasing the ability of scientists to pinpoint molecular indicators of disease, elucidate metabolic pathways and recognise administered substances in forensic investigations.

  14. Biomedical and Forensic Applications of Combined Catalytic Hydrogenation-Stable Isotope Ratio Analysis

    Science.gov (United States)

    Sephton, Mark A.; Meredith, Will; Sun, Cheng-Gong; Snape, Colin E.

    2007-01-01

    Studies of biological molecules such as fatty acids and the steroid hormones have the potential to benefit enormously from stable carbon isotope ratio measurements of individual molecules. In their natural form, however, the body’s molecules interact too readily with laboratory equipment designed to separate them for accurate measurements to be made. Some methods overcome this problem by adding carbon to the target molecule, but this can irreversibly overprint the carbon source ‘signal’. Hydropyrolysis is a newly-applied catalytic technique that delicately strips molecules of their functional groups but retains their carbon skeletons and stereochemistries intact, allowing precise determination of the carbon source. By solving analytical problems, the new technique is increasing the ability of scientists to pinpoint molecular indicators of disease, elucidate metabolic pathways and recognise administered substances in forensic investigations. PMID:19662175

  15. Evaluation of ammonium bifluoride fusion for rapid dissolution in post-detonation nuclear forensic analysis

    International Nuclear Information System (INIS)

    Hubley, Nicholas T.; Brockman, John D.; Robertson, J. David; Missouri Univ., Columbia, MO

    2017-01-01

    Dissolution of geological reference materials by fusion with ammonium bifluoride, NH_4HF_2 or ABF, was evaluated for its potential use in post-detonation nuclear forensics. The fusion procedure was optimized such that the total dissolution time was <3 h without compromising recovery. Geological reference materials containing various levels of silicates were dissolved and measured by ICP-MS to quantify elemental recovery. Dissolutions of NIST 278 obsidian and urban canyon matrix were performed with radiotracer spikes to measure potential loss of volatile elements during the fusion procedure via gamma-ray spectroscopy. Elemental percent recoveries obtained by ICP-MS were found to be 80-120% while recoveries of radiotracers were observed to be 90-100% with the exception of iodine.

  16. Evaluation of ammonium bifluoride fusion for rapid dissolution in post-detonation nuclear forensic analysis

    Energy Technology Data Exchange (ETDEWEB)

    Hubley, Nicholas T. [Missouri Univ., Columbia, MO (United States). Dept. of Chemistry; Brockman, John D. [Missouri Univ., Columbia, MO (United States). Research Reactor Center; Robertson, J. David [Missouri Univ., Columbia, MO (United States). Research Reactor Center; Missouri Univ., Columbia, MO (United States). Dept. of Chemistry

    2017-10-01

    Dissolution of geological reference materials by fusion with ammonium bifluoride, NH{sub 4}HF{sub 2} or ABF, was evaluated for its potential use in post-detonation nuclear forensics. The fusion procedure was optimized such that the total dissolution time was <3 h without compromising recovery. Geological reference materials containing various levels of silicates were dissolved and measured by ICP-MS to quantify elemental recovery. Dissolutions of NIST 278 obsidian and urban canyon matrix were performed with radiotracer spikes to measure potential loss of volatile elements during the fusion procedure via gamma-ray spectroscopy. Elemental percent recoveries obtained by ICP-MS were found to be 80-120% while recoveries of radiotracers were observed to be 90-100% with the exception of iodine.

  17. From event analysis to global lessons: disaster forensics for building resilience

    Science.gov (United States)

    Keating, Adriana; Venkateswaran, Kanmani; Szoenyi, Michael; MacClune, Karen; Mechler, Reinhard

    2016-07-01

    With unprecedented growth in disaster risk, there is an urgent need for enhanced learning and understanding of disasters, particularly in relation to the trends in drivers of increasing risk. Building on the disaster forensics field, we introduce the post-event review capability (PERC) methodology for systematically and holistically analysing disaster events, and identifying actionable recommendations. PERC responds to a need for learning about the successes and failures in disaster risk management and resilience, and uncovers the underlying drivers of increasing risk. We draw generalisable insights identified from seven applications of the methodology to date, where we find that across the globe policy makers and practitioners in disaster risk management face strikingly similar challenges despite variations in context, indicating encouraging potential for mutual learning. These lessons highlight the importance of integrated risk reduction strategies. We invite others to utilise the freely available PERC approach and contribute to building a repository of learning on disaster risk management and resilience.

  18. Atomic force microscopic investigation of commercial pressure sensitive adhesives for forensic analysis.

    Science.gov (United States)

    Canetta, Elisabetta; Adya, Ashok K

    2011-07-15

    Pressure sensitive adhesive (PSA), such as those used in packaging and adhesive tapes, are very often encountered in forensic investigations. In criminal activities, packaging tapes may be used for sealing packets containing drugs, explosive devices, or questioned documents, while adhesive and electrical tapes are used occasionally in kidnapping cases. In this work, the potential of using atomic force microscopy (AFM) in both imaging and force mapping (FM) modes to derive additional analytical information from PSAs is demonstrated. AFM has been used to illustrate differences in the ultrastructural and nanomechanical properties of three visually distinguishable commercial PSAs to first test the feasibility of using this technique. Subsequently, AFM was used to detect nanoscopic differences between three visually indistinguishable PSAs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  19. Forensic investigation of brick stones using instrumental neutron activation analysis (INAA), laser ablation-inductively coupled plasma-mass spectrometry (LA-ICP-MS) and X-ray fluorescence analysis (XRF)

    International Nuclear Information System (INIS)

    Scheid, Nicole; Becker, Stefan; Duecking, Marc; Hampel, Gabriele; Volker Kratz, Jens; Watzke, Peter; Weis, Peter; Zauner, Stephan

    2009-01-01

    Brick stones collected from different production facilities were studied for their elemental compositions under forensic aspects using laser ablation-inductively coupled plasma-mass spectrometry (LA-ICP-MS), instrumental neutron activation analysis (INAA) and X-ray fluorescence analysis (XRF). The aim of these examinations was to assess the potential of these methods in forensic comparison analyses of brick stones. The accuracy of the analysis methods was evaluated using NIST standard reference materials (679, 98b and 97b). In order to compare the stones to each other, multivariate data analysis was used. The evaluation of the INAA results (based on the concentrations of V, Na, K, Sm, U, Sc, Fe, Co, Rb and Cs) using principal component analysis (PCA) and cluster analysis is presented as an example. The results derived from the different analytical methods are consistent. It was shown that elemental analysis using the described methods is a valuable tool for forensic examinations of brick stones.

  20. Forensic entomology

    Science.gov (United States)

    Amendt, Jens; Krettek, Roman; Zehner, Richard

    Necrophagous insects are important in the decomposition of cadavers. The close association between insects and corpses and the use of insects in medicocriminal investigations is the subject of forensic entomology. The present paper reviews the historical background of this discipline, important postmortem processes, and discusses the scientific basis underlying attempts to determine the time interval since death. Using medical techniques, such as the measurement of body temperature or analysing livor and rigor mortis, time since death can only be accurately measured for the first two or three days after death. In contrast, by calculating the age of immature insect stages feeding on a corpse and analysing the necrophagous species present, postmortem intervals from the first day to several weeks can be estimated. These entomological methods may be hampered by difficulties associated with species identification, but modern DNA techniques are contributing to the rapid and authoritative identification of necrophagous insects. Other uses of entomological data include the toxicological examination of necrophagous larvae from a corpse to identify and estimate drugs and toxicants ingested by the person when alive and the proof of possible postmortem manipulations. Forensic entomology may even help in investigations dealing with people who are alive but in need of care, by revealing information about cases of neglect.

  1. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  2. Electronic-nose applications in forensic science and for analysis of volatile biomarkers in the human breath

    Science.gov (United States)

    AD Wilson

    2014-01-01

    The application of electronic-nose (E-nose) technologies in forensic science is a recent new development following a long history of progress in the development of diverse applications in the related biomedical and pharmaceutical fields. Data from forensic analyses must satisfy the needs and requirements of both the scientific and legal communities. The type of data...

  3. Veterinary Forensic Toxicology.

    Science.gov (United States)

    Gwaltney-Brant, S M

    2016-09-01

    Veterinary pathologists working in diagnostic laboratories are sometimes presented with cases involving animal poisonings that become the object of criminal or civil litigation. Forensic veterinary toxicology cases can include cases involving animal cruelty (malicious poisoning), regulatory issues (eg, contamination of the food supply), insurance litigation, or poisoning of wildlife. An understanding of the appropriate approach to these types of cases, including proper sample collection, handling, and transport, is essential so that chain of custody rules are followed and proper samples are obtained for toxicological analysis. Consultation with veterinary toxicologists at the diagnostic laboratory that will be processing the samples before, during, and after the forensic necropsy can help to ensure that the analytical tests performed are appropriate for the circumstances and findings surrounding the individual case. © The Author(s) 2016.

  4. Egocentric Social Network Analysis of Pathological Gambling

    Science.gov (United States)

    Meisel, Matthew K.; Clifton, Allan D.; MacKillop, James; Miller, Joshua D.; Campbell, W. Keith; Goodie, Adam S.

    2012-01-01

    Aims To apply social network analysis (SNA) to investigate whether frequency and severity of gambling problems were associated with different network characteristics among friends, family, and co-workers. is an innovative way to look at relationships among individuals; the current study was the first to our knowledge to apply SNA to gambling behaviors. Design Egocentric social network analysis was used to formally characterize the relationships between social network characteristics and gambling pathology. Setting Laboratory-based questionnaire and interview administration. Participants Forty frequent gamblers (22 non-pathological gamblers, 18 pathological gamblers) were recruited from the community. Findings The SNA revealed significant social network compositional differences between the two groups: pathological gamblers (PGs) had more gamblers, smokers, and drinkers in their social networks than did nonpathological gamblers (NPGs). PGs had more individuals in their network with whom they personally gambled, smoked, and drank with than those with who were NPG. Network ties were closer to individuals in their networks who gambled, smoked, and drank more frequently. Associations between gambling severity and structural network characteristics were not significant. Conclusions Pathological gambling is associated with compositional but not structural differences in social networks. Pathological gamblers differ from non-pathological gamblers in the number of gamblers, smokers, and drinkers in their social networks. Homophily within the networks also indicates that gamblers tend to be closer with other gamblers. This homophily may serve to reinforce addictive behaviors, and may suggest avenues for future study or intervention. PMID:23072641

  5. Egocentric social network analysis of pathological gambling.

    Science.gov (United States)

    Meisel, Matthew K; Clifton, Allan D; Mackillop, James; Miller, Joshua D; Campbell, W Keith; Goodie, Adam S

    2013-03-01

    To apply social network analysis (SNA) to investigate whether frequency and severity of gambling problems were associated with different network characteristics among friends, family and co-workers is an innovative way to look at relationships among individuals; the current study was the first, to our knowledge, to apply SNA to gambling behaviors. Egocentric social network analysis was used to characterize formally the relationships between social network characteristics and gambling pathology. Laboratory-based questionnaire and interview administration. Forty frequent gamblers (22 non-pathological gamblers, 18 pathological gamblers) were recruited from the community. The SNA revealed significant social network compositional differences between the two groups: pathological gamblers (PGs) had more gamblers, smokers and drinkers in their social networks than did non-pathological gamblers (NPGs). PGs had more individuals in their network with whom they personally gambled, smoked and drank than those with who were NPG. Network ties were closer to individuals in their networks who gambled, smoked and drank more frequently. Associations between gambling severity and structural network characteristics were not significant. Pathological gambling is associated with compositional but not structural differences in social networks. Pathological gamblers differ from non-pathological gamblers in the number of gamblers, smokers and drinkers in their social networks. Homophily within the networks also indicates that gamblers tend to be closer with other gamblers. This homophily may serve to reinforce addictive behaviors, and may suggest avenues for future study or intervention. © 2012 The Authors, Addiction © 2012 Society for the Study of Addiction.

  6. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  7. A comparison between DART-MS and DSA-MS in the forensic analysis of writing inks.

    Science.gov (United States)

    Drury, Nicholas; Ramotowski, Robert; Moini, Mehdi

    2018-05-23

    Ambient ionization mass spectrometry is gaining momentum in forensic science laboratories because of its high speed of analysis, minimal sample preparation, and information-rich results. One such application of ambient ionization methodology includes the analysis of writing inks from questioned documents where colorants of interest may not be soluble in common solvents, rendering thin layer chromatography (TLC) and separation-mass spectrometry methods such as LC/MS (-MS) impractical. Ambient ionization mass spectrometry uses a variety of ionization techniques such as penning ionization in Direct Analysis in Real Time (DART), and atmospheric pressure chemical ionization in Direct Sample Analysis (DSA), and electrospray ionization in Desorption Electrospray Ionization (DESI). In this manuscript, two of the commonly used ambient ionization techniques are compared: Perkin Elmer DSA-MS and IonSense DART in conjunction with a JEOL AccuTOF MS. Both technologies were equally successful in analyzing writing inks and produced similar spectra. DSA-MS produced less background signal likely because of its closed source configuration; however, the open source configuration of DART-MS provided more flexibility for sample positioning for optimum sensitivity and thereby allowing smaller piece of paper containing writing ink to be analyzed. Under these conditions, the minimum sample required for DART-MS was 1mm strokes of ink on paper, whereas DSA-MS required a minimum of 3mm. Moreover, both techniques showed comparable repeatability. Evaluation of the analytical figures of merit, including sensitivity, linear dynamic range, and repeatability, for DSA-MS and DART-MS analysis is provided. To the forensic context of the technique, DART-MS was applied to the analysis of United States Secret Service ink samples directly on a sampling mesh, and the results were compared with DSA-MS of the same inks on paper. Unlike analysis using separation mass spectrometry, which requires sample

  8. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  9. Ecological network analysis for a virtual water network.

    Science.gov (United States)

    Fang, Delin; Chen, Bin

    2015-06-02

    The notions of virtual water flows provide important indicators to manifest the water consumption and allocation between different sectors via product transactions. However, the configuration of virtual water network (VWN) still needs further investigation to identify the water interdependency among different sectors as well as the network efficiency and stability in a socio-economic system. Ecological network analysis is chosen as a useful tool to examine the structure and function of VWN and the interactions among its sectors. A balance analysis of efficiency and redundancy is also conducted to describe the robustness (RVWN) of VWN. Then, network control analysis and network utility analysis are performed to investigate the dominant sectors and pathways for virtual water circulation and the mutual relationships between pairwise sectors. A case study of the Heihe River Basin in China shows that the balance between efficiency and redundancy is situated on the left side of the robustness curve with less efficiency and higher redundancy. The forestation, herding and fishing sectors and industrial sectors are found to be the main controllers. The network tends to be more mutualistic and synergic, though some competitive relationships that weaken the virtual water circulation still exist.

  10. Basic general concepts in the network analysis

    Directory of Open Access Journals (Sweden)

    Boja Nicolae

    2004-01-01

    Full Text Available This survey is concerned oneself with the study of those types of material networks which can be met both in civil engineering and also in electrotechnics, in mechanics, or in hydrotechnics, and of which behavior lead to linear problems, solvable by means of Finite Element Method and adequate algorithms. Here, it is presented a unitary theory of networks met in the domains mentioned above and this one is illustrated with examples for the structural networks in civil engineering, electric circuits, and water supply networks, but also planar or spatial mechanisms can be comprised in this theory. The attention is focused to make evident the essential proper- ties and concepts in the network analysis, which differentiate the networks under force from other types of material networks. To such a network a planar, connected, and directed or undirected graph is associated, and with some vector fields on the vertex set this graph is endowed. .

  11. Network Analysis on Attitudes: A Brief Tutorial.

    Science.gov (United States)

    Dalege, Jonas; Borsboom, Denny; van Harreveld, Frenk; van der Maas, Han L J

    2017-07-01

    In this article, we provide a brief tutorial on the estimation, analysis, and simulation on attitude networks using the programming language R. We first discuss what a network is and subsequently show how one can estimate a regularized network on typical attitude data. For this, we use open-access data on the attitudes toward Barack Obama during the 2012 American presidential election. Second, we show how one can calculate standard network measures such as community structure, centrality, and connectivity on this estimated attitude network. Third, we show how one can simulate from an estimated attitude network to derive predictions from attitude networks. By this, we highlight that network theory provides a framework for both testing and developing formalized hypotheses on attitudes and related core social psychological constructs.

  12. 4th International Conference in Network Analysis

    CERN Document Server

    Koldanov, Petr; Pardalos, Panos

    2016-01-01

    The contributions in this volume cover a broad range of topics including maximum cliques, graph coloring, data mining, brain networks, Steiner forest, logistic and supply chain networks. Network algorithms and their applications to market graphs, manufacturing problems, internet networks and social networks are highlighted. The "Fourth International Conference in Network Analysis," held at the Higher School of Economics, Nizhny Novgorod in May 2014, initiated joint research between scientists, engineers and researchers from academia, industry and government; the major results of conference participants have been reviewed and collected in this Work. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis.

  13. Analysis of microsatellite markers D18S70 and d20S116 in DNA isolated from dentin: Use in forensic medicine

    Directory of Open Access Journals (Sweden)

    Puzović Dragana

    2009-01-01

    Full Text Available Introduction. Short tandem repeats and more specifically microsatellites represent a powerful tool in forensic medicine. In the past years, they have been extensively used in human identification and paternity testing. Objective The aim of the present study was to analyze two microsatellite markers in the Serbian population, i.e. to determine the number of alleles and the relevant forensic parameters. Methods. DNA was isolated from teeth samples using standard proteinase K digestion and phenol/chloroform alcohol extraction. PCR products were analyzed on polyacrilamide gels and visualized by AgNO3 staining. Forensic parameters were calculated using the Cervus software. Results. The loci D18S70 and D20S116 were analyzed on a sample of 70 unrelated, healthy adult individuals from Serbia. The number of alleles was determined and Hardy Weinberg equilibrium was confirmed for both loci. D18S70 and D20S116 demonstrated 6 and 8 alleles, respectively. The power of discrimination (PD and the power of exclusion (PE for the tested STR loci, D18S70 and D20S116 were 0.92 (PD, 0.41 (PE and 0.95 (PD, 0.480 (PE, respectively. Conclusion. According to the presented data, D18S70 and D20S116 are most informative markers. Based on allelic frequencies and statistical parameters for forensic testing, it may be suggested that these two microsatellites represent useful markers for individual identification and parentage analysis in the Serbian population.

  14. Analysis of body fluids for forensic purposes: from laboratory testing to non-destructive rapid confirmatory identification at a crime scene.

    Science.gov (United States)

    Virkler, Kelly; Lednev, Igor K

    2009-07-01

    Body fluid traces recovered at crime scenes are among the most important types of evidence to forensic investigators. They contain valuable DNA evidence which can identify a suspect or victim as well as exonerate an innocent individual. The first step of identifying a particular body fluid is highly important since the nature of the fluid is itself very informative to the investigation, and the destructive nature of a screening test must be considered when only a small amount of material is available. The ability to characterize an unknown stain at the scene of the crime without having to wait for results from a laboratory is another very critical step in the development of forensic body fluid analysis. Driven by the importance for forensic applications, body fluid identification methods have been extensively developed in recent years. The systematic analysis of these new developments is vital for forensic investigators to be continuously educated on possible superior techniques. Significant advances in laser technology and the development of novel light detectors have dramatically improved spectroscopic methods for molecular characterization over the last decade. The application of this novel biospectroscopy for forensic purposes opens new and exciting opportunities for the development of on-field, non-destructive, confirmatory methods for body fluid identification at a crime scene. In addition, the biospectroscopy methods are universally applicable to all body fluids unlike the majority of current techniques which are valid for individual fluids only. This article analyzes the current methods being used to identify body fluid stains including blood, semen, saliva, vaginal fluid, urine, and sweat, and also focuses on new techniques that have been developed in the last 5-6 years. In addition, the potential of new biospectroscopic techniques based on Raman and fluorescence spectroscopy is evaluated for rapid, confirmatory, non-destructive identification of a body

  15. An Android Communication App Forensic Taxonomy.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2016-09-01

    Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps. © 2016 American Academy of Forensic Sciences.

  16. An investigation and comparison on network performance analysis

    OpenAIRE

    Lanxiaopu, Mi

    2012-01-01

    This thesis is generally about network performance analysis. It contains two parts. The theory part summarizes what network performance is and inducts the methods of doing network performance analysis. To answer what network performance is, a study into what network services are is done. And based on the background research, there are two important network performance metrics: Network delay and Throughput should be included in network performance analysis. Among the methods of network a...

  17. MetricForensics: A Multi-Level Approach for Mining Volatile Graphs

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Keith [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Faloutsos, Christos [Carnegie Mellon Univ., Pittsburgh, PA (United States); Akoglu, Leman [Carnegie Mellon Univ., Pittsburgh, PA (United States); Li, Lei [Carnegie Mellon Univ., Pittsburgh, PA (United States); Maruhashi, Koji [Fujitsu Laboratories Ltd., Kanagawa (Japan); Prakash, B. Aditya [Carnegie Mellon Univ., Pittsburgh, PA (United States); Tong, H [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2010-02-08

    Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not appropriate for such data, especially in cases where streaming or near-real-time results are required. An example that has drawn significant research interest is the cyber-security domain, where internet communication traces are collected and real-time discovery of events, behaviors, patterns and anomalies is desired. We propose MetricForensics, a scalable framework for analysis of volatile graphs. MetricForensics combines a multi-level “drill down" approach, a collection of user-selected graph metrics and a collection of analysis techniques. At each successive level, more sophisticated metrics are computed and the graph is viewed at a finer temporal resolution. In this way, MetricForensics scales to highly volatile graphs by only allocating resources for computationally expensive analysis when an interesting event is discovered at a coarser resolution first. We test MetricForensics on three real-world graphs: an enterprise IP trace, a trace of legitimate and malicious network traffic from a research institution, and the MIT Reality Mining proximity sensor data. Our largest graph has »3M vertices and »32M edges, spanning 4:5 days. The results demonstrate the scalability and capability of MetricForensics in analyzing volatile graphs; and highlight four novel phenomena in such graphs: elbows, broken correlations, prolonged spikes, and strange stars.

  18. Factors Predicting Organizational Identification with Intercollegiate Forensics Teams

    Science.gov (United States)

    Croucher, Stephen M.; Long, Bridget L.; Meredith, Michael J.; Oommen, Deepa; Steele, Emily L.

    2009-01-01

    This study examines the relationship between intercollegiate forensics competitors' organizational identification and organizational culture. Through a survey analysis of 314 intercollegiate forensics students, this study reports three major findings. First, this study found male competitors identify with forensics programs more than female…

  19. Defense Forensic Enterprise: Assessment and Status Report Personnel Accounting Extract

    Science.gov (United States)

    2013-12-01

    pathology , forensic anthropology, forensic toxicology, and DNA analysis to iden- tify human remains. Per DOD Directive 5205.15E, the stakeholders fall...Defense Forensic Enterprise Assessment and Status Report Personnel Accounting Extract Christine A. Hughes • Jeffrey E. Chilton John J. Clifford • C...community-related sections from a CNA report titled, “Defense Forensic Enterprise Assessment and Status Report” [1]. The first sec- tion within this

  20. Investigating biofuels through network analysis

    International Nuclear Information System (INIS)

    Curci, Ylenia; Mongeau Ospina, Christian A.

    2016-01-01

    Biofuel policies are motivated by a plethora of political concerns related to energy security, environmental damages, and support of the agricultural sector. In response to this, much scientific work has chiefly focussed on analysing the biofuel domain and on giving policy advice and recommendations. Although innovation has been acknowledged as one of the key factors in sustainable and cost-effective biofuel development, there is an urgent need to investigate technological trajectories in the biofuel sector by starting from consistent data and appropriate methodological tools. To do so, this work proposes a procedure to select patent data unequivocally related to the investigated sector, it uses co-occurrence of technological terms to compute patent similarity and highlights content and interdependencies of biofuels technological trajectories by revealing hidden topics from unstructured patent text fields. The analysis suggests that there is a breaking trend towards modern generation biofuels and that innovators seem to focus increasingly on the ability of alternative energy sources to adapt to the transport/industrial sector. - Highlights: • Innovative effort is devoted to biofuels additives and modern biofuels technologies. • A breaking trend can be observed from the second half of the last decade. • A patent network is identified via text mining techniques that extract latent topics.

  1. Development of a clinical forensic medicine curriculum for emergency physicians in the USA.

    Science.gov (United States)

    Smock, W S

    1994-06-01

    To address the forensic needs of living patients, the Department of Emergency Medicine at the University of Louisville School of Medicine in Louisville, Kentucky, USA initiated the first clinical forensic medicine training programme in the USA. In July 1991, formal training in clinical forensic medicine was incorporated into the core curriculum of the USA's second oldest academic emergency medicine training programme. The University of Louisville, in cooperation with the Kentucky Medical Examiner's Office, developed the curriculum to provide the emergency physician with the knowledge base and technical skills to perform forensic evaluations of living patients. Forensic lectures are given monthly by local and regional forensic experts including: forensic pathologists, prosecuting attorneys, firearm and ballistics examiners, law enforcement officers, forensic chemists and forensic odontologists. Topics which are presented include: forensic pathology, forensic photography, ballistics and firearms analysis, paediatric physical and sexual assault, crime scene investigation, forensic odontology, courtroom and expert testimony and the forensic evaluation of penetrating trauma. As a result of the introduction of clinical forensic medicine into the core curriculum of an emergency medicine training programme the residents are now actively addressing the forensic issues encountered in the Emergency department. Key, often short-lived forensic evidence, which was frequently overlooked or discarded while delivering patient care is now recognized, documented and preserved. The development and introduction of a clinical forensic medicine curriculum into emergency medicine training has greatly enhanced the emergency physician's ability to recognize, document and address the forensic needs of their patients who are victims of violent and non-fatal trauma.

  2. [Forensic Analysis of 498 Road Traffic Accident Deaths in Haikou City].

    Science.gov (United States)

    Bai, R; Chen, M

    2017-12-01

    To analyse the characteristics of road traffic accident deaths in Haikou city, and to provide reference for the identification of causes of death and the preventive measures. Totally 498 road traffic accident deaths accepted by the Traffic Police Branch of Haikou City Public Security Bureau in 2014-2016 were collected, and the related parameters such as sex, age, time of the accidents, travel mode of the victims, the types of vehicle and the cause of death were analysed. Most victims aged 21-40 years old with the sex ratio of 3:1, and the accidents mainly happened in March, April, May and October and peaked at 6:01-8:00 and 20:01-22:00 per day. Riding motorbike and electric bicycle, as travel modes, had the highest accident incidence (30.9%). The vast majority of involved vehicles were motorbike and electric bicycle (57.4%). The most common cause of death was craniocerebral injury, followed by chest and abdominal injury. The autopsy of road traffic accident deaths plays an important role in identification of death manner and responsibility confirmation. Copyright© by the Editorial Department of Journal of Forensic Medicine

  3. [Forensic Analysis of the Characteristics of Pelvic Fracture in 65 Road Traffic Accident Death Cases].

    Science.gov (United States)

    Zhang, W

    2016-12-01

    To analyze the characteristics and mechanisms of pelvic fractures in the cases of road traffic accident deaths. Total 65 cases of road traffic accident deaths with pelvic fracture were collected, and the sites, characteristics and injury mechanisms of pelvic fracture were statistically analyzed. Among the 65 cases of pelvic fracture, 38 cases of dislocation of sacroiliac joint were found, and most combined with pubis symphysis separation or fracture of pubis. In the fractures of pubis, ischium and acetabulum, linear fractures were most common, while comminuted fractures were most common in sacrum and coccyx fractures. There were 54 cases combined with pelvic soft tissue injury, and 8 cases with pelvic organ injury and 44 cases with abdominal organ injury. In the types of pelvic ring injury, 32 cases were separation, 49.32%, followed by compression, 26.15% and only one case was verticality, 1.54%. Detailed and comprehensive examination of the body and determination of the pelvic fracture type contribute to analyze the mechanisms of injury. Copyright© by the Editorial Department of Journal of Forensic Medicine

  4. A fatal forensic intoxication with fenarimol: analysis by HPLC/DAD/MSD.

    Science.gov (United States)

    Proença, P; Pinho Marques, E; Teixeira, H; Castanheira, F; Barroso, M; Avila, S; Vieira, D N

    2003-04-23

    Fenarimol (Rubigan) is a pyrimidine ergosterol biosynthesis inhibitor used as a systemic fungicide. The authors present a fatal fenarimol intoxication case analysed in the Forensic Toxicology Service of the National Institute of Legal Medicine. The results were used to compare two different HPLC techniques, regarding selectivity and sensitivity: an HPLC system with a diode array detector (DAD) and an HPLC system with a DAD and a mass spectrometry detector (MSD) with an electrospray interface. All biological samples were submitted to a solid-phase extraction procedure. The detection and quantification limits of fenarimol, linearity, precision and accuracy were evaluated. The fenarimol concentration levels determined were of 89.0 mg/ml in gastric contents, 1.9 mg/g in liver and 0.4 mg/g in kidney. Blood was not available at autopsy. No published data related to fenarimol self-poisoning were found, so it was not possible to interpret the results obtained by comparison with toxic/lethal levels.

  5. A survey of extraction solvents in the forensic analysis of textile dyes.

    Science.gov (United States)

    Groves, Ethan; Palenik, Christopher S; Palenik, Skip

    2016-11-01

    The characterization and identification of dyes in fibers can be used to provide investigative leads and strengthen associations between known and questioned items of evidence. The isolation of a dye from its matrix (e.g., a textile fiber) permits detailed characterization, comparison and, in some cases, identification using methods such as thin layer chromatography in conjunction with infrared and Raman spectroscopy. A survey of dye extraction publications reveals that pyridine:water (4:3) is among the most commonly cited extraction solvent across a range of fiber and dye chemistries. Here, the efficacy of this solvent system has been evaluated for the extraction of dyes from 172 commercially prevalent North American textile dyes. The evaluated population represents seven dye application classes, 18 chemical classes, and spans nine types of commercial textile fibers. The results of this survey indicate that ∼82% of the dyestuffs studied are extractable using this solvent system. The results presented here summarize the extraction efficacy by class and fiber type and illustrate that this solvent system is applicable to a wider variety of classes and fibers than previously indicated in the literature. While there is no universal solvent for fiber extraction, these results demonstrate that pyridine:water represents an excellent first step for extracting unknown dyes from questioned fibers in forensic casework. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  6. Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

    Directory of Open Access Journals (Sweden)

    Toqeer Mahmood

    2016-01-01

    Full Text Available Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.

  7. The interpretation of forensic biochemical expert test made in human body fluids: scientific - legal analysis in the research on sexual offenses

    International Nuclear Information System (INIS)

    Chaves Carballo, Diana

    2014-01-01

    The contributions of science and technology have covered the whole of human life, and relationships of coexistence are even found in the various disciplines of knowledge through legal forensics. Therefore, it is increasingly imperative that the law enforcement agents are interdisciplinary professionals, with knowledge beyond the legal knowledge to enable them make the most of the scientific knowledge in judicial proceedings. Among the natural sciences applied to right, forensic biochemistry has contributed an extremely relevant test for the investigation of various sexual offenses, much has been so, that the Organismo de Investigacion Judicial of Costa Rica has in its Departamento de Laboratorios de Ciencias Forenses with specialized sections in this discipline. A diversity of skills are performed of presumptive and confirmatory character for the presence of biological fluids, sexually transmitted diseases and identification of DNA by genetic markers. Updated information is given with respect to the correct interpretation of forensic biochemical expertises achievable for identification of semen, blood and human saliva in the investigation of sexual offenses. A scientific and legal language is used allowing the most of this information in the criminal process. The main objective has been to interpret, legal and scientifically, forensic biochemical expert evidence performed in human body fluids during the investigation of sexual offenses. A legal, doctrinal and scientific review is presented with compilation of related jurisprudence and criminology reports analysis of Seccion de Bioquimica of the Departamento de Laboratorios Forenses of the Organismo de Investigacion Juridica issued during the investigation of sexual offenses. Two types of attainable skills have existed for the identification of biological fluids, each with a different binding. In addition, it has been clear, due to the lexicon employed when making a forensic biochemist opinion, that to make a proper

  8. Nuclear Forensics International Technical Working Group (ITWG): a collaboration of scientists, law enforcement officials, and regulators working to combat nuclear terrorism and proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Schwantes, Jon M.

    2013-10-25

    Founded in 1996 upon the initiative of the “Group of 8” governments (G8), the Nuclear Forensics International Technical Working Group (ITWG) is an ad hoc organization of official Nuclear Forensics practitioners (scientists, law enforcement, and regulators) that can be called upon to provide technical assistance to the global community in the event of a seizure of nuclear or radiological materials. The ITWG is supported by and is affiliated with nearly 40 countries and international partner organizations including the International Atomic Energy Agency (IAEA), EURATOM, INTERPOL, EUROPOL, and the United Nations Interregional Crime and Justice Research Institute (UNICRI) (Figure 1). Besides providing a network of nuclear forensics laboratories that are able to assist the global community during a nuclear smuggling event, the ITWG is also committed to the advancement of the science of nuclear forensic analysis, largely through participation in periodic table top and Collaborative Materials Exercises (CMXs). Exercise scenarios use “real world” samples with realistic forensics investigation time constraints and reporting requirements. These exercises are designed to promote best practices in the field and test, evaluate, and improve new technical capabilities, methods and techniques in order to advance the science of nuclear forensics. Past efforts to advance nuclear forensic science have also included scenarios that asked laboratories to adapt conventional forensics methods (e.g. DNA, fingerprints, tool marks, and document comparisons) for collecting and preserving evidence comingled with radioactive materials.

  9. Expanding forensic science through forensic intelligence.

    Science.gov (United States)

    Ribaux, Olivier; Talbot Wright, Benjamin

    2014-12-01

    Research and Development ('R&D') in forensic science currently focuses on innovative technologies improving the efficiency of existing forensic processes, from the detection of marks and traces at the scene, to their presentation in Court. R&D approached from this perspective provides no response to doubts raised by recent criminological studies, which question the effective contribution of forensic science to crime reduction, and to policing in general. Traces (i.e. forensic case data), as remnants of criminal activity are collected and used in various forms of crime monitoring and investigation. The aforementioned doubts therefore need to be addressed by expressing how information is conveyed by traces in these processes. Modelling from this standpoint expands the scope of forensic science and provides new R&D opportunities. Twelve propositions for R&D are stated in order to pave the way. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  10. Practical mobile forensics

    CERN Document Server

    Bommisetty, Satish; Mahalik, Heather

    2014-01-01

    The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re

  11. Weighted Complex Network Analysis of Pakistan Highways

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2013-01-01

    Full Text Available The structure and properties of public transportation networks have great implications in urban planning, public policies, and infectious disease control. This study contributes a weighted complex network analysis of travel routes on the national highway network of Pakistan. The network is responsible for handling 75 percent of the road traffic yet is largely inadequate, poor, and unreliable. The highway network displays small world properties and is assortative in nature. Based on the betweenness centrality of the nodes, the most important cities are identified as this could help in identifying the potential congestion points in the network. Keeping in view the strategic location of Pakistan, such a study is of practical importance and could provide opportunities for policy makers to improve the performance of the highway network.

  12. Noise Analysis studies with neural networks

    International Nuclear Information System (INIS)

    Seker, S.; Ciftcioglu, O.

    1996-01-01

    Noise analysis studies with neural network are aimed. Stochastic signals at the input of the network are used to obtain an algorithmic multivariate stochastic signal modeling. To this end, lattice modeling of a stochastic signal is performed to obtain backward residual noise sources which are uncorrelated among themselves. There are applied together with an additional input to the network to obtain an algorithmic model which is used for signal detection for early failure in plant monitoring. The additional input provides the information to the network to minimize the difference between the signal and the network's one-step-ahead prediction. A stochastic algorithm is used for training where the errors reflecting the measurement error during the training are also modelled so that fast and consistent convergence of network's weights is obtained. The lattice structure coupled to neural network investigated with measured signals from an actual power plant. (authors)

  13. Construction of a forensic soil database of the Hokkaido region in Japan by synchrotron radiation X-ray analysis

    International Nuclear Information System (INIS)

    Shirota, Yusuke; Hirao, Masataka; Abe, Yoshinari; Nakai, Izumi; Osaka, Keiichi; Itou, Masayoshi

    2017-01-01

    The purpose of the present study is to construct a nation-wide forensic soil database, which allows for the identification of soil evidence based on heavy element and heavy mineral signatures determined by two synchrotron radiation (SR) X-ray techniques, i.e., a high-energy synchrotron radiation X-ray fluorescence analysis and a synchrotron-radiation X-ray powder diffraction analysis, respectively. The heavy element and heavy mineral compositions of the stream sediments collected at 3024 points located all over Japan were measured by the two SR X-ray techniques. The present paper focuses on a regional characterization of the sediments collected from the Hokkaido areas. The concentrations of heavy elements and heavy minerals in the Hokkaido areas were visualized as maps that enable us to compare the heavy element and heavy mineral compositions with the geological context of the samples. Based on a hierarchical cluster analysis using the semi-quantitative compositions of the heavy minerals, we could successfully classify the sediments into six groups corresponding to their background geologies. A Bonferroni multiple comparison demonstrated that these six groups also have significant differences in the heavy element composition. From these examinations, we could demonstrate that detailed regional identification of unknown samples is possible by analyzing both heavy element and heavy mineral compositions of each sample. (author)

  14. American Academy of Forensic Sciences

    Science.gov (United States)

    ... Programs Courses in Forensic Odontology Choosing a Career What is Forensic Science? What Do Forensic Scientists Do? What’s a Forensic Scientist? ... ve Decided You Want a Career in Forensic Science … Now What? Young Forensic Scientists Forum (YFSF) Annual Meeting Events ...

  15. Classification and Analysis of Computer Network Traffic

    OpenAIRE

    Bujlow, Tomasz

    2014-01-01

    Traffic monitoring and analysis can be done for multiple different reasons: to investigate the usage of network resources, assess the performance of network applications, adjust Quality of Service (QoS) policies in the network, log the traffic to comply with the law, or create realistic models of traffic for academic purposes. We define the objective of this thesis as finding a way to evaluate the performance of various applications in a high-speed Internet infrastructure. To satisfy the obje...

  16. Wireless Sensor Network Security Analysis

    OpenAIRE

    Hemanta Kumar Kalita; Avijit Kar

    2009-01-01

    The emergence of sensor networks as one of the dominant technology trends in the coming decades hasposed numerous unique challenges to researchers. These networks are likely to be composed of hundreds,and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, withoutaccess to renewable energy resources. Cost constraints and the need for ubiquitous, invisibledeployments will result in small sized, resource-constrained sensor nodes. While the set of challenges ...

  17. Forensic analysis of tertiary-butyl alcohol (TBA) detections in a hydrocarbon-rich groundwater basin.

    Science.gov (United States)

    Quast, Konrad W; Levine, Audrey D; Kester, Janet E; Fordham, Carolyn L

    2016-04-01

    Tertiary-butyl alcohol (TBA), a high-production volume (HPV) chemical, was sporadically detected in groundwater and coalbed methane (CBM) wells in southeastern Colorado's hydrocarbon-rich Raton Basin. TBA concentrations in shallow water wells averaged 75.1 μg/L, while detections in deeper CBM wells averaged 14.4 μg/L. The detection of TBA prompted a forensic investigation to try to identify potential sources. Historic and recent data were reviewed to determine if there was a discernable pattern of TBA occurrence. Supplemental samples from domestic water wells, monitor wells, CBM wells, surface waters, and hydraulic fracturing (HF) fluids were analyzed for TBA in conjunction with methyl tertiary-butyl ether (MTBE) and ethyl tertiary-butyl ether (ETBE), proxies for evidence of contamination from reformulated gasoline or associated oxygenates. Exploratory microbiological sampling was conducted to determine if methanotrophic organisms co-occurred with TBA in individual wells. Meaningful comparisons of historic TBA data were limited due to widely varying reporting limits. Mapping of TBA occurrence did not reveal any spatial patterns or physical associations with CBM operations or contamination plumes. Additionally, TBA was not detected in HF fluids or surface water samples. Given the widespread use of TBA in industrial and consumer products, including water well completion materials, it is likely that multiple diffuse sources exist. Exploratory data on stable isotopes, dissolved gases, and microbial profiling provide preliminary evidence that methanotrophic activity may be producing TBA from naturally occurring isobutane. Reported TBA concentrations were significantly below a conservative risk-based drinking water screening level of 8000 μg/L derived from animal toxicity data.

  18. Industrial entrepreneurial network: Structural and functional analysis

    Science.gov (United States)

    Medvedeva, M. A.; Davletbaev, R. H.; Berg, D. B.; Nazarova, J. J.; Parusheva, S. S.

    2016-12-01

    Structure and functioning of two model industrial entrepreneurial networks are investigated in the present paper. One of these networks is forming when implementing an integrated project and consists of eight agents, which interact with each other and external environment. The other one is obtained from the municipal economy and is based on the set of the 12 real business entities. Analysis of the networks is carried out on the basis of the matrix of mutual payments aggregated over the certain time period. The matrix is created by the methods of experimental economics. Social Network Analysis (SNA) methods and instruments were used in the present research. The set of basic structural characteristics was investigated: set of quantitative parameters such as density, diameter, clustering coefficient, different kinds of centrality, and etc. They were compared with the random Bernoulli graphs of the corresponding size and density. Discovered variations of random and entrepreneurial networks structure are explained by the peculiarities of agents functioning in production network. Separately, were identified the closed exchange circuits (cyclically closed contours of graph) forming an autopoietic (self-replicating) network pattern. The purpose of the functional analysis was to identify the contribution of the autopoietic network pattern in its gross product. It was found that the magnitude of this contribution is more than 20%. Such value allows using of the complementary currency in order to stimulate economic activity of network agents.

  19. 3rd International Conference on Network Analysis

    CERN Document Server

    Kalyagin, Valery; Pardalos, Panos

    2014-01-01

    This volume compiles the major results of conference participants from the "Third International Conference in Network Analysis" held at the Higher School of Economics, Nizhny Novgorod in May 2013, with the aim to initiate further joint research among different groups. The contributions in this book cover a broad range of topics relevant to the theory and practice of network analysis, including the reliability of complex networks, software, theory, methodology, and applications.  Network analysis has become a major research topic over the last several years. The broad range of applications that can be described and analyzed by means of a network has brought together researchers, practitioners from numerous fields such as operations research, computer science, transportation, energy, biomedicine, computational neuroscience and social sciences. In addition, new approaches and computer environments such as parallel computing, grid computing, cloud computing, and quantum computing have helped to solve large scale...

  20. Forensic seismology revisited

    Science.gov (United States)

    Douglas, A.

    2007-01-01

    the size of possible pP and sP. The relative-amplitude method is then used to search for orientations of the earthquake source that are compatible with the observations. If no such orientations are found the source must be shallow so that any surface reflections merge with direct P, and hence could be an explosion. The IMS when completed will be a global network of 321 monitoring stations, including 170 seismological stations principally to detect the seismic waves from earthquakes and underground explosions. The IMS will also have stations with hydrophones, microbarographs and radionuclide detectors to detect explosions in the oceans and the atmosphere and any isotopes in the air characteristic of a nuclear test. The Global Communications Infrastructure provides communications between the IMS stations and the International Data Centre (IDC), Vienna, where the recordings from the monitoring stations is collected, collated, and analysed. The IDC issues bulletins listing geophysical disturbances, to States Signatories to the CTBT. The assessment of the disturbances to decide whether any are possible explosions, is a task for State Signatories. For each Signatory to do a detailed analysis of all disturbances would be expensive and time consuming. Fortunately many disturbances can be readily identified as earthquakes and removed from consideration—a process referred to as “event screening”. For example, many earthquakes with epicentres over the oceans can be distinguished from underwater explosions, because an explosion signal is of much higher frequency than that of earthquakes that occur below the ocean bed. Further, many earthquakes could clearly be identified at the IDC on the m b : M s criterion, but there is a difficulty—how to set the decision line. The possibility has to be very small that an explosion will be classed by mistake, as an earthquake. The decision line has therefore to be set conservatively, consequently with routine application of current

  1. Automating the Coupling of ORIGEN with GADRAS via the Fallout Analysis Tool for National Technical Nuclear Forensics

    International Nuclear Information System (INIS)

    Monterial, Mateusz; Jodoin, Vincent J.; Lefebvre, Jordan P.; Peplow, Douglas E.; Hooper, David A.

    2012-01-01

    Nuclear forensic teams will be deployed to collect and evaluate fallout samples on the ground in the scenario of a low-yield nuclear detonation in a heavily populated area. Quick non-destructive methods of predicting the quality of the sample before it is analyzed in detail are essential for efficient post-event collections. In this work, the process of exporting Defense Land Fallout Interpretive Code (DELFIC) results into Gamma Detector Response and Analysis Software (GADRAS) has been automated within the Fallout Analysis Tool. This coupling allows for the simulation of detector responses to fallout samples with varying degrees of fractionation. The degree to which the samples are fractionated depends on the location of the samples in the fallout field. In the following study, this phenomenon is examined, as its understanding is important to the investigation of debris distribution. The simulated detector spectra from GADRAS can be used to compare peak ratios of volatile-refractory isotope pairs in order to determine the degree of fractionation. Simulated fractionated fallout samples from DELFIC for a 10 kt, pure 235U fission surface burst were modeled for distances ranging to 256 km out from ground zero, and for times up to 1 week from detonation. The fractionation ratios, also known as r values, from isotope concentrations, photon lines and peak areas of four volatile-refractory pairs were calculated and compared. Fractionation prediction via the peak areas method was evaluated for each pair by comparing the results with the simulated radionuclide inventory.

  2. Advanced forensic validation for human spermatozoa identification using SPERM HY-LITER™ Express with quantitative image analysis.

    Science.gov (United States)

    Takamura, Ayari; Watanabe, Ken; Akutsu, Tomoko

    2017-07-01

    Identification of human semen is indispensable for the investigation of sexual assaults. Fluorescence staining methods using commercial kits, such as the series of SPERM HY-LITER™ kits, have been useful to detect human sperm via strong fluorescence. These kits have been examined from various forensic aspects. However, because of a lack of evaluation methods, these studies did not provide objective, or quantitative, descriptions of the results nor clear criteria for the decisions reached. In addition, the variety of validations was considerably limited. In this study, we conducted more advanced validations of SPERM HY-LITER™ Express using our established image analysis method. Use of this method enabled objective and specific identification of fluorescent sperm's spots and quantitative comparisons of the sperm detection performance under complex experimental conditions. For body fluid mixtures, we examined interference with the fluorescence staining from other body fluid components. Effects of sample decomposition were simulated in high humidity and high temperature conditions. Semen with quite low sperm concentrations, such as azoospermia and oligospermia samples, represented the most challenging cases in application of the kit. Finally, the tolerance of the kit against various acidic and basic environments was analyzed. The validations herein provide useful information for the practical applications of the SPERM HY-LITER™ Express kit, which were previously unobtainable. Moreover, the versatility of our image analysis method toward various complex cases was demonstrated.

  3. Multivariate methods for the analysis of complex and big data in forensic sciences. Application to age estimation in living persons.

    Science.gov (United States)

    Lefèvre, Thomas; Chariot, Patrick; Chauvin, Pierre

    2016-09-01

    Researchers handle increasingly higher dimensional datasets, with many variables to explore. Such datasets pose several problems, since they are difficult to handle and present unexpected features. As dimensionality increases, classical statistical analysis becomes inoperative. Variables can present redundancy, and the reduction of dataset dimensionality to its lowest possible value is often needed. Principal components analysis (PCA) has proven useful to reduce dimensionality but present several shortcomings. As others, forensic sciences will face the issues specific related to an evergrowing quantity of data to be integrated. Age estimation in living persons, an unsolved problem so far, could benefit from the integration of various sources of data, e.g., clinical, dental and radiological data. We present here novel multivariate techniques (nonlinear dimensionality reduction techniques, NLDR), applied to a theoretical example. Results were compared to those of PCA. NLDR techniques were then applied to clinical, dental and radiological data (13 variables) used for age estimation. The correlation dimension of these data was estimated. NLDR techniques outperformed PCA results. They showed that two living persons sharing similar characteristics may present rather different estimated ages. Moreover, data presented a very high informational redundancy, i.e., a correlation dimension of 2. NLDR techniques should be used with or preferred to PCA techniques to analyze complex and big data. Data routinely used for age estimation may not be considered suitable for this purpose. How integrating other data or approaches could improve age estimation in living persons is still uncertain. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  4. Status of nuclear forensic support in Sudan

    International Nuclear Information System (INIS)

    Mokhtar, Mohammedelmoez Eltayeb Abderahman

    2015-08-01

    The central problem investigated in this thesis is nuclear forensic support in Sudan, the thesis comprises five chapters, began with an introduction containing the art of forensic science, stated the importance of the it in criminal investigations. The forensic science was defined, and stated the principle of which it underlying, including: principle of individuality and principle of exchange, the divisions of this science has been clarified, then it discussed the crime scene and the collecting of evidence, where starting the forensic science at the crime scene, with clarifying the principle of crime scene investigation. Nuclear and other radioactive material was discussed: defining a radioactivity with the material source. It placed into 3 general categories: special nuclear materials, reactor fuel, and commercial radioactive sources, and mention each category and it characteristics. Radiation is part of our environment was clarified, and discussed what the effect on organisms and populations are. Nuclear forensics was presented,and how problem of the safeguarding of the nuclear material beginning. The emerging nature of the problem was discussed, the radiological crime scene management was explained, importance of securing the scene with an examples of equipment and instruments for on-scene radiation safety assessment and how the collection of evidence, storage forensic laboratory analysis was discussed and how set the designated nuclear forensic laboratory, also nuclear forensic interpretation, and the chain of custody was mentioned. The role of Regulating Authority in Nuclear forensic support was discussed, specifically in Sudan, International Cooperation have also been reminded, as well as memorandum of understanding was mentioned between SNRRA and the administration of forensic evidence, and one of it results is the radiological surveys unit in forensic administration, how the unit is configured, the role of the unit, finally conclusion of research was

  5. Custom Ontologies for Expanded Network Analysis

    Science.gov (United States)

    2006-12-01

    for Expanded Network Analysis. In Visualising Network Information (pp. 6-1 – 6-10). Meeting Proceedings RTO-MP-IST-063, Paper 6. Neuilly-sur-Seine...Even to this day, current research groups are working to develop an approach that involves taking all available text, video, imagery and audio and

  6. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  7. Consistency analysis of network traffic repositories

    NARCIS (Netherlands)

    Lastdrager, Elmer; Lastdrager, E.E.H.; Pras, Aiko

    Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has been flowing over the network; little thoughts are made regarding the consistency of these repositories. Still, for

  8. Integrating Forensic Science.

    Science.gov (United States)

    Funkhouser, John; Deslich, Barbara J.

    2000-01-01

    Explains the implementation of forensic science in an integrated curriculum and discusses the advantages of this approach. Lists the forensic science course syllabi studied in three high schools. Discusses the unit on polymers in detail. (YDS)

  9. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  10. Learning Android forensics

    CERN Document Server

    Tamma, Rohit

    2015-01-01

    If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

  11. Boolean Factor Analysis by Attractor Neural Network

    Czech Academy of Sciences Publication Activity Database

    Frolov, A. A.; Húsek, Dušan; Muraviev, I. P.; Polyakov, P.Y.

    2007-01-01

    Roč. 18, č. 3 (2007), s. 698-707 ISSN 1045-9227 R&D Projects: GA AV ČR 1ET100300419; GA ČR GA201/05/0079 Institutional research plan: CEZ:AV0Z10300504 Keywords : recurrent neural network * Hopfield-like neural network * associative memory * unsupervised learning * neural network architecture * neural network application * statistics * Boolean factor analysis * dimensionality reduction * features clustering * concepts search * information retrieval Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 2.769, year: 2007

  12. Spectrum-Based and Collaborative Network Topology Analysis and Visualization

    Science.gov (United States)

    Hu, Xianlin

    2013-01-01

    Networks are of significant importance in many application domains, such as World Wide Web and social networks, which often embed rich topological information. Since network topology captures the organization of network nodes and links, studying network topology is very important to network analysis. In this dissertation, we study networks by…

  13. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  14. Complex Network Analysis of Guangzhou Metro

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2015-11-01

    Full Text Available The structure and properties of public transportation networks can provide suggestions for urban planning and public policies. This study contributes a complex network analysis of the Guangzhou metro. The metro network has 236 kilometers of track and is the 6th busiest metro system of the world. In this paper topological properties of the network are explored. We observed that the network displays small world properties and is assortative in nature. The network possesses a high average degree of 17.5 with a small diameter of 5. Furthermore, we also identified the most important metro stations based on betweenness and closeness centralities. These could help in identifying the probable congestion points in the metro system and provide policy makers with an opportunity to improve the performance of the metro system.

  15. Extending Stochastic Network Calculus to Loss Analysis

    Directory of Open Access Journals (Sweden)

    Chao Luo

    2013-01-01

    Full Text Available Loss is an important parameter of Quality of Service (QoS. Though stochastic network calculus is a very useful tool for performance evaluation of computer networks, existing studies on stochastic service guarantees mainly focused on the delay and backlog. Some efforts have been made to analyse loss by deterministic network calculus, but there are few results to extend stochastic network calculus for loss analysis. In this paper, we introduce a new parameter named loss factor into stochastic network calculus and then derive the loss bound through the existing arrival curve and service curve via this parameter. We then prove that our result is suitable for the networks with multiple input flows. Simulations show the impact of buffer size, arrival traffic, and service on the loss factor.

  16. Computer network environment planning and analysis

    Science.gov (United States)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  17. UMA/GAN network architecture analysis

    Science.gov (United States)

    Yang, Liang; Li, Wensheng; Deng, Chunjian; Lv, Yi

    2009-07-01

    This paper is to critically analyze the architecture of UMA which is one of Fix Mobile Convergence (FMC) solutions, and also included by the third generation partnership project(3GPP). In UMA/GAN network architecture, UMA Network Controller (UNC) is the key equipment which connects with cellular core network and mobile station (MS). UMA network could be easily integrated into the existing cellular networks without influencing mobile core network, and could provides high-quality mobile services with preferentially priced indoor voice and data usage. This helps to improve subscriber's experience. On the other hand, UMA/GAN architecture helps to integrate other radio technique into cellular network which includes WiFi, Bluetooth, and WiMax and so on. This offers the traditional mobile operators an opportunity to integrate WiMax technique into cellular network. In the end of this article, we also give an analysis of potential influence on the cellular core networks ,which is pulled by UMA network.

  18. Constructing an Intelligent Patent Network Analysis Method

    Directory of Open Access Journals (Sweden)

    Chao-Chan Wu

    2012-11-01

    Full Text Available Patent network analysis, an advanced method of patent analysis, is a useful tool for technology management. This method visually displays all the relationships among the patents and enables the analysts to intuitively comprehend the overview of a set of patents in the field of the technology being studied. Although patent network analysis possesses relative advantages different from traditional methods of patent analysis, it is subject to several crucial limitations. To overcome the drawbacks of the current method, this study proposes a novel patent analysis method, called the intelligent patent network analysis method, to make a visual network with great precision. Based on artificial intelligence techniques, the proposed method provides an automated procedure for searching patent documents, extracting patent keywords, and determining the weight of each patent keyword in order to generate a sophisticated visualization of the patent network. This study proposes a detailed procedure for generating an intelligent patent network that is helpful for improving the efficiency and quality of patent analysis. Furthermore, patents in the field of Carbon Nanotube Backlight Unit (CNT-BLU were analyzed to verify the utility of the proposed method.

  19. Techniques for Intelligence Analysis of Networks

    National Research Council Canada - National Science Library

    Cares, Jeffrey R

    2005-01-01

    ...) there are significant intelligence analysis manifestations of these properties; and (4) a more satisfying theory of Networked Competition than currently exists for NCW/NCO is emerging from this research...

  20. Interim Report on SNP analysis and forensic microarray probe design for South American hemorrhagic fever viruses, tick-borne encephalitis virus, henipaviruses, Old World Arenaviruses, filoviruses, Crimean-Congo hemorrhagic fever viruses, Rift Valley fever

    Energy Technology Data Exchange (ETDEWEB)

    Jaing, C; Gardner, S

    2012-06-05

    The goal of this project is to develop forensic genotyping assays for select agent viruses, enhancing the current capabilities for the viral bioforensics and law enforcement community. We used a multipronged approach combining bioinformatics analysis, PCR-enriched samples, microarrays and TaqMan assays to develop high resolution and cost effective genotyping methods for strain level forensic discrimination of viruses. We have leveraged substantial experience and efficiency gained through year 1 on software development, SNP discovery, TaqMan signature design and phylogenetic signature mapping to scale up the development of forensics signatures in year 2. In this report, we have summarized the whole genome wide SNP analysis and microarray probe design for forensics characterization of South American hemorrhagic fever viruses, tick-borne encephalitis viruses and henipaviruses, Old World Arenaviruses, filoviruses, Crimean-Congo hemorrhagic fever virus, Rift Valley fever virus and Japanese encephalitis virus.

  1. Mobile phone security and forensics a practical approach

    CERN Document Server

    Androulidakis, Iosif I

    2016-01-01

    This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

  2. The Digital Forensics and Security Challenge of QR Codes

    Directory of Open Access Journals (Sweden)

    Nik Thompson

    2013-06-01

    Full Text Available The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.

  3. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  4. Analysis of FOXO transcriptional networks

    NARCIS (Netherlands)

    van der Vos, K.E.

    2010-01-01

    The PI3K-PKB-FOXO signalling module plays a pivotal role in a wide variety of cellular processes, including proliferation, survival, differentiation and metabolism. Inappropriate activation of this network is frequently observed in human cancer and causes uncontrolled proliferation and survival. In

  5. Validity of Rorschach Inkblot scores for discriminating psychopaths from non-psychopaths in forensic populations: a meta-analysis.

    Science.gov (United States)

    Wood, James M; Lilienfeld, Scott O; Nezworski, M Teresa; Garb, Howard N; Allen, Keli Holloway; Wildermuth, Jessica L

    2010-06-01

    Gacono and Meloy (2009) have concluded that the Rorschach Inkblot Test is a sensitive instrument with which to discriminate psychopaths from nonpsychopaths. We examined the association of psychopathy with 37 Rorschach variables in a meta-analytic review of 173 validity coefficients derived from 22 studies comprising 780 forensic participants. All studies included the Hare Psychopathy Checklist or one of its versions (Hare, 1980, 1991, 2003) and Exner's (2003) Comprehensive System for the Rorschach. Mean validity coefficients of Rorschach variables in the meta-analysis ranged from -.113 to .239, with a median validity of .070 and a mean validity of .062. Psychopathy displayed a significant and medium-sized association with the number of Aggressive Potential responses (weighted mean validity coefficient = .232) and small but significant associations with the Sum of Texture responses, Cooperative Movement = 0, the number of Personal responses, and the Egocentricity Index (weighted mean validity coefficients = .097 to .159). The remaining 32 Rorschach variables were not significantly related to psychopathy. The present findings contradict the view that the Rorschach is a clinically sensitive instrument for discriminating psychopaths from nonpsychopaths.

  6. Isolating Sperm from Cell Mixtures Using Magnetic Beads Coupled with an Anti-PH-20 Antibody for Forensic DNA Analysis.

    Directory of Open Access Journals (Sweden)

    Xing-Chun Zhao

    Full Text Available Vaginal swabs taken in rape cases usually contain epithelial cells from the victim and sperm from the assailant and forensic DNA analysis requires separation of sperm from these cell mixtures. PH-20, which is a glycosylphosphatidylinositol-anchored hyaluronidase located on the head of sperm, has important functions in fertilization. Here we describe a newly developed method for sperm isolation using anti-PH-20 antibody-coupled immunomagnetic beads (anti-PH-20 IMBs. Optical microscopy and scanning electron microscopy showed the IMBs recognized the head of sperm specifically and exhibited a great capacity to capture sperm cells. However, we found it necessary to incubate the IMB-sperm complex with DNase I before sperm lysis in order to remove any female DNA completely. We compared the sensitivity of anti-PH-20 IMBs in sperm and epithelial cell discrimination to those coated with a different anti-sperm antibody (anti-SP-10, anti-ADAM2 or anti-JLP. Only the anti-PH-20 IMBs succeeded in isolating sperm from cell mixtures at a sperm/epithelial cell ratio of 103:105. Further, our method exhibited greater power and better stability for sperm isolation compared to the traditional differential lysis strategy. Taken together, the anti-PH-20 IMB method described here could be effective for the isolation of sperm needed to obtain a single-sourced DNA profile as an aid to identifying the perpetrator in sexual assault cases.

  7. The potentials and limitations of using neutron activation analysis data on human hair as a forensic evidence

    International Nuclear Information System (INIS)

    Pillay, K.K.S.; Kuis, R.L.

    1978-01-01

    A survey of hair samples from a group of 300 vounteers, involving nearly 12 000 elemental analyses, indicates that while neutron-activation-analysis data have distinct potentials to develop useful forensic evidence, there are several limitations to its routine applications. The multi-elemental analyses of hair-wash samples were done using multiple neutron irradiation and high resolution gamma ray spectrometry. All neutron irradiations were performed in the Penn State TRIGA Reactor at a thermal neutron flux of approximately 10 13 nxcm -2 xs -1 . The gamma-ray spectrometric measurements utilized a 40 cm 3 high resolution Ge(Li) detector. This detector, in association with a software oriented programmable multichannel analyzer with a 12 K core size, was used for gamma ray spectrometric measurements. The data were recorded on computer-compatible magnetic tape. The quantitative measurements of only 22 elements were reported from both the hair samples and the ''hair-wash''. These elements are Ti, I, Br, Mn, Cu, V, Cl, Al, Na, Ca, Se, Hg, Cr, Au, Sb, Ag, Sc, Zn, Co, Fe, and La. In expressing the analytical results of ''hair-wash'' samples, the weight of hair from which the hair-wash originated was used to calculate the results in terms of the weight of hair. (T.G.)

  8. High Performance Proactive Digital Forensics

    International Nuclear Information System (INIS)

    Alharbi, Soltan; Traore, Issa; Moa, Belaid; Weber-Jahnke, Jens

    2012-01-01

    With the increase in the number of digital crimes and in their sophistication, High Performance Computing (HPC) is becoming a must in Digital Forensics (DF). According to the FBI annual report, the size of data processed during the 2010 fiscal year reached 3,086 TB (compared to 2,334 TB in 2009) and the number of agencies that requested Regional Computer Forensics Laboratory assistance increasing from 689 in 2009 to 722 in 2010. Since most investigation tools are both I/O and CPU bound, the next-generation DF tools are required to be distributed and offer HPC capabilities. The need for HPC is even more evident in investigating crimes on clouds or when proactive DF analysis and on-site investigation, requiring semi-real time processing, are performed. Although overcoming the performance challenge is a major goal in DF, as far as we know, there is almost no research on HPC-DF except for few papers. As such, in this work, we extend our work on the need of a proactive system and present a high performance automated proactive digital forensic system. The most expensive phase of the system, namely proactive analysis and detection, uses a parallel extension of the iterative z algorithm. It also implements new parallel information-based outlier detection algorithms to proactively and forensically handle suspicious activities. To analyse a large number of targets and events and continuously do so (to capture the dynamics of the system), we rely on a multi-resolution approach to explore the digital forensic space. Data set from the Honeynet Forensic Challenge in 2001 is used to evaluate the system from DF and HPC perspectives.

  9. Forensic analysis of printing inks using tandem Laser Induced Breakdown Spectroscopy and Laser Ablation Inductively Coupled Plasma Mass Spectrometry

    Science.gov (United States)

    Subedi, Kiran; Trejos, Tatiana; Almirall, José

    2015-01-01

    Elemental analysis, using either LA-ICP-MS or LIBS, can be used for the chemical characterization of materials of forensic interest to discriminate between source materials originating from different sources and also for the association of materials known to originate from the same source. In this study, a tandem LIBS/LA-ICP-MS system that combines the benefits of both LIBS and LA-ICP-MS was evaluated for the characterization of samples of printing inks (toners, inkjets, intaglio and offset.). The performance of both laser sampling methods is presented. A subset of 9 black laser toners, 10 colored (CMYK) inkjet samples, 12 colored (CMYK) offset samples and 12 intaglio inks originating from different manufacturing sources were analyzed to evaluate the discrimination capability of the tandem method. These samples were selected because they presented a very similar elemental profile by LA-ICP-MS. Although typical discrimination between different ink sources is found to be > 99% for a variety of inks when only LA-ICP-MS was used for the analysis, additional discrimination was achieved by combining the elemental results from the LIBS analysis to the LA-ICP-MS analysis in the tandem technique, enhancing the overall discrimination capability of the individual laser ablation methods. The LIBS measurements of the Ca, Fe, K and Si signals, in particular, improved the discrimination for this specific set of different ink samples previously shown to exhibit very similar LA-ICP-MS elemental profiles. The combination of these two techniques in a single setup resulted in better discrimination of the printing inks with two distinct fingerprint spectra, providing information from atomic/ionic emissions and isotopic composition (m/z) for each ink sample.

  10. The application of chemometrics on Infrared and Raman spectra as a tool for the forensic analysis of paints.

    Science.gov (United States)

    Muehlethaler, Cyril; Massonnet, Genevieve; Esseiva, Pierre

    2011-06-15

    The aim of this work is to evaluate the capabilities and limitations of chemometric methods and other mathematical treatments applied on spectroscopic data and more specifically on paint samples. The uniqueness of the spectroscopic data comes from the fact that they are multivariate - a few thousands variables - and highly correlated. Statistical methods are used to study and discriminate samples. A collection of 34 red paint samples was measured by Infrared and Raman spectroscopy. Data pretreatment and variable selection demonstrated that the use of Standard Normal Variate (SNV), together with removal of the noisy variables by a selection of the wavelengths from 650 to 1830 cm(-1) and 2730-3600 cm(-1), provided the optimal results for infrared analysis. Principal component analysis (PCA) and hierarchical clusters analysis (HCA) were then used as exploratory techniques to provide evidence of structure in the data, cluster, or detect outliers. With the FTIR spectra, the Principal Components (PCs) correspond to binder types and the presence/absence of calcium carbonate. 83% of the total variance is explained by the four first PCs. As for the Raman spectra, we observe six different clusters corresponding to the different pigment compositions when plotting the first two PCs, which account for 37% and 20% respectively of the total variance. In conclusion, the use of chemometrics for the forensic analysis of paints provides a valuable tool for objective decision-making, a reduction of the possible classification errors, and a better efficiency, having robust results with time saving data treatments. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  11. Forensic Computing (Dagstuhl Seminar 13482)

    OpenAIRE

    Freiling, Felix C.; Hornung, Gerrit; Polcák, Radim

    2014-01-01

    Forensic computing} (sometimes also called digital forensics, computer forensics or IT forensics) is a branch of forensic science pertaining to digital evidence, i.e., any legal evidence that is processed by digital computer systems or stored on digital storage media. Forensic computing is a new discipline evolving within the intersection of several established research areas such as computer science, computer engineering and law. Forensic computing is rapidly gaining importance since the...

  12. Forensic trace DNA: A review

    NARCIS (Netherlands)

    R.A.H. van Oorschot (Roland ); K. Ballantyne (Kaye); R.J. Mitchell (R. John)

    2010-01-01

    textabstractDNA analysis is frequently used to acquire information from biological material to aid enquiries associated with criminal offences, disaster victim identification and missing persons investigations. As the relevance and value of DNA profiling to forensic investigations has increased, so

  13. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  14. 1st International Conference on Network Analysis

    CERN Document Server

    Kalyagin, Valery; Pardalos, Panos

    2013-01-01

    This volume contains a selection of contributions from the "First International Conference in Network Analysis," held at the University of Florida, Gainesville, on December 14-16, 2011. The remarkable diversity of fields that take advantage of Network Analysis makes the endeavor of gathering up-to-date material in a single compilation a useful, yet very difficult, task. The purpose of this volume is to overcome this difficulty by collecting the major results found by the participants and combining them in one easily accessible compilation. Network analysis has become a major research topic over the last several years. The broad range of applications that can be described and analyzed by means of a network is bringing together researchers, practitioners and other scientific communities from numerous fields such as Operations Research, Computer Science, Transportation, Energy, Social Sciences, and more. The contributions not only come from different fields, but also cover a broad range of topics relevant to the...

  15. Artificial neural networks for plasma spectroscopy analysis

    International Nuclear Information System (INIS)

    Morgan, W.L.; Larsen, J.T.; Goldstein, W.H.

    1992-01-01

    Artificial neural networks have been applied to a variety of signal processing and image recognition problems. Of the several common neural models the feed-forward, back-propagation network is well suited for the analysis of scientific laboratory data, which can be viewed as a pattern recognition problem. The authors present a discussion of the basic neural network concepts and illustrate its potential for analysis of experiments by applying it to the spectra of laser produced plasmas in order to obtain estimates of electron temperatures and densities. Although these are high temperature and density plasmas, the neural network technique may be of interest in the analysis of the low temperature and density plasmas characteristic of experiments and devices in gaseous electronics

  16. Visualization and Analysis of Complex Covert Networks

    DEFF Research Database (Denmark)

    Memon, Bisharat

    systems that are covert and hence inherently complex. My Ph.D. is positioned within the wider framework of CrimeFighter project. The framework envisions a number of key knowledge management processes that are involved in the workflow, and the toolbox provides supporting tools to assist human end......This report discusses and summarize the results of my work so far in relation to my Ph.D. project entitled "Visualization and Analysis of Complex Covert Networks". The focus of my research is primarily on development of methods and supporting tools for visualization and analysis of networked......-users (intelligence analysts) in harvesting, filtering, storing, managing, structuring, mining, analyzing, interpreting, and visualizing data about offensive networks. The methods and tools proposed and discussed in this work can also be applied to analysis of more generic complex networks....

  17. Historical Network Analysis of the Web

    DEFF Research Database (Denmark)

    Brügger, Niels

    2013-01-01

    This article discusses some of the fundamental methodological challenges related to doing historical network analyses of the web based on material in web archives. Since the late 1990s many countries have established extensive national web archives, and software supported network analysis...... of the online web has for a number of years gained currency within Internet studies. However, the combination of these two phenomena—historical network analysis of material in web archives—can at best be characterized as an emerging new area of study. Most of the methodological challenges within this new area...... revolve around the specific nature of archived web material. On the basis of an introduction to the processes involved in web archiving as well as of the characteristics of archived web material, the article outlines and scrutinizes some of the major challenges which may arise when doing network analysis...

  18. Application of statistical shape analysis for the estimation of bone and forensic age using the shapes of the 2nd, 3rd, and 4th cervical vertebrae in a young Japanese population.

    Science.gov (United States)

    Rhee, Chang-Hoon; Shin, Sang Min; Choi, Yong-Seok; Yamaguchi, Tetsutaro; Maki, Koutaro; Kim, Yong-Il; Kim, Seong-Sik; Park, Soo-Byung; Son, Woo-Sung

    2015-12-01

    From computed tomographic images, the dentocentral synchondrosis can be identified in the second cervical vertebra. This can demarcate the border between the odontoid process and the body of the 2nd cervical vertebra and serve as a good model for the prediction of bone and forensic age. Nevertheless, until now, there has been no application of the 2nd cervical vertebra based on the dentocentral synchondrosis. In this study, statistical shape analysis was used to build bone and forensic age estimation regression models. Following the principles of statistical shape analysis and principal components analysis, we used cone-beam computed tomography (CBCT) to evaluate a Japanese population (35 males and 45 females, from 5 to 19 years old). The narrowest prediction intervals among the multivariate regression models were 19.63 for bone age and 2.99 for forensic age. There was no significant difference between form space and shape space in the bone and forensic age estimation models. However, for gender comparison, the bone and forensic age estimation models for males had the higher explanatory power. This study derived an improved objective and quantitative method for bone and forensic age estimation based on only the 2nd, 3rd and 4th cervical vertebral shapes. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  19. The International Trade Network: weighted network analysis and modelling

    International Nuclear Information System (INIS)

    Bhattacharya, K; Mukherjee, G; Manna, S S; Saramäki, J; Kaski, K

    2008-01-01

    Tools of the theory of critical phenomena, namely the scaling analysis and universality, are argued to be applicable to large complex web-like network structures. Using a detailed analysis of the real data of the International Trade Network we argue that the scaled link weight distribution has an approximate log-normal distribution which remains robust over a period of 53 years. Another universal feature is observed in the power-law growth of the trade strength with gross domestic product, the exponent being similar for all countries. Using the 'rich-club' coefficient measure of the weighted networks it has been shown that the size of the rich-club controlling half of the world's trade is actually shrinking. While the gravity law is known to describe well the social interactions in the static networks of population migration, international trade, etc, here for the first time we studied a non-conservative dynamical model based on the gravity law which excellently reproduced many empirical features of the ITN

  20. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  1. Network Anomaly Detection Based on Wavelet Analysis

    Directory of Open Access Journals (Sweden)

    Ali A. Ghorbani

    2008-11-01

    Full Text Available Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  2. Network Anomaly Detection Based on Wavelet Analysis

    Science.gov (United States)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  3. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. The use of the Podotrack in forensic podiatry for collection and analysis of bare footprints using the Reel method of measurement.

    Science.gov (United States)

    Burrow, J Gordon

    2016-05-01

    This small-scale study examined the role that bare footprint collection and measurement processes have on the Reel method of measurement in forensic podiatry and its use in the Criminal Justice System. Previous research indicated that the Reel method was a valid and reliable measurement system for bare footprint analysis but various collection systems have been used to collect footprint data and both manual and digital measurement processes were utilized in forensic podiatry and other disciplines. This study contributes to the debate about collecting bare footprints; the techniques employed to quantify various Reel measurements and considered whether there was asymmetry between feet and footprints of the same person. An inductive, quantitative paradigm used the Podotrack gathering procedure for footprint collection and the subsequent dynamic footprints subjected to Adobe Photoshop techniques of calculating the Reel linear variables. Statistical analyses using paired-sample t tests were conducted to test hypotheses and compare data sets. Standard error of mean (SEM) showed variation between feet and the findings provide support for the Reel study and measurement method. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  5. Trimming of mammalian transcriptional networks using network component analysis

    Directory of Open Access Journals (Sweden)

    Liao James C

    2010-10-01

    Full Text Available Abstract Background Network Component Analysis (NCA has been used to deduce the activities of transcription factors (TFs from gene expression data and the TF-gene binding relationship. However, the TF-gene interaction varies in different environmental conditions and tissues, but such information is rarely available and cannot be predicted simply by motif analysis. Thus, it is beneficial to identify key TF-gene interactions under the experimental condition based on transcriptome data. Such information would be useful in identifying key regulatory pathways and gene markers of TFs in further studies. Results We developed an algorithm to trim network connectivity such that the important regulatory interactions between the TFs and the genes were retained and the regulatory signals were deduced. Theoretical studies demonstrated that the regulatory signals were accurately reconstructed even in the case where only three independent transcriptome datasets were available. At least 80% of the main target genes were correctly predicted in the extreme condition of high noise level and small number of datasets. Our algorithm was tested with transcriptome data taken from mice under rapamycin treatment. The initial network topology from the literature contains 70 TFs, 778 genes, and 1423 edges between the TFs and genes. Our method retained 1074 edges (i.e. 75% of the original edge number and identified 17 TFs as being significantly perturbed under the experimental condition. Twelve of these TFs are involved in MAPK signaling or myeloid leukemia pathways defined in the KEGG database, or are known to physically interact with each other. Additionally, four of these TFs, which are Hif1a, Cebpb, Nfkb1, and Atf1, are known targets of rapamycin. Furthermore, the trimmed network was able to predict Eno1 as an important target of Hif1a; this key interaction could not be detected without trimming the regulatory network. Conclusions The advantage of our new algorithm

  6. Nuclear forensics: Soil content

    International Nuclear Information System (INIS)

    Beebe, Merilyn Amy

    2015-01-01

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  7. Nuclear forensics: Soil content

    Energy Technology Data Exchange (ETDEWEB)

    Beebe, Merilyn Amy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-31

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  8. Forensic analysis of explosives using isotope ratio mass spectrometry (IRMS)--part 1: instrument validation of the DELTAplusXP IRMS for bulk nitrogen isotope ratio measurements.

    Science.gov (United States)

    Benson, Sarah J; Lennard, Christopher J; Hill, David M; Maynard, Philip; Roux, Claude

    2010-01-01

    A significant amount of research has been conducted into the use of stable isotopes to assist in determining the origin of various materials. The research conducted in the forensic field shows the potential of isotope ratio mass spectrometry (IRMS) to provide a level of discrimination not achievable utilizing traditional forensic techniques. Despite the research there have been few, if any, publications addressing the validation and measurement uncertainty of the technique for forensic applications. This study, the first in a planned series, presents validation data for the measurement of bulk nitrogen isotope ratios in ammonium nitrate (AN) using the DELTA(plus)XP (Thermo Finnigan) IRMS instrument equipped with a ConFlo III interface and FlashEA 1112 elemental analyzer (EA). Appropriate laboratory standards, analytical methods and correction calculations were developed and evaluated. A validation protocol was developed in line with the guidelines provided by the National Association of Testing Authorities, Australia (NATA). Performance characteristics including: accuracy, precision/repeatability, reproducibility/ruggedness, robustness, linear range, and measurement uncertainty were evaluated for the measurement of nitrogen isotope ratios in AN. AN (99.5%) and ammonium thiocyanate (99.99+%) were determined to be the most suitable laboratory standards and were calibrated against international standards (certified reference materials). All performance characteristics were within an acceptable range when potential uncertainties, including the manufacturer's uncertainty of the technique and standards, were taken into account. The experiments described in this article could be used as a model for validation of other instruments for similar purposes. Later studies in this series will address the more general issue of demonstrating that the IRMS technique is scientifically sound and fit-for-purpose in the forensic explosives analysis field.

  9. Applications of charged particle induced x-ray analysis to forensic and biological studies

    International Nuclear Information System (INIS)

    Barnes, B.K.; Beghian, L.E.; Kegel, G.H.R.; Mathur, S.C.; Mittler, A.; Quinn, P.W.

    1974-01-01

    X-ray emission analysis was applied to the analysis of firearm discharge residues on hands for trace elements. It was also applied to the determination of trace element concentrations in the blood of malaria-infected and healthy mice

  10. Thinking forensics: Cognitive science for forensic practitioners.

    Science.gov (United States)

    Edmond, Gary; Towler, Alice; Growns, Bethany; Ribeiro, Gianni; Found, Bryan; White, David; Ballantyne, Kaye; Searston, Rachel A; Thompson, Matthew B; Tangen, Jason M; Kemp, Richard I; Martire, Kristy

    2017-03-01

    Human factors and their implications for forensic science have attracted increasing levels of interest across criminal justice communities in recent years. Initial interest centred on cognitive biases, but has since expanded such that knowledge from psychology and cognitive science is slowly infiltrating forensic practices more broadly. This article highlights a series of important findings and insights of relevance to forensic practitioners. These include research on human perception, memory, context information, expertise, decision-making, communication, experience, verification, confidence, and feedback. The aim of this article is to sensitise forensic practitioners (and lawyers and judges) to a range of potentially significant issues, and encourage them to engage with research in these domains so that they may adapt procedures to improve performance, mitigate risks and reduce errors. Doing so will reduce the divide between forensic practitioners and research scientists as well as improve the value and utility of forensic science evidence. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  11. Evaluation of methods to improve the extraction and recovery of DNA from cotton swabs for forensic analysis.

    Science.gov (United States)

    Adamowicz, Michael S; Stasulli, Dominique M; Sobestanovich, Emily M; Bille, Todd W

    2014-01-01

    Samples for forensic DNA analysis are often collected from a wide variety of objects using cotton or nylon tipped swabs. Testing has shown that significant quantities of DNA are retained on the swab, however, and subsequently lost. When processing evidentiary samples, the recovery of the maximum amount of available DNA is critical, potentially dictating whether a usable profile can be derived from a piece of evidence or not. The QIAamp DNA Investigator extraction kit was used with its recommended protocol for swabs (one hour incubation at 56°C) as a baseline. Results indicate that over 50% of the recoverable DNA may be retained on the cotton swab tip, or otherwise lost, for both blood and buccal cell samples when using this protocol. The protocol's incubation time and temperature were altered, as was incubating while shaking or stationary to test for increases in recovery efficiency. An additional step was then tested that included periodic re-suspension of the swab tip in the extraction buffer during incubation. Aliquots of liquid blood or a buccal cell suspension were deposited and dried on cotton swabs and compared with swab-less controls. The concentration of DNA in each extract was quantified and STR analysis was performed to assess the quality of the extracted DNA. Stationary incubations and those performed at 65°C did not result in significant gains in DNA yield. Samples incubated for 24 hours yielded less DNA. Increased yields were observed with three and 18 hour incubation periods. Increases in DNA yields were also observed using a swab re-suspension method for both cell types. The swab re-suspension method yielded an average two-fold increase in recovered DNA yield with buccal cells and an average three-fold increase with blood cells. These findings demonstrate that more of the DNA collected on swabs can be recovered with specific protocol alterations.

  12. Evaluation of methods to improve the extraction and recovery of DNA from cotton swabs for forensic analysis.

    Directory of Open Access Journals (Sweden)

    Michael S Adamowicz

    Full Text Available Samples for forensic DNA analysis are often collected from a wide variety of objects using cotton or nylon tipped swabs. Testing has shown that significant quantities of DNA are retained on the swab, however, and subsequently lost. When processing evidentiary samples, the recovery of the maximum amount of available DNA is critical, potentially dictating whether a usable profile can be derived from a piece of evidence or not. The QIAamp DNA Investigator extraction kit was used with its recommended protocol for swabs (one hour incubation at 56°C as a baseline. Results indicate that over 50% of the recoverable DNA may be retained on the cotton swab tip, or otherwise lost, for both blood and buccal cell samples when using this protocol. The protocol's incubation time and temperature were altered, as was incubating while shaking or stationary to test for increases in recovery efficiency. An additional step was then tested that included periodic re-suspension of the swab tip in the extraction buffer during incubation. Aliquots of liquid blood or a buccal cell suspension were deposited and dried on cotton swabs and compared with swab-less controls. The concentration of DNA in each extract was quantified and STR analysis was performed to assess the quality of the extracted DNA. Stationary incubations and those performed at 65°C did not result in significant gains in DNA yield. Samples incubated for 24 hours yielded less DNA. Increased yields were observed with three and 18 hour incubation periods. Increases in DNA yields were also observed using a swab re-suspension method for both cell types. The swab re-suspension method yielded an average two-fold increase in recovered DNA yield with buccal cells and an average three-fold increase with blood cells. These findings demonstrate that more of the DNA collected on swabs can be recovered with specific protocol alterations.

  13. Social network analysis applied to team sports analysis

    CERN Document Server

    Clemente, Filipe Manuel; Mendes, Rui Sousa

    2016-01-01

    Explaining how graph theory and social network analysis can be applied to team sports analysis, This book presents useful approaches, models and methods that can be used to characterise the overall properties of team networks and identify the prominence of each team player. Exploring the different possible network metrics that can be utilised in sports analysis, their possible applications and variances from situation to situation, the respective chapters present an array of illustrative case studies. Identifying the general concepts of social network analysis and network centrality metrics, readers are shown how to generate a methodological protocol for data collection. As such, the book provides a valuable resource for students of the sport sciences, sports engineering, applied computation and the social sciences.

  14. Fast network centrality analysis using GPUs

    Directory of Open Access Journals (Sweden)

    Shi Zhiao

    2011-05-01

    Full Text Available Abstract Background With the exploding volume of data generated by continuously evolving high-throughput technologies, biological network analysis problems are growing larger in scale and craving for more computational power. General Purpose computation on Graphics Processing Units (GPGPU provides a cost-effective technology for the study of large-scale biological networks. Designing algorithms that maximize data parallelism is the key in leveraging the power of GPUs. Results We proposed an efficient data parallel formulation of the All-Pairs Shortest Path problem, which is the key component for shortest path-based centrality computation. A betweenness centrality algorithm built upon this formulation was developed and benchmarked against the most recent GPU-based algorithm. Speedup between 11 to 19% was observed in various simulated scale-free networks. We further designed three algorithms based on this core component to compute closeness centrality, eccentricity centrality and stress centrality. To make all these algorithms available to the research community, we developed a software package gpu-fan (GPU-based Fast Analysis of Networks for CUDA enabled GPUs. Speedup of 10-50× compared with CPU implementations was observed for simulated scale-free networks and real world biological networks. Conclusions gpu-fan provides a significant performance improvement for centrality computation in large-scale networks. Source code is available under the GNU Public License (GPL at http://bioinfo.vanderbilt.edu/gpu-fan/.

  15. Crawling Facebook for Social Network Analysis Purposes

    OpenAIRE

    Catanese, Salvatore A.; De Meo, Pasquale; Ferrara, Emilio; Fiumara, Giacomo; Provetti, Alessandro

    2011-01-01

    We describe our work in the collection and analysis of massive data describing the connections between participants to online social networks. Alternative approaches to social network data collection are defined and evaluated in practice, against the popular Facebook Web site. Thanks to our ad-hoc, privacy-compliant crawlers, two large samples, comprising millions of connections, have been collected; the data is anonymous and organized as an undirected graph. We describe a set of tools that w...

  16. Application of DNA-based methods in forensic entomology.

    Science.gov (United States)

    Wells, Jeffrey D; Stevens, Jamie R

    2008-01-01

    A forensic entomological investigation can benefit from a variety of widely practiced molecular genotyping methods. The most commonly used is DNA-based specimen identification. Other applications include the identification of insect gut contents and the characterization of the population genetic structure of a forensically important insect species. The proper application of these procedures demands that the analyst be technically expert. However, one must also be aware of the extensive list of standards and expectations that many legal systems have developed for forensic DNA analysis. We summarize the DNA techniques that are currently used in, or have been proposed for, forensic entomology and review established genetic analyses from other scientific fields that address questions similar to those in forensic entomology. We describe how accepted standards for forensic DNA practice and method validation are likely to apply to insect evidence used in a death or other forensic entomological investigation.

  17. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    such networking systems are modelled in the process calculus LySa. On top of this programming language based formalism an analysis is developed, which relies on techniques from data and control ow analysis. These are techniques that can be fully automated, which make them an ideal basis for tools targeted at non...

  18. Use of pattern recognition and neural networks for non-metric sex diagnosis from lateral shape of calvarium: an innovative model for computer-aided diagnosis in forensic and physical anthropology.

    Science.gov (United States)

    Cavalli, Fabio; Lusnig, Luca; Trentin, Edmondo

    2017-05-01

    Sex determination on skeletal remains is one of the most important diagnosis in forensic cases and in demographic studies on ancient populations. Our purpose is to realize an automatic operator-independent method to determine the sex from the bone shape and to test an intelligent, automatic pattern recognition system in an anthropological domain. Our multiple-classifier system is based exclusively on the morphological variants of a curve that represents the sagittal profile of the calvarium, modeled via artificial neural networks, and yields an accuracy higher than 80 %. The application of this system to other bone profiles is expected to further improve the sensibility of the methodology.

  19. Network Analysis in Community Psychology: Looking Back, Looking Forward

    OpenAIRE

    Neal, Zachary P.; Neal, Jennifer Watling

    2017-01-01

    Highlights Network analysis is ideally suited for community psychology research because it focuses on context. Use of network analysis in community psychology is growing. Network analysis in community psychology has employed some potentially problematic practices. Recommended practices are identified to improve network analysis in community psychology.

  20. Estimation of age in forensic medicine using multivariate approach to image analysis

    DEFF Research Database (Denmark)

    Kucheryavskiy, Sergey V.; Belyaev, Ivan; Fominykh, Sergey

    2009-01-01

    approach based on statistical analysis of grey-level co-occurrence matrix, fractal analysis, wavelet transformation and Angle Measure Technique. Projection on latent structures regression was chosen for calibration and prediction. The method has been applied to 70 male and 63 female individuals aged from...... 21 to 93 and results were compared with traditional approach. Some important questions and problems have been raised....

  1. Live forensic acquisition as alternative to traditional forensic processes

    CSIR Research Space (South Africa)

    Lessing, M

    2008-09-01

    Full Text Available The development of live forensic acquisition in general presents a remedy for some of the problems introduced by traditional forensic acquisition. However, this live forensic acquisition introduces a variety of additional problems, unique...

  2. Forensic analysis of printing inks using tandem Laser Induced Breakdown Spectroscopy and Laser Ablation Inductively Coupled Plasma Mass Spectrometry

    International Nuclear Information System (INIS)

    Subedi, Kiran; Trejos, Tatiana; Almirall, José

    2015-01-01

    Elemental analysis, using either LA-ICP-MS or LIBS, can be used for the chemical characterization of materials of forensic interest to discriminate between source materials originating from different sources and also for the association of materials known to originate from the same source. In this study, a tandem LIBS/LA-ICP-MS system that combines the benefits of both LIBS and LA-ICP-MS was evaluated for the characterization of samples of printing inks (toners, inkjets, intaglio and offset.). The performance of both laser sampling methods is presented. A subset of 9 black laser toners, 10 colored (CMYK) inkjet samples, 12 colored (CMYK) offset samples and 12 intaglio inks originating from different manufacturing sources were analyzed to evaluate the discrimination capability of the tandem method. These samples were selected because they presented a very similar elemental profile by LA-ICP-MS. Although typical discrimination between different ink sources is found to be > 99% for a variety of inks when only LA-ICP-MS was used for the analysis, additional discrimination was achieved by combining the elemental results from the LIBS analysis to the LA-ICP-MS analysis in the tandem technique, enhancing the overall discrimination capability of the individual laser ablation methods. The LIBS measurements of the Ca, Fe, K and Si signals, in particular, improved the discrimination for this specific set of different ink samples previously shown to exhibit very similar LA-ICP-MS elemental profiles. The combination of these two techniques in a single setup resulted in better discrimination of the printing inks with two distinct fingerprint spectra, providing information from atomic/ionic emissions and isotopic composition (m/z) for each ink sample. - Highlights: • The optimization of the parameters for LA-ICP-MS and LIBS in a tandem experiment are presented. • The analytical figures of merit for the tandem experiment for data collected simultaneously, are presented. • A

  3. Forensic analysis of printing inks using tandem Laser Induced Breakdown Spectroscopy and Laser Ablation Inductively Coupled Plasma Mass Spectrometry

    Energy Technology Data Exchange (ETDEWEB)

    Subedi, Kiran, E-mail: ksube001@fiu.edu; Trejos, Tatiana, E-mail: trejost@fiu.edu; Almirall, José, E-mail: almirall@fiu.edu

    2015-01-01

    Elemental analysis, using either LA-ICP-MS or LIBS, can be used for the chemical characterization of materials of forensic interest to discriminate between source materials originating from different sources and also for the association of materials known to originate from the same source. In this study, a tandem LIBS/LA-ICP-MS system that combines the benefits of both LIBS and LA-ICP-MS was evaluated for the characterization of samples of printing inks (toners, inkjets, intaglio and offset.). The performance of both laser sampling methods is presented. A subset of 9 black laser toners, 10 colored (CMYK) inkjet samples, 12 colored (CMYK) offset samples and 12 intaglio inks originating from different manufacturing sources were analyzed to evaluate the discrimination capability of the tandem method. These samples were selected because they presented a very similar elemental profile by LA-ICP-MS. Although typical discrimination between different ink sources is found to be > 99% for a variety of inks when only LA-ICP-MS was used for the analysis, additional discrimination was achieved by combining the elemental results from the LIBS analysis to the LA-ICP-MS analysis in the tandem technique, enhancing the overall discrimination capability of the individual laser ablation methods. The LIBS measurements of the Ca, Fe, K and Si signals, in particular, improved the discrimination for this specific set of different ink samples previously shown to exhibit very similar LA-ICP-MS elemental profiles. The combination of these two techniques in a single setup resulted in better discrimination of the printing inks with two distinct fingerprint spectra, providing information from atomic/ionic emissions and isotopic composition (m/z) for each ink sample. - Highlights: • The optimization of the parameters for LA-ICP-MS and LIBS in a tandem experiment are presented. • The analytical figures of merit for the tandem experiment for data collected simultaneously, are presented. • A

  4. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network

    Directory of Open Access Journals (Sweden)

    Kim Hyun

    2011-12-01

    Full Text Available Abstract Background Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. Results We herein introduce a framework for network modularization and Bayesian network analysis (FMB to investigate organism’s metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. Conclusions After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  5. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network.

    Science.gov (United States)

    Kim, Hyun Uk; Kim, Tae Yong; Lee, Sang Yup

    2011-01-01

    Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. We herein introduce a framework for network modularization and Bayesian network analysis (FMB) to investigate organism's metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  6. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  7. Validity of Rorschach Inkblot Scores for Discriminating Psychopaths from Nonpsychopaths in Forensic Populations: A Meta-Analysis

    Science.gov (United States)

    Wood, James M.; Lilienfeld, Scott O.; Nezworski, M. Teresa; Garb, Howard N.; Allen, Keli Holloway; Wildermuth, Jessica L.

    2010-01-01

    Gacono and Meloy (2009) have concluded that the Rorschach Inkblot Test is a sensitive instrument with which to discriminate psychopaths from nonpsychopaths. We examined the association of psychopathy with 37 Rorschach variables in a meta-analytic review of 173 validity coefficients derived from 22 studies comprising 780 forensic participants. All…

  8. Pilot-Reported Beta-Blockers Identified by Forensic Toxicology Analysis of Postmortem Specimens

    Science.gov (United States)

    2017-01-01

    This study compared beta-blockers reported by pilots with the medications found by postmortem toxicology analysis of specimens received from fatal aviation accidents between 1999 and 2015. Several studies have compared drugs using the standard approa...

  9. Social network analysis of study environment

    Directory of Open Access Journals (Sweden)

    Blaženka Divjak

    2010-06-01

    Full Text Available Student working environment influences student learning and achievement level. In this respect social aspects of students’ formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time, attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.

  10. NAPS: Network Analysis of Protein Structures

    Science.gov (United States)

    Chakrabarty, Broto; Parekh, Nita

    2016-01-01

    Traditionally, protein structures have been analysed by the secondary structure architecture and fold arrangement. An alternative approach that has shown promise is modelling proteins as a network of non-covalent interactions between amino acid residues. The network representation of proteins provide a systems approach to topological analysis of complex three-dimensional structures irrespective of secondary structure and fold type and provide insights into structure-function relationship. We have developed a web server for network based analysis of protein structures, NAPS, that facilitates quantitative and qualitative (visual) analysis of residue–residue interactions in: single chains, protein complex, modelled protein structures and trajectories (e.g. from molecular dynamics simulations). The user can specify atom type for network construction, distance range (in Å) and minimal amino acid separation along the sequence. NAPS provides users selection of node(s) and its neighbourhood based on centrality measures, physicochemical properties of amino acids or cluster of well-connected residues (k-cliques) for further analysis. Visual analysis of interacting domains and protein chains, and shortest path lengths between pair of residues are additional features that aid in functional analysis. NAPS support various analyses and visualization views for identifying functional residues, provide insight into mechanisms of protein folding, domain-domain and protein–protein interactions for understanding communication within and between proteins. URL:http://bioinf.iiit.ac.in/NAPS/. PMID:27151201

  11. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  12. Pioneer identification of fake tiger claws using morphometric and DNA-based analysis in wildlife forensics in India.

    Science.gov (United States)

    Vipin; Sharma, Vinita; Sharma, Chandra Prakash; Kumar, Ved Prakash; Goyal, Surendra Prakash

    2016-09-01

    The illegal trade in wildlife is a serious threat to the existence of wild animals throughout the world. The short supply and high demand for wildlife articles have caused an influx of many different forms of fake wildlife articles into this trade. The task of identifying the materials used in making such articles poses challenges in wildlife forensics as different approaches are required for species identification. Claws constitute 3.8% of the illegal animal parts (n=2899) received at the Wildlife Institute of India (WII) for species identification. We describe the identification of seized suspected tiger claws (n=18) using a combined approach of morphometric and DNA-based analysis. The differential keratin density, determined using X-ray radiographs, indicated that none of the 18 claws were of any large cat but were fake. We determined three claw measurements, viz. ac (from the external coronary dermo-epidermal interface to the epidermis of the skin fold connecting the palmar flanges of the coronary horn), bc (from the claw tip to the epidermis of the skin fold connecting the palmar flanges of the coronary horn) and the ratio bc/ac, for all the seized (n=18), tiger (n=23) and leopard (n=49) claws. Univariate and multivariate statistical analyses were performed using SPSS. A scatter plot generated using canonical discriminant function analysis revealed that of the 18 seized claws, 14 claws formed a cluster separate from the clusters of the tiger and leopard claws, whereas the remaining four claws were within the leopard cluster. Because a discrepancy was observed between the X-ray images and the measurements of these four claws, one of the claw that clustered with the leopard claws was chosen randomly and DNA analysis carried out using the cyt b (137bp) and 16S rRNA (410bp) genes. A BLAST search and comparison with the reference database at WII indicated that the keratin material of the claw was derived from Bos taurus (cattle). This is a pioneering discovery, and

  13. Aspects of Digital Forensics in South Africa

    Directory of Open Access Journals (Sweden)

    Jacques Ophoff

    2016-10-01

    Full Text Available This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.

  14. A statistical analysis of UK financial networks

    Science.gov (United States)

    Chu, J.; Nadarajah, S.

    2017-04-01

    In recent years, with a growing interest in big or large datasets, there has been a rise in the application of large graphs and networks to financial big data. Much of this research has focused on the construction and analysis of the network structure of stock markets, based on the relationships between stock prices. Motivated by Boginski et al. (2005), who studied the characteristics of a network structure of the US stock market, we construct network graphs of the UK stock market using same method. We fit four distributions to the degree density of the vertices from these graphs, the Pareto I, Fréchet, lognormal, and generalised Pareto distributions, and assess the goodness of fit. Our results show that the degree density of the complements of the market graphs, constructed using a negative threshold value close to zero, can be fitted well with the Fréchet and lognormal distributions.

  15. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  16. [Forensic entomology exemplified by a homicide. A combined stain and postmortem time analysis].

    Science.gov (United States)

    Benecke, M; Seifert, B

    1999-01-01

    The combined analysis of both ant and blow fly evidence recovered from a corpse, and from the boot of a suspect, suggested that an assumed scenario in a high profile murder case was likely to be true. The ants (Lasius fuliginous) were used as classical crime scene stains that linked the suspect to the scene. Blow fly maggots (Calliphora spec.) helped to determine the post mortem interval (PMI) with the calculated PMI overlapping with the assumed time of the killing. In the trial, the results of the medico-legal analysis of the insects was understood to be crucial scientific evidence, and the suspect was sentenced to 8 years in prison.

  17. The use of lead isotopic abundances in trace uranium samples for nuclear forensics analysis

    International Nuclear Information System (INIS)

    Fahey, A.J.; Ritchie, N.W.M.; Newbury, D.E.; Small, J.A.

    2010-01-01

    Secondary ion mass spectrometry (SIMS), secondary electron microscopy (SEM) and X-ray analysis have been applied to the measurement of U-bearing particles with the intent of gleaning information concerning their history and/or origin. The lead isotopic abundances are definitive indicators that U-bearing particles have come from an ore-body, even if they have undergone chemical processing. SEM images and X-ray analysis can add further information to the study that may allude to the extent of chemical processing. The presence of 'common' lead that does not exhibit a radiogenic signature is clear evidence of anthropogenic origin. (author)

  18. Plethora of Cyber Forensics

    OpenAIRE

    N.Sridhar; Dr.D.Lalitha Bhaskari; Dr.P.S.Avadhani

    2011-01-01

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper f...

  19. Network Analysis of Rodent Transcriptomes in Spaceflight

    Science.gov (United States)

    Ramachandran, Maya; Fogle, Homer; Costes, Sylvain

    2017-01-01

    Network analysis methods leverage prior knowledge of cellular systems and the statistical and conceptual relationships between analyte measurements to determine gene connectivity. Correlation and conditional metrics are used to infer a network topology and provide a systems-level context for cellular responses. Integration across multiple experimental conditions and omics domains can reveal the regulatory mechanisms that underlie gene expression. GeneLab has assembled rich multi-omic (transcriptomics, proteomics, epigenomics, and epitranscriptomics) datasets for multiple murine tissues from the Rodent Research 1 (RR-1) experiment. RR-1 assesses the impact of 37 days of spaceflight on gene expression across a variety of tissue types, such as adrenal glands, quadriceps, gastrocnemius, tibalius anterior, extensor digitorum longus, soleus, eye, and kidney. Network analysis is particularly useful for RR-1 -omics datasets because it reinforces subtle relationships that may be overlooked in isolated analyses and subdues confounding factors. Our objective is to use network analysis to determine potential target nodes for therapeutic intervention and identify similarities with existing disease models. Multiple network algorithms are used for a higher confidence consensus.

  20. Forensic and human-toxicological aspects of environmental analysis. Forensische und humantoxikologische Aspekte der Umweltanalytik

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    The volume comprises the 14 papers read at the meeting, as well as the laudations held at the Session in Honour of Jean Servais Stas and the official address at the 200th anniversary of Orfila. The scientific papers review the analysis and toxicology of environmental pollutants, with particular regard to metals and aromatic hydrocarbons. (MG)