WorldWideScience

Sample records for program digital forensics

  1. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness

    Directory of Open Access Journals (Sweden)

    Luciana Duranti

    2010-06-01

    Full Text Available This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability of an environment to collect credible digital evidence while minimizing the cost of an incident response (Tan, 2001.” The paper argues the need for such a program, describes its nature and content, and proposes ways of delivering it.

  2. On the Development of Digital Forensics Curriculum

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-09-01

    Full Text Available Computer Crime and computer related incidents continue their prevalence and frequency and result in loss of billions of dollars. To fight against those crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce to efficiently and effectively investigate crimes and frauds. However, there is no standard to guide the design of digital forensics curriculum for an academic program. In this research, we investigate the research works on digital forensics curriculum design and existing education programs.  Both digital forensics educators and practitioners were surveyed and the results are analyzed to determine what industry and law enforcement need. Based on the survey results and what the industry certificate programs cover, we identified topics that are desired to be covered in digital forensics courses. Finally, we propose six digital forensics courses and their topics that can be offered in both undergraduate and graduate digital forensics programs.

  3. Aspects of Digital Forensics in South Africa

    Directory of Open Access Journals (Sweden)

    Jacques Ophoff

    2016-10-01

    Full Text Available This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.

  4. Digital forensics and its application to forensic audit

    OpenAIRE

    Martinka, Jan

    2015-01-01

    This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a par...

  5. The Design of an Undergraduate Degree Program in Computer & Digital Forensics

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-09-01

    Full Text Available Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and on-campus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and current and planned initiatives.

  6. Digital Forensics to Intelligent Forensics

    Directory of Open Access Journals (Sweden)

    Alastair Irons

    2014-09-01

    Full Text Available In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.

  7. Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Stephen Larson

    2014-03-01

    Full Text Available Sammons, John. (2012. The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Waltham, MA: Syngress, 208 pages, Print Book ISBN: 9781597496612.eBook ISBN : 9781597496629. Print: US $29.95. eBook: US$20.97. Includes exercises, case studies, references, and index.Reviewed by Stephen Larson, PhD. Assistant Professor, Slippery Rock University of PAThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics is well-named–it really is very basic. And it should be, as the book’s intended audience includes entry-level digital forensics professionals and complimentary fields such as law enforcement, legal, and general information security. Though the copyright is 2012, some of the data is from 2009, and there is mention of estimates for 2010.(see PDF for full review

  8. The modeling of a digital forensic readiness approach to WLAN digital forensics

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available digital forensics is seen as not only a counterproposal but as a solution to the rapid increase of cyber crime in WLANs. The key issue impacting WLAN digital forensics is that, it is an enormous challenge to intercept and preserve all the communications...

  9. Digital forensic standards: international progress

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management has...

  10. Digital Forensics

    Science.gov (United States)

    Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott

    2017-01-01

    The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…

  11. Computational intelligence in digital forensics forensic investigation and applications

    CERN Document Server

    Choo, Yun-Huoy; Abraham, Ajith; Srihari, Sargur

    2014-01-01

    Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts.   This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement ...

  12. Toward a general ontology for digital forensic disciplines.

    Science.gov (United States)

    Karie, Nickson M; Venter, Hein S

    2014-09-01

    Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper. © 2014 American Academy of Forensic Sciences.

  13. Handbook of digital forensics of multimedia data and devices

    CERN Document Server

    Li, Shujun

    2015-01-01

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...

  14. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...

  15. Forensic aspects of digital evidence: contributions and initiatives by the National Center for Forensic Science

    Science.gov (United States)

    Whitcomb, Carrie M.

    2002-08-01

    Digital evidence is information of probative value that is either stored or transmitted in a digital form. Digital evidence can exist as words (text), sound (audio), or images (video or still pictures). Law enforcement and forensic scientists are faced with collecting and analyzing these new forms of evidence that previously existed on paper or on magnetic tapes. They must apply the law and science to the processes they use. Extrapolating the old processes into the new formats has been proceeding since the 1980's. Regardless of the output format, all digital evidence has a certain commonality. One would assume that the rules of evidence and the scientific approach would also have some common characteristics. Obviously, there is also a divergence due to the differences in outputs. It is time to approach the issues regarding digital evidence in a more deliberate, organized, and scientific manner. The program outlined by the NCFS would explore these various formats, their features common to traditional types of forensic evidence, and their divergent features and explore the scientific basis for handling of digital evidence. Our web site, www.ncfs.org, describes our programs.

  16. A Harmonized Process Model for Digital Forensic Investigation Readiness

    OpenAIRE

    Valjarevic , Aleksandar; Venter , Hein

    2013-01-01

    Part 2: FORENSIC MODELS; International audience; Digital forensic readiness enables an organization to prepare itself to perform digital forensic investigations in an efficient and effective manner. The benefits include enhancing the admissibility of digital evidence, better utilization of resources and greater incident awareness. However, a harmonized process model for digital forensic readiness does not currently exist and, thus, there is a lack of effective and standardized implementations...

  17. High Performance Proactive Digital Forensics

    International Nuclear Information System (INIS)

    Alharbi, Soltan; Traore, Issa; Moa, Belaid; Weber-Jahnke, Jens

    2012-01-01

    With the increase in the number of digital crimes and in their sophistication, High Performance Computing (HPC) is becoming a must in Digital Forensics (DF). According to the FBI annual report, the size of data processed during the 2010 fiscal year reached 3,086 TB (compared to 2,334 TB in 2009) and the number of agencies that requested Regional Computer Forensics Laboratory assistance increasing from 689 in 2009 to 722 in 2010. Since most investigation tools are both I/O and CPU bound, the next-generation DF tools are required to be distributed and offer HPC capabilities. The need for HPC is even more evident in investigating crimes on clouds or when proactive DF analysis and on-site investigation, requiring semi-real time processing, are performed. Although overcoming the performance challenge is a major goal in DF, as far as we know, there is almost no research on HPC-DF except for few papers. As such, in this work, we extend our work on the need of a proactive system and present a high performance automated proactive digital forensic system. The most expensive phase of the system, namely proactive analysis and detection, uses a parallel extension of the iterative z algorithm. It also implements new parallel information-based outlier detection algorithms to proactively and forensically handle suspicious activities. To analyse a large number of targets and events and continuously do so (to capture the dynamics of the system), we rely on a multi-resolution approach to explore the digital forensic space. Data set from the Honeynet Forensic Challenge in 2001 is used to evaluate the system from DF and HPC perspectives.

  18. Forensic aspects of digital evidence: contributions and initiatives by the National Center for Forensic Science (NCFS)

    Science.gov (United States)

    Whitcomb, Carrie M.

    2002-07-01

    Digital evidence is information of probative value that is either stored or transmitted in a digital form. Digital evidence can exist as words (text), sound (audio), or images (video or still pictures). Law enforcement and forensic scientists are faced with collecting and analyzing these new forms of evidence that previously existed on paper or on magnetic tapes. They must apply the law and science to the processes they use. Extrapolating the old processes into the new formats has been proceeding since the 1980's. Regardless of the output format, all digital evidence has a certain commonality. One would assume that the rules of evidence and the scientific approach would also have some common characteristics. Obviously, there is also a divergence due to the differences in outputs. It is time to approach the issues regarding digital evidence in a more deliberate, organized, and scientific manner. The program outlined by the NCFS would explore these various formats, the features common to traditional types of forensic evidence, and their divergent features and explore the scientific basis for handling of digital evidence. Our web site, www.ncfs.org, describes our programs.

  19. Scenario-Based Digital Forensics Challenges in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Erik Miranda Lopez

    2016-10-01

    Full Text Available The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing create new technical, legal and architectural challenges when conducting a forensic investigation. We propose a hypothetical scenario to uncover and explain the challenges forensic practitioners face during cloud investigations. Additionally, we also provide solutions to address the challenges. Our hypothetical case scenario has shown that, in the long run, better live forensic tools, development of new methods tailored for cloud investigations and new procedures and standards are indeed needed. Furthermore, we have come to the conclusion that forensic investigations biggest challenge is not technical but legal.

  20. Digital forensics for handheld devices

    CERN Document Server

    Doherty, Eamon P

    2012-01-01

    Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects o

  1. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  2. Systematic Digital Forensic Investigation Model

    OpenAIRE

    Systematic Digital Forensic Investigation Model

    2011-01-01

    Law practitioners are in an uninterrupted battle with criminals in the application of digital/computertechnologies, and require the development of a proper methodology to systematically searchdigital devices for significant evidence. Computer fraud and digital crimes are growing day by dayand unfortunately less than two percent of the reported cases result in confidence. This paperexplores the development of the digital forensics process model, compares digital forensicmethodologies, and fina...

  3. Column: The Consortium of Digital Forensics Specialists (CDFS

    Directory of Open Access Journals (Sweden)

    Christopher Kelley

    2011-09-01

    Full Text Available Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged.At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.(see PDF for full column

  4. Developing digital forensic governance

    CSIR Research Space (South Africa)

    Grobler, M

    2010-03-01

    Full Text Available This paper presents a Digital Forensic (DF) governance framework and its mapping on the SANS ISO/IEC 38500:2009 Corporate governance of information technology structure. DF governance assists organisations in guiding the management team...

  5. Science Column: Reconstruction: The Experimental Side of Digital Forensics

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2013-12-01

    Full Text Available Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.(see PDF for full column

  6. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  7. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  8. Advanced framework for digital forensic technologies and procedures.

    Science.gov (United States)

    Trček, Denis; Abie, Habtamu; Skomedal, Asmund; Starc, Iztok

    2010-11-01

    Recent trends in global networks are leading toward service-oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top-down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so-called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top-down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low-level details. As low-level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts

  9. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  10. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  11. Digital Forensic Investigation Models, an Evolution study

    Directory of Open Access Journals (Sweden)

    Khuram Mushtaque

    2015-10-01

    Full Text Available In business today, one of the most important segments that enable any business to get competitive advantage over others is appropriate, effective adaptation of Information Technology into business and then managing and governing it on their will. To govern IT organizations need to identify value of acquiring services of forensic firms to compete cyber criminals. Digital forensic firms follow different mechanisms to perform investigation. Time by time forensic firms are facilitated with different models for investigation containing phases for different purposes of the entire process. Along with forensic firms, enterprises also need to build a secure and supportive platform to make successful investigation process possible. We have underlined different elements of organizations in Pakistan; need to be addressed to provide support to forensic firms.

  12. Procedures for a harmonised digital forensic process in live forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-09-01

    Full Text Available Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid...

  13. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  14. Comparing the performance of three digital forensic tools

    Directory of Open Access Journals (Sweden)

    Brian Cusack

    Full Text Available Software used for digital forensic investigations requires to be verified against reliability and validity criteria. In this paper, three well known tools are tested against the mandatory features of digital forensic tools published by the National Institute of Standards (NIST. It was found that a variation in performance existed between the tools, with all having measureable areas of non performance. The findings have an impact on the professional use of the tools and illustrate the need for benchmarking and testing of the tools before use.

  15. Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.

    Science.gov (United States)

    Casey, Eoghan

    2017-12-28

    This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.

  16. A Comprehensive and Harmonized Digital Forensic Investigation Process Model.

    Science.gov (United States)

    Valjarevic, Aleksandar; Venter, Hein S

    2015-11-01

    Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and concepts applied. This paper proposes a comprehensive model that harmonizes existing models. An effort was made to incorporate all types of processes proposed by the existing models, including those aimed at achieving digital forensic readiness. The authors introduce a novel class of processes called concurrent processes. This is a novel contribution that should, together with the rest of the model, enable more efficient and effective DFI, while ensuring admissibility of digital evidence. Ultimately, the proposed model is intended to be used for different types of DFI and should lead to standardization. © 2015 American Academy of Forensic Sciences.

  17. A survey of contemporary enterprise storage technologies from a digital forensics perspective

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2011-09-01

    Full Text Available As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we discuss limitations of our study, and lastly, we suggest areas in which additional research would benefit the field of digital forensics.

  18. A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2013-03-01

    Full Text Available Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using forensic methodology.   Digital forensic methodology, being a scientific process, is derived from observations and repeatable findings in controlled environments. Furthermore, scientific research methods have established that causal conclusions can be drawn only when observed in controlled experiments. With this in mind, it seems beneficial that digital forensic examiners have a library of experiments from which they can perform, observe results, and derive conclusions. After having conducted an experiment on a specific topic, a digital forensic examiner will be in a better position to express with confidence the state of the current data and perhaps the conditions that led to its current state.   This study provides a simple experiment using the contemporary versions of the most widely used software applications running on the most commonly installed operation system. Here, using the Microsoft Office 2010 applications, a simple Word document, an Excel spreadsheet, a PowerPoint presentation, and an Access database are created and then modified. A forensic analysis is performed to determine the extent in which the changes to the data are identified. The value in this study is not that it yields new forensic analysis techniques, but rather that it illustrates a

  19. Guidelines for procedures of a harmonised digital forensic process in network forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-08-01

    Full Text Available Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can...

  20. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  1. Evaluating Digital Forensic Options for the Apple iPad

    OpenAIRE

    Hay , Andrew; Krill , Dennis; Kuhar , Benjamin; Peterson , Gilbert

    2011-01-01

    Part 5: ADVANCED FORENSIC TECHNIQUES; International audience; The iPod Touch, iPhone and iPad from Apple are among the most popular mobile computing platforms in use today. These devices are of forensic interest because of their high adoption rate and potential for containing digital evidence. The uniformity in their design and underlying operating system (iOS) also allows forensic tools and methods to be shared across product types. This paper analyzes the tools and methods available for con...

  2. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment

    Directory of Open Access Journals (Sweden)

    Sangho Park

    2018-04-01

    Full Text Available Recently, the work environments of organizations have been in the process of transitioning into smart work environments by applying cloud computing technology in the existing work environment. The smart work environment has the characteristic of being able to access information assets inside the company from outside the company through cloud computing technology, share information without restrictions on location by using mobile terminals, and provide a work environment where work can be conducted effectively in various locations and mobile environments. Thus, in the cloud computing-based smart work environment, changes are occurring in terms of security risks, such as an increase in the leakage risk of an organization’s information assets through mobile terminals which have a high risk of loss and theft and increase the hacking risk of wireless networks in mobile environments. According to these changes in security risk, the reactive digital forensic method, which investigates digital evidence after the occurrence of security incidents, appears to have a limit which has led to a rise in the necessity of proactive digital forensic approaches wherein security incidents can be addressed preemptively. Accordingly, in this research, we design a digital forensic readiness model at the level of preemptive prevention by considering changes in the cloud computing-based smart work environment. Firstly, we investigate previous research related to the cloud computing-based smart work environment and digital forensic readiness and analyze a total of 50 components of digital forensic readiness. In addition, through the analysis of the corresponding preceding research, we design seven detailed areas, namely, outside the organization environment, within the organization guideline, system information, terminal information, user information, usage information, and additional function. Then, we design a draft of the digital forensic readiness model in the cloud

  3. A Framework for Harmonizing Forensic Science Practices and Digital/Multimedia Evidence

    OpenAIRE

    Jaquet-Chiffelle, David-Olivier; Casey, Eoghan; Pollitt, Mark; Gladyshev, Pavel

    2018-01-01

    Like many other specializations within forensic science, the digital/multimedia discipline has been challenged with respect to demonstrating that the processes, activities, and techniques used are sufficiently scientific. To address this issue, in April 2015, the Organization of Scientific Area Committees for Forensic Science (OSAC) Digital/Multimedia Scientific Area Committee (SAC) established a Task Group (TG). This document summarizes the work of the TG that grew into establishing a harmo...

  4. FIA: An Open Forensic Integration Architecture for Composing Digital Evidence

    Science.gov (United States)

    Raghavan, Sriram; Clark, Andrew; Mohay, George

    The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.

  5. Digital forensic readiness in a cloud environment

    CSIR Research Space (South Africa)

    Sibiya, G

    2013-09-01

    Full Text Available -jurisdictions. As such, service providers hosting the data that may be required for digital forensic investigation may be reluctant to comply with foreign law enforcement agencies. Even if they comply, this may be a costly and time-consuming exercise, given the amount...

  6. Digital Forensics and Born-Digital Content in Cultural Heritage Collections. CLIR Publication No. 149

    Science.gov (United States)

    Kirschenbaum, Matthew G.; Ovenden, Richard; Redwine, Gabriela

    2010-01-01

    The purpose of this report is twofold: first, to introduce the field of digital forensics to professionals in the cultural heritage sector; and second, to explore some particular points of convergence between the interests of those charged with collecting and maintaining born-digital cultural heritage materials and those charged with collecting…

  7. Gathering evidence: Model-driven software engineering in automated digital forensics

    NARCIS (Netherlands)

    van den Bos, J.

    2014-01-01

    Digital forensics concerns the acquisition, recovery and analysis of information on digital devices to answer legal questions. Exponential increases in available storage, as well as growing device adoption by the public, have made manual inspection of all information infeasible. A solution is

  8. Practical implementation of a methodology for digital images authentication using forensics techniques

    OpenAIRE

    Francisco Rodríguez-Santos; Guillermo Delgado-Gutierréz; Leonardo Palacios-Luengas; Rubén Vázquez Medina

    2015-01-01

    This work presents a forensics analysis methodology implemented to detect modifications in JPEG digital images by analyzing the image’s metadata, thumbnail, camera traces and compression signatures. Best practices related with digital evidence and forensics analysis are considered to determine if the technical attributes and the qualities of an image are consistent with each other. This methodology is defined according to the recommendations of the Good Practice Guide for Computer-Based Elect...

  9. Book Review: Digital Crime and Forensic Science in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-12-01

    Full Text Available Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006. Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper, US$79.95.Reviewed by Gary C. KesslerThis book, according to the preface, "is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime." It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry.If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from Greece, Italy, The Netherlands, South Africa, the U.K., and the U.S. The international flavor of the writing is also welcome in the field.(see PDF for full review

  10. Development of a National Repository of Digital Forensic Intelligence

    Directory of Open Access Journals (Sweden)

    Mark Weiser

    2006-06-01

    Full Text Available Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and potential for cyber crimes. Even crimes that are not themselves computer-based, may be solved or prosecuted based on digital evidence left behind by the perpetrator. However, no widely accepted mechanism to facilitate sharing of ideas and methodologies has emerged. Different agencies re-develop approaches that have been tested in other jurisdictions. Even within a single agency, there is often significant redundant work. There is great potential efficiency gain in sharing information from digital forensic investigations.This paper describes an on-going design and development project between Oklahoma State University’s Center for Telecommunications and Network Security and the Defense Cyber Crimes Center to develop a Repository of Digital Forensic Knowledge. In its full implementation, the system has potential to provide exceptional gains in efficiency for examiners and investigators. It provides a better conduit to share relevant information between agencies and a structure through which cases can be cross-referenced to have the most impact on a current investigation.

  11. Digital Forensics in Cloud Computing

    Directory of Open Access Journals (Sweden)

    PATRASCU, A.

    2014-05-01

    Full Text Available Cloud Computing is a rather new technology which has the goal of efficiently usage of datacenter resources and offers them to the users on a pay per use model. In this equation we need to know exactly where and how a piece of information is stored or processed. In today's cloud deployments this task is becoming more and more a necessity and a must because we need a way to monitor user activity, and furthermore, in case of legal actions, we must be able to present digital evidence in a way in which it is accepted. In this paper we are going to present a modular and distributed architecture that can be used to implement a cloud digital forensics framework on top of new or existing datacenters.

  12. Digital-forensics based pattern recognition for discovering identities in electronic evidence

    NARCIS (Netherlands)

    Henseler, Hans; Hofsté, Jop; van Keulen, Maurice

    With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge

  13. Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.

    Science.gov (United States)

    Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin

    2010-07-01

    In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.

  14. Forensic Computing (Dagstuhl Seminar 13482)

    OpenAIRE

    Freiling, Felix C.; Hornung, Gerrit; Polcák, Radim

    2014-01-01

    Forensic computing} (sometimes also called digital forensics, computer forensics or IT forensics) is a branch of forensic science pertaining to digital evidence, i.e., any legal evidence that is processed by digital computer systems or stored on digital storage media. Forensic computing is a new discipline evolving within the intersection of several established research areas such as computer science, computer engineering and law. Forensic computing is rapidly gaining importance since the...

  15. The Digital Forensics and Security Challenge of QR Codes

    Directory of Open Access Journals (Sweden)

    Nik Thompson

    2013-06-01

    Full Text Available The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.

  16. From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate

    OpenAIRE

    Dewald, Andreas; Freiling, Felix C.

    2014-01-01

    This paper draws a comparison of fundamental theories in traditional forensic science and the state of the art in current computer forensics, thereby identifying a certain disproportion between the perception of central aspects in common theory and the digital forensics reality. We propose a separation of what is currently demanded of practitioners in digital forensics into a rigorous scientific part on the one hand, and a more general methodology of searching and seizing digital evidence an...

  17. Digital and multimedia forensics justified: An appraisal on professional policy and legislation

    Science.gov (United States)

    Popejoy, Amy Lynnette

    Recent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: "The Promotion and Development of Forensic Science," and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: "The Standardization of Terminology in Reporting and Testimony," and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: "Insufficient Education and Training," identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.

  18. Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2010-01-01

    Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world

  19. Digital image processing as an aid in forensic medicine

    International Nuclear Information System (INIS)

    Buitrago-Tellez, C.; Wenz, W.; Friedrich, G.

    1992-01-01

    Radiology plays an important role in the identification of unknown corpses. Positive radiographic identification by comparison with antemortem films is an established technique in this setting. Technical defects together with non-well-preserved films make it sometimes difficult or even impossible to establish a confident comparison. Digital image processing after secondary digitalization of ante- and postmortem films represents an important development and aid in forensic medicine. The application of this method is demonstrated on a single case. (orig.) [de

  20. Técnicas de análisis forense digital aplicadas a dispositivos y sistemas móviles

    OpenAIRE

    Guillermo Jaramillo Cabrera

    2011-01-01

    La disciplina del Análisis Forense Digital, es un campo de investigación excitante y dinámico, conocido hasta ahora sólo por especialistas, y tiene cada vez más un poderoso impacto en una variedad de situaciones, incluyendo ambientes corporativos, investigaciones internas, litigación civil, investigaciones criminales, investigaciones de inteligencia y asuntos de seguridad nacional. El Análisis Forense Digital Móvil, es sin duda, el de mayor crecimiento y desarrollo en la disciplina forense di...

  1. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  2. The Beginning of the End for Digital Forensic Recovery?

    Directory of Open Access Journals (Sweden)

    Graeme Baxter Bell

    2010-09-01

    Full Text Available Normal 0 false false false EN-AU X-NONE X-NONE Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005. However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard drives to solid-state drives inside modern computers has so far attracted very little attention from the research community.Here we show that it is imprudent and potentially reckless to rely on existing evidence collection processes and procedures, and we demonstrate that conventional assumptions about the behaviour of storage media are no longer valid. In particular we demonstrate that modern storage devices can operate under their own volition in the absence of computer instructions. Such operations are highly destructive of traditionally recoverable data. This can contaminate evidence; can obfuscate and make validation of digital evidence reports difficult; can complicate the process of live and dead analysis recovery; and can complicate and frustrate the post recovery forensic analysis. Our experimental findings demonstrate that solid-state drives (SSDs have the capacity to destroy evidence catastrophically under their own volition, in the absence of specific instructions to do so from a computer.

  3. Technical and legal perspectives on forensics scenario

    OpenAIRE

    Solinas, Fabrizio

    2014-01-01

    The dissertation concerns digital forensic. The expression digital forensic (sometimes called digital forensic science) is the science that studies the identification, storage, protection, retrieval, documentation, use, and every other form of computer data processing in order to be evaluated in a legal trial. Digital forensic is a branch of forensic science. First of all, digital forensic represents the extension of theories, principles and procedures that are typical and importa...

  4. The use of full spectrum digital photography for evidence collection and preservation in cases involving forensic odontology.

    Science.gov (United States)

    Wright, Franklin D; Golden, Gregory S

    2010-09-10

    Photography often represents the best method to collect and preserve evidence in forensic cases. This is especially true in forensic odontology with cases involving dental identification, human abuse and, perhaps most significantly, bitemark cases. Basic visible light photography is adequate in most dental identification cases; however, full spectrum digital photography is best utilized to collect all available evidence in cases of human abuse and bitemarks. This paper will discuss the types of photographic evidence that should be collected with various forensic odontological cases and the specific techniques utilized in full spectrum forensic digital photography. The use of full spectrum photography captures the forensic injuries using special techniques recording the injuries in each of the four resultant events that occur when light strikes skin. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  5. A survey of passive technology for digital image forensics

    Institute of Scientific and Technical Information of China (English)

    LUO Weiqi; QU Zhenhua; PAN Feng; HUANG Jiwu

    2007-01-01

    Over the past years,digital images have been widely used in the Internet and other applications.Whilst image processing techniques are developing at a rapid speed,tampering with digital images without leaving any obvious traces becomes easier and easier.This may give rise to some problems such as image authentication.A new passive technology for image forensics has evolved quickly during the last few years.Unlike the signature-based or watermark-based methods,the new technology does not need any signature generated or watermark embedded in advance,it assumes that different imaging devices or processing would introduce different inherent patterns into the output images.These underlying patterns are consistent in the original untampered images and would be altered after some kind of manipulations.Thus,they can be used as evidence for image source identification and alteration detection.In this paper,we will discuss this new forensics technology and give an overview of the prior literatures.Some concluding remarks are made about the state of the art and the challenges in this novel technology.

  6. Chain of evidence generation for contrast enhancement in digital image forensics

    Science.gov (United States)

    Battiato, Sebastiano; Messina, Giuseppe; Strano, Daniela

    2010-01-01

    The quality of the images obtained by digital cameras has improved a lot since digital cameras early days. Unfortunately, it is not unusual in image forensics to find wrongly exposed pictures. This is mainly due to obsolete techniques or old technologies, but also due to backlight conditions. To extrapolate some invisible details a stretching of the image contrast is obviously required. The forensics rules to produce evidences require a complete documentation of the processing steps, enabling the replication of the entire process. The automation of enhancement techniques is thus quite difficult and needs to be carefully documented. This work presents an automatic procedure to find contrast enhancement settings, allowing both image correction and automatic scripting generation. The technique is based on a preprocessing step which extracts the features of the image and selects correction parameters. The parameters are thus saved through a JavaScript code that is used in the second step of the approach to correct the image. The generated script is Adobe Photoshop compliant (which is largely used in image forensics analysis) thus permitting the replication of the enhancement steps. Experiments on a dataset of images are also reported showing the effectiveness of the proposed methodology.

  7. Técnicas de análisis forense digital aplicadas a dispositivos y sistemas móviles

    Directory of Open Access Journals (Sweden)

    Guillermo Jaramillo Cabrera

    2011-12-01

    Full Text Available La disciplina del Análisis Forense Digital, es un campo de investigación excitante y dinámico, conocido hasta ahora sólo por especialistas, y tiene cada vez más un poderoso impacto en una variedad de situaciones, incluyendo ambientes corporativos, investigaciones internas, litigación civil, investigaciones criminales, investigaciones de inteligencia y asuntos de seguridad nacional. El Análisis Forense Digital Móvil, es sin duda, el de mayor crecimiento y desarrollo en la disciplina forense digital y ofrece ventajas significativas así como también muchos retos. Mientras que lo interesante de la investigación forense de dispositivos como los que usan el Sistema Operativo Móvil Android o simplemente dispositivo Android, implica la adquisición y análisis de datos; es importante tener una visión amplia tanto de la plataforma como de las herramientas que serán utilizadas a lo largo de la investigación. Un entendimiento minucioso asistirá al Ingeniero Examinador Forense o Ingeniero de Seguridad a través del análisis e investigación exitosos de dispositivos móviles, incluyendo los Smartphone basados en Android.

  8. Cybercrime, digital forensics and jurisdiction

    CERN Document Server

    Chawki, Mohamed; Khan, Mohammad Ayoub; Tyagi, Sapna

    2015-01-01

    The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics  and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.

  9. Three Tier Indoor Localization System for Digital Forensics

    OpenAIRE

    Dennis L. Owuor; Okuthe P. Kogeda; Johnson I. Agbinya

    2017-01-01

    Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the impl...

  10. Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving

    Directory of Open Access Journals (Sweden)

    Yunhyong Kim

    2012-12-01

    Full Text Available In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC, disk image formats that capture data for recovery or installation (partimage, dd raw image, these two types combined with a selected compression algorithm (e.g. tar+gzip, formats that combine packing and compression (e.g. 7-zip, and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format. We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.

  11. Multimedia Forensics Is Not Computer Forensics

    Science.gov (United States)

    Böhme, Rainer; Freiling, Felix C.; Gloe, Thomas; Kirchner, Matthias

    The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

  12. The Advanced Data Acquisition Model (ADAM: A Process Model for Digital Forensic Practice

    Directory of Open Access Journals (Sweden)

    Richard Brian Adams

    2013-12-01

    Full Text Available As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the establishment of generally accepted standards and processes that are urgently needed in the domain of digital forensics. This paper presents a generic process model as a step towards developing such a generally-accepted standard for a fundamental digital forensic activity – the acquisition of digital evidence. Normal 0 false false false EN-AU X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:12.0pt; mso-para-margin-left:0cm; text-indent:18.0pt; line-height:200%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;}

  13. Semantic Modelling of Digital Forensic Evidence

    Science.gov (United States)

    Kahvedžić, Damir; Kechadi, Tahar

    The reporting of digital investigation results are traditionally carried out in prose and in a large investigation may require successive communication of findings between different parties. Popular forensic suites aid in the reporting process by storing provenance and positional data but do not automatically encode why the evidence is considered important. In this paper we introduce an evidence management methodology to encode the semantic information of evidence. A structured vocabulary of terms, ontology, is used to model the results in a logical and predefined manner. The descriptions are application independent and automatically organised. The encoded descriptions aim to help the investigation in the task of report writing and evidence communication and can be used in addition to existing evidence management techniques.

  14. Expeditionary Forensic Support to Joint Force Commanders: What Changes or Considerations are Warranted?

    Science.gov (United States)

    2012-04-10

    builders . Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) could then also be prioritized and employed accordingly for optimal 8...responsibility for digital and multimedia forensics, and DIA responsibility for forensic intelligence activities and programs.31 The Army is also currently...aligning functional oversight of Forensics, Biometrics, Law Enforcement, Detainee Operations, and Physical Security 11 under one overarching

  15. Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis

    Science.gov (United States)

    Li, Yue; Li, Chang-Tsun

    The last few years have seen the applications of Photo Response Non-Uniformity noise (PRNU) - a unique stochastic fingerprint of image sensors, to various types of digital forensic investigations such as source device identification and integrity verification. In this work we proposed a new way of extracting PRNU noise pattern, called Decomposed PRNU (DPRNU), by exploiting the difference between the physical andartificial color components of the photos taken by digital cameras that use a Color Filter Array for interpolating artificial components from physical ones. Experimental results presented in this work have shown the superiority of the proposed DPRNU to the commonly used version. We also proposed a new performance metrics, Corrected Positive Rate (CPR) to evaluate the performance of the common PRNU and the proposed DPRNU.

  16. A note on digital dental radiography in forensic odontology.

    Science.gov (United States)

    Chiam, Sher-Lin

    2014-09-01

    Digital dental radiography, intraoral and extraoral, is becoming more popular in dental practice. It offers convenience, such as lower exposure to radiation, ease of storing of images, and elimination of chemical processing. However, it also has disadvantages and drawbacks. One of these is the potential for confusion of the orientation of the image. This paper outlines one example of this, namely, the lateral inversion of the image. This source of confusion is partly inherent in the older model of phosphor storage plates (PSPs), as they allow both sides to be exposed without clue to the fact that the image is acquired on the wrong side. The native software allows digital manipulation of the X-ray image, permitting both rotation and inversion. Attempts to orientate the X-ray according to the indicator incorporated on the plate can then sometimes lead to inadvertent lateral inversion of the image. This article discusses the implications of such mistakes in dental digital radiography to forensic odontology and general dental practice.

  17. Anàlisi forense d'evidències digitals

    OpenAIRE

    Bonachera López, Esteban

    2014-01-01

    L'objectiu principal d'aquest projecte consisteix en la realització de l'anàlisi forense del disc dur i de la memòria RAM d'un ordinador personal, en concret un Netbook, vinculat a una possible conducta delictiva. També s'inclou en l'anàlisi una base de dades del conegut programari WhatsApp extreta d'un smartphone. Per realitzar aquesta tasca s'utilitzaran eines específiques per localitzar les evidències digitals que puguin demostrar els presumptes delictes. El objetivo principal de este p...

  18. [The undergraduate program in forensic science: a national challenge].

    Science.gov (United States)

    García Castillo, Zoraida; Graue Wiechers, Enrique; Durante Montiel, Irene; Herrera Saint Leu, Patricia

    2014-01-01

    The challenge in achieving an ideal state of justice is that each "proof" has the highest degree of reliability. This is the main responsibility of the forensic scientist. Up to now, criminal investigations in Mexico have been supported by forensic work from a wide variety of disciplinary backgrounds that give testimony in a particular area, even though they may have become forensic witnesses in a complementary and experiential manner. In January 2013, the Universidad Nacional Autónoma de México (UNAM) approved the "Forensic Science" undergraduate program that, in collaboration with various academic entities and government institutions, will develop forensic scientists trained in science, law, and criminology. This is focused on contributing to the national demand that the justice system has more elements to procure and administer justice in dealing with crime.

  19. A Survey of Graduate Training Programs and Coursework in Forensic Psychology

    Science.gov (United States)

    Burl, Jeffrey; Shah, Sanjay; Filone, Sarah; Foster, Elizabeth; DeMatteo, David

    2012-01-01

    An increasing number of graduate programs are available to students interested in the study of forensic psychology. The growth of forensic training opportunities is reflective of the wider development of forensic psychology as a discrete specialty area. An Internet-based survey was conducted to provide descriptive information to academic advisors…

  20. System Support for Forensic Inference

    Science.gov (United States)

    Gehani, Ashish; Kirchner, Florent; Shankar, Natarajan

    Digital evidence is playing an increasingly important role in prosecuting crimes. The reasons are manifold: financially lucrative targets are now connected online, systems are so complex that vulnerabilities abound and strong digital identities are being adopted, making audit trails more useful. If the discoveries of forensic analysts are to hold up to scrutiny in court, they must meet the standard for scientific evidence. Software systems are currently developed without consideration of this fact. This paper argues for the development of a formal framework for constructing “digital artifacts” that can serve as proxies for physical evidence; a system so imbued would facilitate sound digital forensic inference. A case study involving a filesystem augmentation that provides transparent support for forensic inference is described.

  1. A State-of-the-Art Review of Cloud Forensics

    Directory of Open Access Journals (Sweden)

    Sameera Abdulrahman Almulla

    2014-12-01

    Full Text Available Cloud computing and digital forensics are emerging fields of technology. Unlike traditional digital forensics where the target environment can be almost completely acquired, isolated and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators.Recently, the term "cloud forensics" has an increasing presence in the field of digital forensics. In this state-of-the-art review, we included the most recent research efforts that used "cloud forensics" as a keyword and then classify the literature in to three dimensions, (1 survey-based, (2 technology-based and (3 forensics procedural-based.We discuss widely accepted international standard bodies and their efforts to cope with the current trend of cloud forensics. Our aim is not only to reference related work based on the discussed dimensions, but also to analyze them and generate a mind map that will help in identifying research gaps. Finally, we summarize existing digital forensics tools and, the available simulation environments that can be used for evidence acquisition, examination and cloud forensics test purposes.

  2. Author Guidelines: The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM

    Directory of Open Access Journals (Sweden)

    Arab Journal of Forensic Sciences & Forensic Medicine

    2017-06-01

    Full Text Available The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM is a peer-reviewed, open access (CC BY-NC, international journal for publishing original contributions in various fields of forensic science. These fields include, but are not limited to forensic pathology and histochemistry, toxicology(drugs, alcohol, etc., forensic biology (serology, human DNA profiling, entomology, population genetics, forensic chemistry(inks, paints, dyes, explosives, fire accelerants, psychiatry and hypnotics, forensic anthropology and archeology, forensic odontology, fingerprints and impressions, firearms and tool marks, white collar crimes (counterfeit and forgery; questioned documents, digital forensics; cyber-crimes, criminal justice and crime scene investigation, as well as many other disciplines where science and medicine interact with the law.

  3. A review of forensic science higher education programs in the United States: bachelor's and master's degrees.

    Science.gov (United States)

    Tregar, Kristen L; Proni, Gloria

    2010-11-01

    As the number of forensic science programs offered at higher education institutions rises, and more students express an interest in them, it is important to gain information regarding the offerings in terms of courses, equipment available to students, degree requirements, and other important aspects of the programs. A survey was conducted examining the existing bachelor's and master's forensic science programs in the U.S. Of the responding institutions, relatively few were, at the time of the survey, accredited by the forensic science Education Programs Accreditation Commission (FEPAC). In general, the standards of the responding programs vary considerably primarily in terms of their size and subjects coverage. While it is clear that the standards for the forensic science programs investigated are not homogeneous, the majority of the programs provide a strong science curriculum, faculties with advanced degrees, and interesting forensic-oriented courses. © 2010 American Academy of Forensic Sciences.

  4. Column: File Cabinet Forensics

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2011-12-01

    Full Text Available Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky, the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering.(see PDF for full column

  5. Multimedia forensics and security foundations, innovations, and applications

    CERN Document Server

    Fouad, Mohamed; Manaf, Azizah; Zamani, Mazdak; Ahmad, Rabiah; Kacprzyk, Janusz

    2017-01-01

    This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidence...

  6. Forensic characterization of camcorded movies: digital cinema vs. celluloid film prints

    Science.gov (United States)

    Rolland-Nevière, Xavier; Chupeau, Bertrand; Do"rr, Gwena"l.; Blondé, Laurent

    2012-03-01

    Digital camcording in the premises of cinema theaters is the main source of pirate copies of newly released movies. To trace such recordings, watermarking systems are exploited in order for each projection to be unique and thus identifiable. The forensic analysis to recover these marks is different for digital and legacy cinemas. To avoid running both detectors, a reliable oracle discriminating between cams originating from analog or digital projections is required. This article details a classification framework relying on three complementary features : the spatial uniformity of the screen illumination, the vertical (in)stability of the projected image, and the luminance artifacts due to the interplay between the display and acquisition devices. The system has been tuned with cams captured in a controlled environment and benchmarked against a medium-sized dataset (61 samples) composed of real-life pirate cams. Reported experimental results demonstrate that such a framework yields over 80% classification accuracy.

  7. A Study of the FEPAC Accredited Graduate Forensic Science Programs' Curricula

    Science.gov (United States)

    Rushton, Catherine Genice

    2016-01-01

    The National Institute of Justice (1999) and the National Academy of Sciences (2009) recommended that forensic science training shift from on-the-job training to formal education; however, the reports cited inconsistencies in the curricula of the forensic science degree programs as an impediment to this. The Forensic Science Education Programs…

  8. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  9. The forensic float nurse: a new concept in the effective management of service delivery in a forensic program.

    Science.gov (United States)

    Cyr, J J; Paradis, J

    2012-12-01

    A major challenge faced by Forensic Program management teams is to balance their budgets due to the unpredictability of the forensic patient population, particularly in the context of managing staffing costs where the hospital is not the "gatekeeper" and does not have control over who is admitted and when. In forensic mental health, the justice system, either via the courts, or review boards, determines who is ordered for admission to hospital for assessment or treatment and rehabilitation. Hospitals have little, if any, recourse but to admit these mentally disordered offenders. This typically results in increased levels of staffing with concomitant overtime costs. The literature suggests that clustered float pool nurses develop enhanced relationships with staff and patients, thereby enabling them to attain specialized clinical expertise to treat specific patient populations, promoting safer, high quality care, and overall are more cost effective. Forensic nursing is recognized as a mental health subspecialty. The "Forensic Float Nurse" concept was piloted to provide readily available, highly adaptable, skilled forensic nurses to assist in times of unpredictably heavy workloads and/or unplanned staffing shortages. A significant reduction approaching 50% in overtime was achieved. Heuristic implications of this finding are presented. © 2012 International Association of Forensic Nurses.

  10. Digital Image Forensics There is More to a Picture than Meets the Eye

    CERN Document Server

    Memon, Nasir

    2013-01-01

    Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical evidence, just as they have become our primary source of news and have replaced paper-based financial documentation. Crucially, the contributions also analyze the very profound problems which have arisen alongside the digital image, issues of veracity and progeny that demand systematic and detailed response: It looks real, but is it? What camera captured it? Has it been doctored or subtly altered? Attempting to provide answers to these slippery issues, the book covers how digital images are created, processed and stored before moving on to set out the latest techniques for forensically examining images, and finally addressing practical issues such as courtroom admissibility. In an e...

  11. Liforac - A Model For Live Forensic Acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-10-01

    Full Text Available ways in which such an acquisition should take place to ensure forensic soundness. The study presents information on a relatively new field of expertise and considers the Digital Forensic discipline, forensic tools, practical problems experienced during...

  12. 2016 LLNL Nuclear Forensics Summer Program

    Energy Technology Data Exchange (ETDEWEB)

    Zavarin, Mavrik [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-11-15

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Program is designed to give graduate students an opportunity to come to LLNL for 8–10 weeks for a hands-on research experience. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students also have the opportunity to meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  13. 2016 LLNL Nuclear Forensics Summer Program

    International Nuclear Information System (INIS)

    Zavarin, Mavrik

    2016-01-01

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Program is designed to give graduate students an opportunity to come to LLNL for 8-10 weeks for a hands-on research experience. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students also have the opportunity to meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  14. Digital evidence

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2012-01-01

    Full Text Available Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.

  15. Plethora of Cyber Forensics

    OpenAIRE

    N.Sridhar; Dr.D.Lalitha Bhaskari; Dr.P.S.Avadhani

    2011-01-01

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper f...

  16. Forensic accounting in the fraud auditing case

    Directory of Open Access Journals (Sweden)

    Nataša Simeunović

    2016-11-01

    Full Text Available This paper presents a real case of digital forensic analysis in organizational fraud auditing process investigated using two different forensic tools, namely Tableau TD3 Touch Screen Forensic Imager and Access Data FTK Imager. Fraud auditing is more of a mindset than a methodology and has different approaches from financial auditing. Fraud auditors are mostly focused on exceptions, accounting irregularities, and patterns of their conduct. Financial auditors place special emphasis on the audit trail and material misstatements. A fraud case investigation of non-cash misappropriations committed by an employee, the warehouseman, will be presented herein in order to highlight the usefulness of fraud auditing, which can reveal many forms of financial crime and can be used in both private and public sector companies. Due to the computerized accounting environment, fraud investigation requires a combination of auditing, computer crime and digital forensic investigation skills, which can be achieved through joint efforts and cooperation of both digital investigator and fraud auditor as proposed herein.

  17. 2017 LLNL Nuclear Forensics Summer Internship Program

    Energy Technology Data Exchange (ETDEWEB)

    Zavarin, Mavrik [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-12-13

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Internship Program (NFSIP) is designed to give graduate students an opportunity to come to LLNL for 8-10 weeks of hands-on research. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students can also meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  18. Methodology of Implementation of Computer Forensics

    OpenAIRE

    Gelev, Saso; Golubovski, Roman; Hristov, Risto; Nikolov, Elenior

    2013-01-01

    Compared to other sciences, computer forensics (digital forensics) is a relatively young discipline. It was established in 1999 and it has been an irreplaceable tool in sanctioning cybercrime ever since. Good knowledge of computer forensics can be really helpful in uncovering a committed crime. Not adhering to the methodology of computer forensics, however, makes the obtained evidence invalid/irrelevant and as such it cannot be used in legal proceedings. This paper is to explain the methodolo...

  19. A novel method for detecting light source for digital images forensic

    Science.gov (United States)

    Roy, A. K.; Mitra, S. K.; Agrawal, R.

    2011-06-01

    Manipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.

  20. Python forensics a workbench for inventing and sharing digital forensic technology

    CERN Document Server

    Hosmer, Chet

    2014-01-01

    Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cl

  1. DHS National Technical Nuclear Forensics Program FY 10 Summary Report: Graduate Mentoring Assistance Program (GMAP)

    International Nuclear Information System (INIS)

    Finck, Martha R.

    2011-01-01

    This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. The summary report details the student/mentor experience and future plans after the first summer practicum. This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. This final written report includes information concerning the overall mentoring experience, including benefits (to the lab, the mentors, and the students), challenges, student research contributions, and lab mentor interactions with students home universities. Idaho National Laboratory hosted two DHS Nuclear Forensics graduate Fellows (nuclear engineering) in summer 2011. Two more Fellows (radiochemistry) are expected to conduct research at the INL under this program starting in 2012. An undergraduate Fellow (nuclear engineering) who worked in summer 2011 at the laboratory is keenly interested in applying for the NF Graduate Fellowship this winter with the aim of returning to INL. In summary, this program appears to have great potential for success in supporting graduate level students who pursue careers in nuclear forensics. This relatively specialized field may not have been an obvious choice for some who have already shown talent in the traditional areas of chemistry or nuclear engineering. The active recruiting for this scholarship program for candidates at universities across the U.S. brings needed visibility to this field. Not only does this program offer critical practical training

  2. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  3. Limitaciones de las actuales herramientas de análisis digital forense para dispositivos móviles

    OpenAIRE

    Amsler, G. A.; Casco, María Eugenia; Roatta, Santiago

    2017-01-01

    Este informe describe la resolución de un problema de ingeniería de la asignatura Seguridad Informática de la Carrera de Ingeniería en Sistemas de la Universidad Abierta Interamericana. El objetivo del trabajo fue realizar una comparación cualitativa y cuantitativa de diferentes herramientas de adquisición de evidencia digital en dispositivos móviles. Las tareas se desarrollaron en el marco de una pasantía de un año realizada en el Laboratorio de Análisis Digital Forense de la Policía de Inve...

  4. American Academy of Forensic Sciences

    Science.gov (United States)

    ... Programs Courses in Forensic Odontology Choosing a Career What is Forensic Science? What Do Forensic Scientists Do? What’s a Forensic Scientist? ... ve Decided You Want a Career in Forensic Science … Now What? Young Forensic Scientists Forum (YFSF) Annual Meeting Events ...

  5. On the added value of forensic science and grand innovation challenges for the forensic community.

    Science.gov (United States)

    van Asten, Arian C

    2014-03-01

    In this paper the insights and results are presented of a long term and ongoing improvement effort within the Netherlands Forensic Institute (NFI) to establish a valuable innovation programme. From the overall perspective of the role and use of forensic science in the criminal justice system, the concepts of Forensic Information Value Added (FIVA) and Forensic Information Value Efficiency (FIVE) are introduced. From these concepts the key factors determining the added value of forensic investigations are discussed; Evidential Value, Relevance, Quality, Speed and Cost. By unravelling the added value of forensic science and combining this with the future needs and scientific and technological developments, six forensic grand challenges are introduced: i) Molecular Photo-fitting; ii) chemical imaging, profiling and age estimation of finger marks; iii) Advancing Forensic Medicine; iv) Objective Forensic Evaluation; v) the Digital Forensic Service Centre and vi) Real time In-Situ Chemical Identification. Finally, models for forensic innovation are presented that could lead to major international breakthroughs on all these six themes within a five year time span. This could cause a step change in the added value of forensic science and would make forensic investigative methods even more valuable than they already are today. © 2013. Published by Elsevier Ireland Ltd on behalf of Forensic Science Society. All rights reserved.

  6. The prevalence of encoded digital trace evidence in the nonfile space of computer media(,) (.).

    Science.gov (United States)

    Garfinkel, Simson L

    2014-09-01

    Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP. Published 2014. This article is a U.S. Government work and is in the public domain in the USA. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  7. Challenges in applying the ACPO principles in cloud forensic investigations

    Directory of Open Access Journals (Sweden)

    Harjinder Singh Lallie

    2012-03-01

    Full Text Available The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations.This study investigates the impact of cloud computing on ACPO’s core principles and asks whether there is a need for the principles and guidelines to be reviewed to address the issues presented by cloud computing. Empirical research is conducted and data collected from key experts in the field of digital forensics.This research presents several key findings: there is a very real concern for how cloud computing will affect digital forensic investigations; the ACPO principles cannot easily be applied in all cloud investigations but are generally sufficient for cloud computing forensic investigations. However the advent of cloud computing is a significant development in technology and may in the near future warrant a review of the guidelines in particular to incorporate the involvement of third parties in cloud investigations.

  8. An Analysis of Forensic Imaging in the Absence of Write-Blockers

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2014-09-01

    Full Text Available Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker are immediate suspect for integrity. This paper describes a research framework to examine what occurs when a forensic image is acquired without benefit of a write-blocker in order to understand the true impact of such an eventuality. The initial tests document the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.

  9. Book Review: The X-Ways Forensics Practitioner's Guide

    Directory of Open Access Journals (Sweden)

    Linda Lau

    2014-09-01

    Full Text Available Shavers, B., and Zimmerman, E. (2013. The X-Ways Forensics Practitioner's Guide. Waltham, MA: Syngress, 242 pages. ISBN: 978-0-12-411605-4. Print: US $50.90. Includes exercises, case studies, references, and index. Reviewed by Linda K. Lau, Longwood UniversityBrett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.

  10. Redeye: A Digital Library for Forensic Document Triage

    Energy Technology Data Exchange (ETDEWEB)

    Bogen, Paul Logasa [ORNL; McKenzie, Amber T [ORNL; Gillen, Rob [ORNL

    2013-01-01

    Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money laundering to fraud and from cybercrime to smuggling. The current workflow for analysts includes powerful tools, such as Palantir and Analyst s Notebook, for moving from evidence to actionable intelligence and tools for finding documents among the millions of files on a hard disk, such as FTK. However, the analysts often leave the process of sorting through collections of seized documents to filter out the noise from the actual evidence to a highly labor-intensive manual effort. This paper presents the Redeye Analysis Workbench, a tool to help analysts move from manual sorting of a collection of documents to performing intelligent document triage over a digital library. We will discuss the tools and techniques we build upon in addition to an in-depth discussion of our tool and how it addresses two major use cases we observed analysts performing. Finally, we also include a new layout algorithm for radial graphs that is used to visualize clusters of documents in our system.

  11. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  12. Computer Forensics Field Triage Process Model

    Directory of Open Access Journals (Sweden)

    Marcus K. Rogers

    2006-06-01

    Full Text Available With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s/media, transporting it to the lab, making a forensic image(s, and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s. The Cyber Forensic Field Triage Process Model (CFFTPM proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s/media back to the lab for an in-depth examination or acquiring a complete forensic image(s. The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations.

  13. Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.

    Science.gov (United States)

    Chen, Chenglong; Ni, Jiangqun; Shen, Zhaoyi; Shi, Yun Qing

    2017-06-01

    Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image forgeries. In recent years, researchers have developed many digital forensic techniques to identify these operations. Most previous works in this area focus on the analysis of images that have undergone single geometric transformations, e.g., resizing or rotation. In several recent works, researchers have addressed yet another practical and realistic situation: successive geometric transformations, e.g., repeated resizing, resizing-rotation, rotation-resizing, and repeated rotation. We will also concentrate on this topic in this paper. Specifically, we present an in-depth analysis in the frequency domain of the second-order statistics of the geometrically transformed images. We give an exact formulation of how the parameters of the first and second geometric transformations influence the appearance of periodic artifacts. The expected positions of characteristic resampling peaks are analytically derived. The theory developed here helps to address the gap left by previous works on this topic and is useful for image security and authentication, in particular, the forensics of geometric transformations in digital images. As an application of the developed theory, we present an effective method that allows one to distinguish between the aforementioned four different processing chains. The proposed method can further estimate all the geometric transformation parameters. This may provide useful clues for image forgery detection.

  14. Clinical coaching in forensic psychiatry: an innovative program to recruit and retain nurses.

    Science.gov (United States)

    Thorpe, Gail; Moorhouse, Pamela; Antonello, Carolyn

    2009-05-01

    Ontario is currently experiencing a nursing shortage crisis. Recruitment and retention of nursing staff are critical issues. In response, retention strategies have been developed by the Ontario Ministry of Health and Long-Term Care. The Late Career Nurse Initiative is one such strategy. This innovative program encourages nurses age 55 and older to remain in the workforce by providing opportunities to use their nursing experience in less physically demanding alternate roles for a portion of their time. The Royal Ottawa Health Care Group has developed a clinical coach program in forensics that matches these veteran nurses with new graduates or nurses new to forensic psychiatric nursing. The program has resulted in retention rates of more than 91% after 1 year. This article provides background about the program and highlights its outcomes.

  15. Achieving Business Excellence by Optimizing Corporate Forensic Readiness

    Directory of Open Access Journals (Sweden)

    Gojko Grubor

    2017-02-01

    Full Text Available In order to improve their business excellence, all organizations, despite their size (small, medium or large one should manage their risk of fraud. Fraud, in today’s world, is often committed by using computers and can only be revealed by digital forensic investigator. Not even small or medium-sized companies are secure from fraud. In the light of recent financial scandals that literary demolished not just economies of specific countries but entire world economy, we propose in this paper an optimal model of corporative computer incident digital forensic investigation (CCIDFI by using adopted mathematic model of the greed MCDM – multi-criteria decision-making method and the Expert Choice software tool for multi-criteria optimization of the CCIDFI readiness. Proposed model can, first of all, help managers of small and medium-sized companies to justify their decisions to employ digital forensic investigators and include them in their information security teams in order to choose the optimal CCIDFI model and improve forensic readiness in the computer incident management process that will result with minimization of potential losses of company in the future and improve its business quality.

  16. Judges Awareness, Understanding, and Application of Digital Evidence

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2011-03-01

    Full Text Available As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence.This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the first in the U.S. to examine judges and digital forensics, thus opening up a new avenue of research. It is the second time that grounded theory has been employed in a published digital forensics study, demonstrating the applicability of that methodology to this discipline.

  17. Design of a wireless forensic readiness model (WFRM)

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available ] Solomon, M.G., Barrett, D. & Broom, N. (2005). Computer forensics, The Best First Step towards a Career in Computer Forensics. SYBEX Inc, San Francisco, London. [13] RICCA Act, (22 January 2002). Regulation of Interception of Communications...: http://www.guidancesoftware.com/ediscovery/index.aspx, (Accessed 05 April 2009). [15] Forensic Toolkit. (10 July 2008). Access Data, A pioneer in digital investigations since 1987. Available from: http...

  18. Evaluation of a cognitive-behavioral program for chronically psychotic forensic inpatients.

    NARCIS (Netherlands)

    Hornsveld, R.H.J.; Nijman, H.L.I.

    2005-01-01

    The present study evaluated the progress of four groups of chronically psychotic patients in treatment at De Kijvelanden Forensic Psychiatric Hospital. The psychotic patients were offered a cognitive-behavioral program, including psycho education, grief processing, stress management, functional

  19. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  20. Digital forensic technologies as e-fraud risk mitigation tools in the banking industry: Evidence from Zimbabwe

    Directory of Open Access Journals (Sweden)

    Shewangu Dzomira

    2014-07-01

    Full Text Available The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. The paper is based on a descriptive study which studied digital forensics and cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that fraud detection and prevention tools and technologies would be most effective way of combating e-fraud if they can be utilized. It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application to get more efficient oversight

  1. Domain-Specific Optimization in Digital Forensics

    NARCIS (Netherlands)

    J. van den Bos (Jeroen); T. van der Storm (Tijs); Z. Hu; J. de Lara

    2012-01-01

    htmlabstractFile carvers are forensic software tools used to recover data from storage devices in order to find evidence. Every legal case requires different trade-offs between precision and runtime performance. The resulting required changes to the software tools are performed manually and under

  2. Forensic hash for multimedia information

    Science.gov (United States)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  3. Assessment of the Forensic Sciences Profession. A Survey of Educational Offerings in the Forensic Sciences. Volume I.

    Science.gov (United States)

    Field, Kenneth S.; And Others

    This survey of the educational offerings in the Forensic Sciences was initiated to identify institutions and agencies offering educational courses and/or programs in the forensic sciences and to evaluate the availability of these programs. The information gathered by surveying members of the American Academy of Forensic Sciences reveals that…

  4. An introduction to computer forensics.

    Science.gov (United States)

    Furneaux, Nick

    2006-07-01

    This paper provides an introduction to the discipline of Computer Forensics. With computers being involved in an increasing number, and type, of crimes the trace data left on electronic media can play a vital part in the legal process. To ensure acceptance by the courts, accepted processes and procedures have to be adopted and demonstrated which are not dissimilar to the issues surrounding traditional forensic investigations. This paper provides a straightforward overview of the three steps involved in the examination of digital media: Acquisition of data. Investigation of evidence. Reporting and presentation of evidence. Although many of the traditional readers of Medicine, Science and the Law are those involved in the biological aspects of forensics, I believe that both disciplines can learn from each other, with electronic evidence being more readily sought and considered by the legal community and the long, tried and tested scientific methods of the forensic community being shared and adopted by the computer forensic world.

  5. The state of nuclear forensics

    International Nuclear Information System (INIS)

    Kristo, Michael J.; Tumey, Scott J.

    2013-01-01

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  6. The state of nuclear forensics

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, Michael J. [Chemical Sciences Division, Lawrence Livermore National Laboratory, P.O. Box 808, L-186, Livermore, CA 94551 (United States); Tumey, Scott J., E-mail: tumey2@llnl.gov [Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory, P.O. Box 808, L-397, Livermore, CA 94551 (United States)

    2013-01-15

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  7. Uses of software in digital image analysis: a forensic report

    Science.gov (United States)

    Sharma, Mukesh; Jha, Shailendra

    2010-02-01

    Forensic image analysis is required an expertise to interpret the content of an image or the image itself in legal matters. Major sub-disciplines of forensic image analysis with law enforcement applications include photo-grammetry, photographic comparison, content analysis and image authentication. It has wide applications in forensic science range from documenting crime scenes to enhancing faint or indistinct patterns such as partial fingerprints. The process of forensic image analysis can involve several different tasks, regardless of the type of image analysis performed. Through this paper authors have tried to explain these tasks, which are described in to three categories: Image Compression, Image Enhancement & Restoration and Measurement Extraction. With the help of examples like signature comparison, counterfeit currency comparison and foot-wear sole impression using the software Canvas and Corel Draw.

  8. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  9. The role of forensic dentist following mass disaster | Kolude | Annals ...

    African Journals Online (AJOL)

    The various forensic dental modalities of identification that include matching techniques, postmortem profiling, genetic fingerprinting, dental fossil assessment and dental biometrics with digital subtraction were considered. The varying extent of use of forensic dental techniques and the resulting positive impact on human ...

  10. Using noise inconsistencies for blind image forensics

    Czech Academy of Sciences Publication Activity Database

    Saic, Stanislav; Mahdian, Babak

    2009-01-01

    Roč. 27, č. 10 (2009), s. 1497-1503 ISSN 0262-8856 R&D Projects: GA ČR GA102/08/0470 Institutional research plan: CEZ:AV0Z10750506 Keywords : Image forensics * Digital forgery * Image tampering * Image segmentation Subject RIV: IN - Informatics, Computer Science Impact factor: 1.474, year: 2009 http://library.utia.cas.cz/separaty/2009/ZOI/saic-using%20noise%20inconsistencies%20for%20blind%20image%20forensics.pdf

  11. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    OpenAIRE

    Grover Kearns

    2010-01-01

    Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting stu...

  12. Intelligent wireless forensic model (IWFM) for moving devices between wireless networks

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2008-09-01

    Full Text Available Donald, Forensic Analysis of the Contents of Nokia Mobile Phones, 2006, Pp 1-4. [3] W.G. Kruse and J.G. Heiser, Computer Forensics, Incident response essentials, Addison-Wesley, Boston, 2001. [4] M. Kohn, J.H.P. Eloff, M. Olivier, Framework for a Digital...

  13. Judges Awareness, Understanding, and Application of Digital Evidence

    OpenAIRE

    Gary C Kessler

    2011-01-01

    As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence.This paper d...

  14. Managing digital evidence: the governance of digital forensics

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-01-01

    Full Text Available and documentation of digital evidence stored as data or magnetically encoded information (Vacca 2002:731). This extends to include the recovery, analysis and presentation of digital evidence in a way that is admissible and appropriate in a court of law...

  15. Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

    Directory of Open Access Journals (Sweden)

    Thomas Nash

    2013-06-01

    Full Text Available Shavers, B. (2013. Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Waltham, MA: Elsevier, 290 pages, ISBN-978-1-59749-985-9, US$51.56. Includes bibliographical references and index.Reviewed by Detective Corporal Thomas Nash (tnash@bpdvt.org, Burlington Vermont Police Department, Internet Crime against Children Task Force. Adjunct Instructor, Champlain College, Burlington VT.In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation.  Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized and easy to follow sections, with real case file examples to reach the ultimate goal of any investigation: identifying the suspect and proving their guilt in the crime. Do not be fooled by the title. This excellent, easily accessible reference is beneficial to both criminal as well as civil investigations and should be in every investigator’s library regardless of their respective criminal or civil investigative responsibilities.(see PDF for full review

  16. Information Assurance and Forensic Readiness

    Science.gov (United States)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  17. The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system.

    Science.gov (United States)

    Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian

    2015-08-05

    In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  18. The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system

    Science.gov (United States)

    Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian

    2015-01-01

    In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. PMID:26101289

  19. An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps.

    Science.gov (United States)

    Cahyani, Niken Dwi Wahyu; Martini, Ben; Choo, Kim-Kwang Raymond; Ab Rahman, Nurul Hidayah; Ashman, Helen

    2018-05-01

    Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence-based forensic taxonomy of Windows Phone communication apps, using an existing two-dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps. © 2017 American Academy of Forensic Sciences.

  20. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    Directory of Open Access Journals (Sweden)

    Grover Kearns

    2010-06-01

    Full Text Available Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants. Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. This paper presents a curriculum design methodology for teaching graduate accounting students computer forensics. The methodology is tested using perceptions of the students about the success of the methodology and their acquisition of forensics knowledge and skills. An important component of the pedagogical approach is the use of an annotated list of over 50 forensic web-based tools.

  1. Recovery and identification of human remains in post-conflict environments: A comparative study of the humanitarian forensic programs in Cyprus and Kosovo.

    Science.gov (United States)

    Mikellide, Maria

    2017-10-01

    This study follows the humanitarian forensic programs in Cyprus and Kosovo over a ten-year period with an emphasis on the role of local capacity building. It begins by providing an in-depth historical account of forensic activities, followed by a comparison of the rate of excavations, exhumations and identifications. Through this analysis, a repeated pattern emerges whereby forensic activities in Kosovo start with a surge in values, which drop drastically in the first few years of operations, followed by a steadily declining productivity curve. By contrast, in Cyprus, activities begin modestly, with lower values allowing for some modest growth. Close observation of the two programs provides indications as to the factors that may influence the development of forensic programs as well as the elements that need to be set in place to create an environment conducive to greater sustainability through local ownership and responsibility. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. The Forensics Aspects of Event Data Recorders

    Directory of Open Access Journals (Sweden)

    Jeremy S. Daily

    2008-09-01

    Full Text Available The proper generation and preservation of digital data from Event Data Recorders (EDRs can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in order to provide more complete and usable data. The presented issues should assist in the identification and development of a model for forensically sound collection and investigation techniques for EDRs.

  3. Application of forensic image analysis in accident investigations.

    Science.gov (United States)

    Verolme, Ellen; Mieremet, Arjan

    2017-09-01

    Forensic investigations are primarily meant to obtain objective answers that can be used for criminal prosecution. Accident analyses are usually performed to learn from incidents and to prevent similar events from occurring in the future. Although the primary goal may be different, the steps in which information is gathered, interpreted and weighed are similar in both types of investigations, implying that forensic techniques can be of use in accident investigations as well. The use in accident investigations usually means that more information can be obtained from the available information than when used in criminal investigations, since the latter require a higher evidence level. In this paper, we demonstrate the applicability of forensic techniques for accident investigations by presenting a number of cases from one specific field of expertise: image analysis. With the rapid spread of digital devices and new media, a wealth of image material and other digital information has become available for accident investigators. We show that much information can be distilled from footage by using forensic image analysis techniques. These applications show that image analysis provides information that is crucial for obtaining the sequence of events and the two- and three-dimensional geometry of an accident. Since accident investigation focuses primarily on learning from accidents and prevention of future accidents, and less on the blame that is crucial for criminal investigations, the field of application of these forensic tools may be broader than would be the case in purely legal sense. This is an important notion for future accident investigations. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. The Rise of Forensic Pathology in Human Medicine: Lessons for Veterinary Forensic Pathology.

    Science.gov (United States)

    Pollanen, M S

    2016-09-01

    The rise of forensic pathology in human medicine has greatly contributed to the administration of justice, public safety and security, and medical knowledge. However, the evolution of human forensic pathology has been challenging. Veterinary forensic pathologists can learn from some of the lessons that have informed the growth and development of human forensic pathology. Three main observations have emerged in the past decade. First, wrongful convictions tell us to use a truth-seeking stance rather than an a priori "think dirty" stance when investigating obscure death. Second, missed homicides and concealed homicides tell us that training and certification are the beginning of reliable forensic pathology. Third, failure of a sustainable institutional arrangement that fosters a combination of service, research, and teaching will lead to stagnation of knowledge. Forensic pathology of humans and animals will flourish, help protect society, and support justice if we embrace a modern biomedical scientific model for our practice. We must build training programs, contribute to the published literature, and forge strong collaborative institutions. © The Author(s) 2016.

  5. Factors Predicting Organizational Identification with Intercollegiate Forensics Teams

    Science.gov (United States)

    Croucher, Stephen M.; Long, Bridget L.; Meredith, Michael J.; Oommen, Deepa; Steele, Emily L.

    2009-01-01

    This study examines the relationship between intercollegiate forensics competitors' organizational identification and organizational culture. Through a survey analysis of 314 intercollegiate forensics students, this study reports three major findings. First, this study found male competitors identify with forensics programs more than female…

  6. Forensic Tools for Mobile Phone Subscriber Identity Modules

    Directory of Open Access Journals (Sweden)

    Wayne Jansen

    2006-06-01

    Full Text Available Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous.  Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management.  When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device.  For devices conforming to the Global System for Mobile Communications (GSM standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM.  This paper gives a snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover.

  7. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Science.gov (United States)

    Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880

  8. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Suleman Khan

    2014-01-01

    Full Text Available Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  9. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.

    Science.gov (United States)

    Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  10. Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2010-03-01

    Full Text Available Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task performance responses from forensic computer examiners with an expert review panel and measure the relationship with the characteristics of the examiners to their quality responses. The results of this analysis provide insight into identifying forensic computer examiners that provide high-quality responses. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

  11. An interactive program on digitizing historical seismograms

    Science.gov (United States)

    Xu, Yihe; Xu, Tao

    2014-02-01

    Retrieving information from analog seismograms is of great importance since they are considered as the unique sources that provide quantitative information of historical earthquakes. We present an algorithm for automatic digitization of the seismograms as an inversion problem that forms an interactive program using Matlab® GUI. The program integrates automatic digitization with manual digitization and users can easily switch between the two modalities and carry out different combinations for the optimal results. Several examples about applying the interactive program are given to illustrate the merits of the method.

  12. Virtual reality and 3D animation in forensic visualization.

    Science.gov (United States)

    Ma, Minhua; Zheng, Huiru; Lallie, Harjinder

    2010-09-01

    Computer-generated three-dimensional (3D) animation is an ideal media to accurately visualize crime or accident scenes to the viewers and in the courtrooms. Based upon factual data, forensic animations can reproduce the scene and demonstrate the activity at various points in time. The use of computer animation techniques to reconstruct crime scenes is beginning to replace the traditional illustrations, photographs, and verbal descriptions, and is becoming popular in today's forensics. This article integrates work in the areas of 3D graphics, computer vision, motion tracking, natural language processing, and forensic computing, to investigate the state-of-the-art in forensic visualization. It identifies and reviews areas where new applications of 3D digital technologies and artificial intelligence could be used to enhance particular phases of forensic visualization to create 3D models and animations automatically and quickly. Having discussed the relationships between major crime types and level-of-detail in corresponding forensic animations, we recognized that high level-of-detail animation involving human characters, which is appropriate for many major crime types but has had limited use in courtrooms, could be useful for crime investigation. © 2010 American Academy of Forensic Sciences.

  13. The FAA's postmortem forensic toxicology self-evaluated proficiency test program: the second seven years.

    Science.gov (United States)

    Chaturvedi, Arvind K; Craft, Kristi J; Cardona, Patrick S; Rogers, Paul B; Canfield, Dennis V

    2009-05-01

    During toxicological evaluations of samples from fatally injured pilots involved in civil aviation accidents, a high degree of quality control/quality assurance (QC/QA) is maintained. Under this philosophy, the Federal Aviation Administration (FAA) started a forensic toxicology proficiency-testing (PT) program in July 1991. In continuation of the first seven years of the PT findings reported earlier, PT findings of the next seven years are summarized herein. Twenty-eight survey samples (12 urine, 9 blood, and 7 tissue homogenate) with/without alcohols/volatiles, drugs, and/or putrefactive amine(s) were submitted to an average of 31 laboratories, of which an average of 25 participants returned their results. Analytes in survey samples were correctly identified and quantitated by a large number of participants, but some false positives of concern were reported. It is anticipated that the FAA's PT program will continue to serve the forensic toxicology community through this important part of the QC/QA for laboratory accreditations.

  14. [The problems of professional competence in the complementary professional forensic medical expertise programs of advanced training and professional requalification].

    Science.gov (United States)

    Shadymov, A B; Fominykh, S A; Dik, V P

    This article reports the results of the analysis of the new tendencies and normatives of the working legislation in the field of additional professional education in the speciality of «forensic medical expertise» and the application of the competency-based approach to the training of specialists in the framework of professional requalification and advanced training programs. Special attention is given to the problems of organization of the educational process and the elaboration of additional training programs based on the competency approach to the training of specialists at the Department of Forensic Medicine and Law with the professor V.N. Kryukov Course of Advanced Professional Training and Professional Requalification of Specialists at the state budgetary educational Institution of higher professional education «Altai State Medical University», Russian Ministry of Health. The study revealed the problems pertaining to the development of professional competencies in the framework of educational programs for the professional requalification and advanced training in the speciality «forensic medical expertise». The authors propose the legally substantiated approaches to the solution of these problems.

  15. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  16. Can we continue to effectively police digital crime?

    Science.gov (United States)

    Horsman, Graeme

    2017-11-01

    Now approximately 30years old, the field of digital forensics is arguably facing some of its greatest challenges to date. Whilst currently supporting law enforcement in numerous criminal cases annually, questions are beginning to emerge regarding whether it can sustain this contribution, with digital crime remaining prevalent. In his first live interview in September 2015, Head of MI5, Andrew Parker indicated that individuals are now engaging in computing acts which are beyond the control of authorities, confirming earlier remarks made by British Prime Minister David Cameron in the wake of the Charlie Hebdo attacks. Such comments cast doubt on the future effectiveness of the digital forensic discipline and its ability to effectively investigate those who implement the latest forms of technology to carry out illicit acts. This article debates the controversial question, could we be facing an era where digital crime can no longer be effectively policed? Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  17. Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model

    Directory of Open Access Journals (Sweden)

    Gary D Cantrell

    2012-12-01

    Full Text Available Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to date to model digital triage. This work discuses the further development of a model that does attempt to address digital triage the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.

  18. Nuclear Forensics at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Lamont, Stephen Philip [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-30

    Nuclear forensics assists in responding to any event where nuclear material is found outside of regulatory control; a response plan is presented and a nuclear forensics program is undergoing further development so that smugglers are sufficiently deterred.

  19. USB Storage Device Forensics for Windows 10.

    Science.gov (United States)

    Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider

    2018-05-01

    Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.

  20. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  1. GetData Digitizing Program Code: Description, Testing, Training

    International Nuclear Information System (INIS)

    Taova, S.

    2013-01-01

    90 percents of compilation in our center is obtained by data digitizing. So we are rather interested in the development of different techniques of data digitizing. Plots containing a great amount of points and solid lines are most complicated for digitizing. From our point of view including to the Exfor-Digitizer procedures of automatic or semi-automatic digitizing will allow to simplify significantly this process. We managed to test some free available program codes. Program GETDATA Graph Digitizer (www.getdata- graph-digitizer.com) looks more suitable for our purposes. GetData Graph Digitizer is a program for digitizing graphs, plots and maps. Main features of GetData Graph Digitizer are: - supported graphics formats are TIFF, JPEG, BMP and PCX; - two algorithms for automatic digitizing; - convenient manual digitizing; - reorder tool for easy points reordering; - save/open workspace, which allows to save the work and return to it later; - obtained data can be exported to the clipboard; - export to the formats: TXT (text file), XLS (MS Excel), XML, DXF (AutoCAD) and EPS (PostScript). GetData Graph Digitizer includes two algorithms for automatic digitizing. Auto trace lines: This method is designed to digitize solid lines. Choose the starting point, and the program will trace the line, stopping at it's end. To trace the line use Operations =>Auto trace lines menu or context menu ('Auto trace lines' item). To choose starting point click left mouse button, or click right mouse button to additionally choose direction for line tracing. Digitize area: The second way is to set digitizing area. This method works for any type of lines, including dashed lines. Data points are set at the intersection of grid with the line. You can choose the type of grid (X grid or Y grid), and set the distance between grid lines. You can also make the grid be shifted in such a way, that it will pass through a specific X (or Y) value. To digitize area use Operations →Digitize area menu

  2. Forensic odontology education:from undergraduate to PhD - a Brazilian experience.

    Science.gov (United States)

    Dietrichkeit Pereira, J G; Frontanilla Recalde, T S; Barreto Costa, P; Jacometti, V; Vigorito Magalhães, L; Alves Da Silva, R H

    2017-12-01

    Forensic Odontology is a topic present in the majority of Dental Schools in Brazil, and due to this reality, some universities develop activities related to undergraduate and graduate students, from the Dentistry course until the Ph.D. degree. To present the education experience related to Forensic Odontology at School of Dentistry of Ribeirão Preto (USP - University of São Paulo), showing the strategies and activities in the different degrees (Dental course, Forensic Odontology Specialization Program, Specific Professional Training, Master, and Ph.D.). To the undergraduate students, many activities are developed in order to demonstrate all the possibilities that Forensic Dentistry allow, including theoretical and practical activities; in the Forensic Odontology Specialization Program, the dentists are trained to act as Forensic Odontologists in all its amplitude; in the Specific Professional Training, some courses are available, related to specific topics as DVI, Forensic Facial Reconstruction, Auditor in Dental Care Insurance and others; and in the Master and Ph.D. Programs, the professionals receive training in skills like teaching, research, student's guidance and others. In Brazil, Forensic Odontology is a well-known field in Dentistry and universities develop an important role in training a qualified workforce.

  3. Integrated computer-aided forensic case analysis, presentation, and documentation based on multimodal 3D data.

    Science.gov (United States)

    Bornik, Alexander; Urschler, Martin; Schmalstieg, Dieter; Bischof, Horst; Krauskopf, Astrid; Schwark, Thorsten; Scheurer, Eva; Yen, Kathrin

    2018-06-01

    Three-dimensional (3D) crime scene documentation using 3D scanners and medical imaging modalities like computed tomography (CT) and magnetic resonance imaging (MRI) are increasingly applied in forensic casework. Together with digital photography, these modalities enable comprehensive and non-invasive recording of forensically relevant information regarding injuries/pathologies inside the body and on its surface. Furthermore, it is possible to capture traces and items at crime scenes. Such digitally secured evidence has the potential to similarly increase case understanding by forensic experts and non-experts in court. Unlike photographs and 3D surface models, images from CT and MRI are not self-explanatory. Their interpretation and understanding requires radiological knowledge. Findings in tomography data must not only be revealed, but should also be jointly studied with all the 2D and 3D data available in order to clarify spatial interrelations and to optimally exploit the data at hand. This is technically challenging due to the heterogeneous data representations including volumetric data, polygonal 3D models, and images. This paper presents a novel computer-aided forensic toolbox providing tools to support the analysis, documentation, annotation, and illustration of forensic cases using heterogeneous digital data. Conjoint visualization of data from different modalities in their native form and efficient tools to visually extract and emphasize findings help experts to reveal unrecognized correlations and thereby enhance their case understanding. Moreover, the 3D case illustrations created for case analysis represent an efficient means to convey the insights gained from case analysis to forensic non-experts involved in court proceedings like jurists and laymen. The capability of the presented approach in the context of case analysis, its potential to speed up legal procedures and to ultimately enhance legal certainty is demonstrated by introducing a number of

  4. Multi-Stakeholder Case Prioritization in Digital Investigations

    Directory of Open Access Journals (Sweden)

    Joshua I. James

    2014-09-01

    Full Text Available This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources. Current methods of case prioritization, as well as observed prioritization methods used in digital forensic investigation laboratories are examined. After, a multi-stakeholder approach to case prioritization is given that may help reduce reputational risk to digital forensic laboratories while improving resource allocation. A survey is given that shows differing opinions of investigation priority between Law Enforcement and the public that is used in the development of a prioritization model. Finally, an example case is given to demonstrate the practicality of the proposed method.

  5. Forensic challenges for handling incidents and crime in cyberspace

    CSIR Research Space (South Africa)

    Taute, B

    2009-10-01

    Full Text Available their goals. Who will bring law and order to cyberspace? This presentation focuses on the technology challenges for dealing with digital forensics and the time factor in dealing with incidents and crime in cyberspace....

  6. The evaluation of a digital information literacy program

    Directory of Open Access Journals (Sweden)

    Anne Sieberhagen

    2012-10-01

    Full Text Available The article reports on the evaluation of a digital information literacy program (DILP to determine the program’s effectiveness in enhancing students’ digital information literacy skills. The DILP was originally designed and developed for the South African student, as member of Generation Y, but was adapted after identifying the demographics and characteristics of Generation Z.  This information was incorporated in the existing DILP, therefore making the DILP applicable to and useful for both Generations Y and Z. New learning technologies were identified and incorporated in the DILP to enhance students’ learning experience. An analysis of reported research indicated that there is a lack in the evaluation of programs to determine their effectiveness in enhancing the digital information literacy skills of students by using an outcomes assessment instrument. The development of an outcomes assessment instrument, which is based on internationally benchmarked information literacy competency standards and their outcomes, are presented. Evidence is provided of the effectiveness of the program in order to prove its worth as an instructional program.  Recommendations are made on how digital information literacy programs may be improved to be more effective in enhancing students’ digital information literacy skills

  7. Isolation and genetic analysis of pure cells from forensic biological mixtures: The precision of a digital approach.

    Science.gov (United States)

    Fontana, F; Rapone, C; Bregola, G; Aversa, R; de Meo, A; Signorini, G; Sergio, M; Ferrarini, A; Lanzellotto, R; Medoro, G; Giorgini, G; Manaresi, N; Berti, A

    2017-07-01

    Latest genotyping technologies allow to achieve a reliable genetic profile for the offender identification even from extremely minute biological evidence. The ultimate challenge occurs when genetic profiles need to be retrieved from a mixture, which is composed of biological material from two or more individuals. In this case, DNA profiling will often result in a complex genetic profile, which is then subject matter for statistical analysis. In principle, when more individuals contribute to a mixture with different biological fluids, their single genetic profiles can be obtained by separating the distinct cell types (e.g. epithelial cells, blood cells, sperm), prior to genotyping. Different approaches have been investigated for this purpose, such as fluorescent-activated cell sorting (FACS) or laser capture microdissection (LCM), but currently none of these methods can guarantee the complete separation of different type of cells present in a mixture. In other fields of application, such as oncology, DEPArray™ technology, an image-based, microfluidic digital sorter, has been widely proven to enable the separation of pure cells, with single-cell precision. This study investigates the applicability of DEPArray™ technology to forensic samples analysis, focusing on the resolution of the forensic mixture problem. For the first time, we report here the development of an application-specific DEPArray™ workflow enabling the detection and recovery of pure homogeneous cell pools from simulated blood/saliva and semen/saliva mixtures, providing full genetic match with genetic profiles of corresponding donors. In addition, we assess the performance of standard forensic methods for DNA quantitation and genotyping on low-count, DEPArray™-isolated cells, showing that pure, almost complete profiles can be obtained from as few as ten haploid cells. Finally, we explore the applicability in real casework samples, demonstrating that the described approach provides complete

  8. 28 CFR 90.14 - Forensic medical examination payment requirement.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Forensic medical examination payment... Program § 90.14 Forensic medical examination payment requirement. (a) For the purpose of this subpart B, a... entity incurs the full out-of-pocket costs of forensic medical examinations for victims of sexual assault...

  9. Teaching Forensic Psychiatry to General Psychiatry Residents

    Science.gov (United States)

    Lewis, Catherine F.

    2004-01-01

    Objective: The Accreditation Council on Graduate Medical Education (ACGME) requires that general psychiatry residency training programs provide trainees with exposure to forensic psychiatry. Limited information is available on how to develop a core curriculum in forensic psychiatry for general psychiatry residents and few articles have been…

  10. Cross-cultural issues in forensic psychiatry training.

    Science.gov (United States)

    Layde, Joseph B

    2004-01-01

    Forensic psychiatry was officially recognized as a subspecialty by the American Board of Medical Specialties in the 1990's. In 1994, the American Board of Psychiatry and Neurology (ABPN) gave its first written examination to certify forensic psychiatrists. In 1996, the Accreditation Council for Graduate Medical Education (ACGME) began to officially accredit one-year residency experiences in forensic psychiatry, which follow a 4-year residency in general psychiatry. The extra year of training, colloquially known as a fellowship, is required for candidates who wish to receive certification in the subspecialty of forensic psychiatry; since 2001, completion of a year of training in a program accredited by ACGME has been required for candidates wishing to take the ABPN forensic psychiatry subspecialty examination. With the formal recognition of the subspecialty of forensic psychiatry comes the need to examine special issues of cultural importance which apply specifically to forensic psychiatry training. This paper examines the current literature on cross-cultural issues in forensic psychiatry, sets out several of the societal reasons for the importance of emphasizing those issues in forensic psychiatric training, and discusses how those issues are addressed in the curriculum of one forensic psychiatry fellowship at the Medical College of Wisconsin (MCW). While much has been written about cross-cultural issues in general psychiatry, very little has appeared in the literature on the topic of cross-cultural issues in forensic psychiatry.

  11. Criminalistics and the forensic nursing process.

    Science.gov (United States)

    Burgess, Ann Wolbert; Piatelli, Michael J; Pasqualone, Georgia

    2011-06-01

    Students learn science by actually performing science activities. The 12 laboratories described in this article assist students in applying the fundamental techniques germane to the field of forensic science to "solve" contrived cases and present "evidence" in a mock trial. Moreover, students are also confronted with some of the legal and ethical issues concerning the validity, reliability, and application of some forensic techniques. The pedagogical design of the laboratory course provides a rich, challenging, and interdisciplinary academic experience intended to augment and compliment the didactic forensic lecture portion of the course. This laboratory course was designed to engender, embody, and articulate one of the University's directive goals to support interdisciplinary teaching, research, and programming. Because we developed the laboratories on minimal funds, we demonstrated that it could be cost-effective. And thus, we recommend a laboratory science course be included as part of the curriculum of all forensic nursing students and practitioners. © 2011 International Association of Forensic Nurses.

  12. Column: The Science of Digital Forensics: Analysis of Digital Traces

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2012-09-01

    Full Text Available In part 1 of this series (Cohen, 2011a, Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.“Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine."(see PDF for full column

  13. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  14. Expanding forensic science through forensic intelligence.

    Science.gov (United States)

    Ribaux, Olivier; Talbot Wright, Benjamin

    2014-12-01

    Research and Development ('R&D') in forensic science currently focuses on innovative technologies improving the efficiency of existing forensic processes, from the detection of marks and traces at the scene, to their presentation in Court. R&D approached from this perspective provides no response to doubts raised by recent criminological studies, which question the effective contribution of forensic science to crime reduction, and to policing in general. Traces (i.e. forensic case data), as remnants of criminal activity are collected and used in various forms of crime monitoring and investigation. The aforementioned doubts therefore need to be addressed by expressing how information is conveyed by traces in these processes. Modelling from this standpoint expands the scope of forensic science and provides new R&D opportunities. Twelve propositions for R&D are stated in order to pave the way. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  15. PENGEMBANGAN PROGRAM PENGOLAHAN CITRA UNTUK RADIOGRAFI DIGITAL

    Directory of Open Access Journals (Sweden)

    EC Nugroho

    2012-09-01

    Full Text Available Telah dikembangkan sebuah program pengolahan citra untuk radiografi digital yang disusun menggunakan perangkat lunak Borland C++ Builder 4 Professional. Untuk melakukan pengolahan terhadap citra radiografi digital,dengan pengolahan terhadap pixel-pixel dari citra. Teknik pengolahan citra, meliputi pengaturan kecerahan citra (image brightness, kontras citra (image contras, pelembutan citra (image smoothing, penajaman citra (image sharpening, deteksi tepi (edge detection, citra negatif (negative image, dan histogram. Hasil pengolahan citra dihasilkan citra radiografi digital yang mudah  diinterprestasi  lebih  teliti  oleh  pengamat.  Tujuan penelitian ini adalah mendesain perangkat lunak pengolahan citra radiografi digital. Perangkat yang telah disusun kemudian digunakan untuk melakukan pengolahan terhadap citra radiografi digital. Hasil penelitian menunjukkan adanya peningkatan kualitas citra radiografi digital, sehingga dapat membantu seorang radiographer dalam mendiagnosa atau menginterprestasikan citra radiografi digital lebih teliti. Citra radiografi awal dan citra hasilnya dapat dilihat pada layar monitor sehingga  kualitas  pengolahan  dapat dibandingkan secara langsung. The image processing program has been developed for digital radiography that is designed by using software Borland C++ Builder 4 Professional to process the radiography digital image with image pixels processing. Image processing technique consists of image brightness, image contrast, image smoothing, image sharpening, edge detection, and negative image and histogram. From the result of image processing it produced radiography image that is easier to interpret by the observer. The purpose of this research is to design the software of image processing for digital radiography. Then the software is used as the image processor for digital radiography. The result shows that there is a quality improvement of digital radiography image, so it can help

  16. Development of a Bi-Disciplinary Course in Forensic Science

    Directory of Open Access Journals (Sweden)

    Stacey L. Raimondi

    2013-08-01

    Full Text Available Forensic science programs and courses have traditionally been housed within chemistry departments at the college/university level, largely because the pioneers of the field were chemists who applied technology that was more chemical than biological in nature. However, with the development of such areas of study as DNA analysis, anatomical studies, and forensic entomology, it is becoming more and more important for forensic science students to have a strong biological background as well as a chemical background. Furthermore, while biology students are typically required to have extensive chemistry training as part of their major, the converse is not true for chemistry students. Therefore, it is possible that a student interested in forensic science could complete a major in chemistry and never have taken a biology class, leaving them woefully under-prepared for any type of masters program or career in forensic science immediately following graduation. Indeed, an examination of available positions in forensic science shows a large number of positions for DNA analysts for which the typical chemistry student would not be prepared without extensive biology training (http://www.aafs.org. Furthermore, positions for medical examiners or pathologists require extensive training in biology in addition to the continued medical training and residency programs. Therefore, it seems imperative that introductory forensic science courses adapt to these needs and be taught with a more bi-disciplinary approach in order to educate students on the whole field rather than one aspect. To that end, a new bi-disciplinary Forensic Science course was developed at Elmhurst College. This course was team-taught by a biology and a chemistry professor so that students would obtain a thorough understanding of the field and techniques used by both biologists and chemists. A description of this new version of a forensic science course follows, focusing on the addition of biology

  17. Thinking forensics: Cognitive science for forensic practitioners.

    Science.gov (United States)

    Edmond, Gary; Towler, Alice; Growns, Bethany; Ribeiro, Gianni; Found, Bryan; White, David; Ballantyne, Kaye; Searston, Rachel A; Thompson, Matthew B; Tangen, Jason M; Kemp, Richard I; Martire, Kristy

    2017-03-01

    Human factors and their implications for forensic science have attracted increasing levels of interest across criminal justice communities in recent years. Initial interest centred on cognitive biases, but has since expanded such that knowledge from psychology and cognitive science is slowly infiltrating forensic practices more broadly. This article highlights a series of important findings and insights of relevance to forensic practitioners. These include research on human perception, memory, context information, expertise, decision-making, communication, experience, verification, confidence, and feedback. The aim of this article is to sensitise forensic practitioners (and lawyers and judges) to a range of potentially significant issues, and encourage them to engage with research in these domains so that they may adapt procedures to improve performance, mitigate risks and reduce errors. Doing so will reduce the divide between forensic practitioners and research scientists as well as improve the value and utility of forensic science evidence. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  18. Nuclear and Radiological Forensics and Attribution Overview

    International Nuclear Information System (INIS)

    Smith, D K; Niemeyer, S

    2005-01-01

    The goal of the U.S. Department of Homeland Security (DHS) Nuclear and Radiological Forensics and Attribution Program is to develop the technical capability for the nation to rapidly, accurately, and credibly attribute the origins and pathways of interdicted or collected materials, intact nuclear devices, and radiological dispersal devices. A robust attribution capability contributes to threat assessment, prevention, and deterrence of nuclear terrorism; it also supports the Federal Bureau of Investigation (FBI) in its investigative mission to prevent and respond to nuclear terrorism. Development of the capability involves two major elements: (1) the ability to collect evidence and make forensic measurements, and (2) the ability to interpret the forensic data. The Program leverages the existing capability throughout the U.S. Department of Energy (DOE) national laboratory complex in a way that meets the requirements of the FBI and other government users. At the same time the capability is being developed, the Program also conducts investigations for a variety of sponsors using the current capability. The combination of operations and R and D in one program helps to ensure a strong linkage between the needs of the user community and the scientific development

  19. Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics.

    Science.gov (United States)

    Ruffell, Alastair

    2010-10-10

    We now have a confusing set of five commonly used terms for the application of Earth evidence in forensic science. This confusion is resulting in Earth scientists who use these methods mentioning different terms, sometimes for the same type of study. Likewise, forensic scientists, police/law enforcement officers and those employed by courts of law are becoming confused as to what each term means. A nomenclatural framework (based on the first use of each term) is proposed to encourage consistency in the use of terminology. Generally, the number of Earth science applications has grown through time, from soil and sediment analysis to remote sensing and GIS. The issue of where forensic biology and microbiology sits with these uses of Earth evidence is considered. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  20. Framework para la computación forense en Colombia

    Directory of Open Access Journals (Sweden)

    Andrés F. Álvarez Serna

    2012-12-01

    Full Text Available Este FRAMEWORK es un conjunto estandarizado de conceptos, prácticas y criterios para enfocar la problemática a la que se enfrentan los investigadores forenses al momento de procesar las evidencias digitales. Este artículo se refiere a la forense digital en conceptos generales y ubica al lector en el presente de esta ciencia y muestra una guía de pasos a seguir para la recolección y tratamiento de las evidencias enmarcadas en las leyes colombianas y servirá como material de apoyo a estudiantes interesados en el tema y/o quienes ya estén en el medio.

  1. In defense of forensic social science

    Directory of Open Access Journals (Sweden)

    Amir Goldberg

    2015-11-01

    Full Text Available Like the navigation tools that freed ancient sailors from the need to stay close to the shoreline—eventually affording the discovery of new worlds—Big Data might open us up to new sociological possibilities by freeing us from the shackles of hypothesis testing. But for that to happen we need forensic social science: the careful compilation of evidence from unstructured digital traces as a means to generate new theories.

  2. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these

  3. Forensic Science Curriculum for High School Students

    Science.gov (United States)

    Burgess, Christiana J.

    Over the last several decades, forensic science---the application of science to civil and criminal legal matters---has become of increasing popularity with the public. The range of disciplines within the field is immense, offering individuals the potential for a unique career, regardless of their specific interests or expertise. In response to this growth, many organizations, both public and private, have recognized the need to create forensic science programs that strive to maintain and enhance the quality of forensic science education. Unfortunately, most of the emphasis placed on developing these materials relates to post-secondary education, and creates a significant lack of forensic science educational materials available in the U.S., especially in Oklahoma. The purpose of this project was to create a high school curriculum that provides the foundation for building a broad, yet comprehensive, overview of the field of forensic science and its associated disciplines. The overall goal was to create and provide course materials to high school teachers in order to increase their knowledge of forensic science such that they are able to teach its disciplines effectively and with accuracy. The Forensic Science Curriculum for High School Students includes sample lesson plans, PowerPoint presentations, and lab activities with step-by-step instructions.

  4. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  5. Audit in forensic pathology.

    Science.gov (United States)

    Burke, M P; Opeskin, K

    2000-09-01

    Autopsy numbers in Australian hospitals have declined markedly during the past decade despite evidence of a relatively static rate of demonstrable clinical misdiagnosis during this time. The reason for this decrease in autopsy numbers is multifactorial and may include a general lack of clinical and pathologic interest in the autopsy with a possible decline in autopsy standard, a lack of clinicopathologic correlation after autopsies, and an increased emphasis on surgical biopsy reporting within hospital pathology departments. Although forensic autopsies are currently maintaining their numbers, it is incumbent on forensic pathologists to demonstrate the wealth of important information a carefully performed postmortem examination can reveal. To this end, the Pathology Division of the Victorian Institute of Forensic Medicine has instituted a program of minimum standards in varied types of coroner cases and commenced a system of internal and external audit. The minimum standard for a routine, sudden, presumed natural death is presented and the audit system is discussed.

  6. Forensic learning disability nursing skills and competencies: a study of forensic and non-forensic nurses.

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne

    2010-11-01

    This paper reports on an investigation into the skills and competencies of forensic learning disability nurses in the United Kingdom. The two sample populations were forensic learning disability nurses from the high, medium, and low secure psychiatric services and non-forensic learning disability nurses from generic services. An information gathering schedule was used to collect the data; of 1200 schedules, 643 were returned for a response rate of 53.5%. The data identified the "top ten" problems that forensic learning disability nurses may encounter, the skills and competencies necessary to overcome them, and the areas that need to be developed in the future. The results indicated that the forensic learning disability nurses tended to focus on the physical aspects to the role whilst the non-forensic learning disability nurses tended to perceive the forensic role in relational terms. This has implications for practice, policy, and procedures.

  7. Forensic entomology: a template for forensic acarology?

    Science.gov (United States)

    Turner, Bryan

    2009-10-01

    Insects are used in a variety of ways in forensic science and the developing area of forensic acarology may have a similar range of potential. This short account summarises the main ways in which entomology currently contributes to forensic science and discusses to what extent acarology might also contribute in these areas.

  8. Computer forensics with FTK

    CERN Document Server

    Carbone, Fernando

    2014-01-01

    This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT profe

  9. Forensic Science.

    Science.gov (United States)

    Brettell, T. A.; Saferstein, R.

    1989-01-01

    Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)

  10. Forensic Chemistry

    Science.gov (United States)

    Bell, Suzanne

    2009-07-01

    Forensic chemistry is unique among chemical sciences in that its research, practice, and presentation must meet the needs of both the scientific and the legal communities. As such, forensic chemistry research is applied and derivative by nature and design, and it emphasizes metrology (the science of measurement) and validation. Forensic chemistry has moved away from its analytical roots and is incorporating a broader spectrum of chemical sciences. Existing forensic practices are being revisited as the purview of forensic chemistry extends outward from drug analysis and toxicology into such diverse areas as combustion chemistry, materials science, and pattern evidence.

  11. Light Water Reactor Sustainability Program. Digital Architecture Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Kenneth [Idaho National Lab. (INL), Idaho Falls, ID (United States); Oxstrand, Johanna [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-03-01

    The Digital Architecture effort is a part of the Department of Energy (DOE) sponsored Light-Water Reactor Sustainability (LWRS) Program conducted at Idaho National Laboratory (INL). The LWRS program is performed in close collaboration with industry research and development (R&D) programs that provides the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants (NPPs). One of the primary missions of the LWRS program is to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Therefore, a major objective of the LWRS program is the development of a seamless digital environment for plant operations and support by integrating information from plant systems with plant processes for nuclear workers through an array of interconnected technologies. In order to get the most benefits of the advanced technology suggested by the different research activities in the LWRS program, the nuclear utilities need a digital architecture in place to support the technology. A digital architecture can be defined as a collection of information technology (IT) capabilities needed to support and integrate a wide-spectrum of real-time digital capabilities for nuclear power plant performance improvements. It is not hard to imagine that many processes within the plant can be largely improved from both a system and human performance perspective by utilizing a plant wide (or near plant wide) wireless network. For example, a plant wide wireless network allows for real time plant status information to easily be accessed in the control room, field workers’ computer-based procedures can be updated based on the real time plant status, and status on ongoing procedures can be incorporated into smart schedules in the outage command center to allow for more accurate planning of critical tasks. The goal

  12. A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis

    OpenAIRE

    Doyoddorj, Munkhbaatar; Rhee, Kyung-Hyune

    2011-01-01

    Part 2: Workshop; International audience; Nowadays, digital images and videos have become increasingly popular over the Internet and bring great social impact to a wide audience. In the meanwhile, technology advancement allows people to easily alter the content of digital multimedia and brings serious concern on the trustworthiness of online multimedia information. In this paper, we propose a new framework for multimedia forensics by using compact side information based on reversible watermar...

  13. DNA Commission of the International Society for Forensic Genetics: Recommendations on the validation of software programs performing biostatistical calculations for forensic genetics applications.

    Science.gov (United States)

    Coble, M D; Buckleton, J; Butler, J M; Egeland, T; Fimmers, R; Gill, P; Gusmão, L; Guttman, B; Krawczak, M; Morling, N; Parson, W; Pinto, N; Schneider, P M; Sherry, S T; Willuweit, S; Prinz, M

    2016-11-01

    The use of biostatistical software programs to assist in data interpretation and calculate likelihood ratios is essential to forensic geneticists and part of the daily case work flow for both kinship and DNA identification laboratories. Previous recommendations issued by the DNA Commission of the International Society for Forensic Genetics (ISFG) covered the application of bio-statistical evaluations for STR typing results in identification and kinship cases, and this is now being expanded to provide best practices regarding validation and verification of the software required for these calculations. With larger multiplexes, more complex mixtures, and increasing requests for extended family testing, laboratories are relying more than ever on specific software solutions and sufficient validation, training and extensive documentation are of upmost importance. Here, we present recommendations for the minimum requirements to validate bio-statistical software to be used in forensic genetics. We distinguish between developmental validation and the responsibilities of the software developer or provider, and the internal validation studies to be performed by the end user. Recommendations for the software provider address, for example, the documentation of the underlying models used by the software, validation data expectations, version control, implementation and training support, as well as continuity and user notifications. For the internal validations the recommendations include: creating a validation plan, requirements for the range of samples to be tested, Standard Operating Procedure development, and internal laboratory training and education. To ensure that all laboratories have access to a wide range of samples for validation and training purposes the ISFG DNA commission encourages collaborative studies and public repositories of STR typing results. Published by Elsevier Ireland Ltd.

  14. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  15. Live forensic acquisition as alternative to traditional forensic processes

    CSIR Research Space (South Africa)

    Lessing, M

    2008-09-01

    Full Text Available The development of live forensic acquisition in general presents a remedy for some of the problems introduced by traditional forensic acquisition. However, this live forensic acquisition introduces a variety of additional problems, unique...

  16. Comparison of In-Person vs. Digital Climate Education Program

    Science.gov (United States)

    Anderson, R. K.; Flora, J. A.; Saphir, M.

    2017-12-01

    In 2014, ACE (Alliance for Climate Education) evaluated the impact of its 45-minute live climate edutainment education program on the knowledge, attitudes and behavior of high school students with respect to climate change. The results showed gains in knowledge, increased engagement, as well as increased communication about climate change with number of students reporting talking about climate change with friends and family more than doubling. In 2016, ACE launched a digital version of its in-person edutainment education program, a 40-minute video version of the live program. This digital version, Our Climate Our Future (OCOF), has now been used by nearly 4,000 teachers nationwide and viewed by over 150,000 students. We experimentally tested the impact of the digital program (OCOF) compared to the live program and a control group. The experiment was conducted with 709 students in 27 classes at two North Carolina public high schools. Classes were assigned to one of three conditions: digital, live and control. In the digital version, students watched the 40-minute OCOF video featuring the same educator that presented the live program. In the live version, students received an identical 40-minute live presentation by an ACE staff educator The control group received neither treatment. When compared to controls, both programs were effective in positively increasing climate change knowledge, climate justice knowledge, perceived self-efficacy to make climate-friendly behavior changes, and beliefs about climate change (all statistically significant at or above P<.01). In the areas of hope that people can solve climate change and intent to change behavior, only the live program showed significant increases. In these two areas, it may be that an in-person experience is key to affecting change. In light of these positive results, ACE plans to increase the use of OCOF in schools across the country to assist teachers in their efforts to teach about climate change.

  17. Blurriness in Live Forensics: An Introduction

    Science.gov (United States)

    Savoldi, Antonio; Gubian, Paolo

    The Live Forensics discipline aims at answering basic questions related to a digital crime, which usually involves a computer-based system. The investigation should be carried out with the very goal to establish which processes were running, when they were started and by whom, what specific activities those processes were doing and the state of active network connections. Besides, a set of tools needs to be launched on the running system by altering, as a consequence of the Locard’s exchange principle [2], the system’s memory. All the methodologies for the live forensics field proposed until now have a basic, albeit important, weakness, which is the inability to quantify the perturbation, or blurriness, of the system’s memory of the investigated computer. This is the very last goal of this paper: to provide a set of guidelines which can be effectively used for measuring the uncertainty of the collected volatile memory on a live system being investigated.

  18. Forensic experience of Saudi nurses; an emerging need for forensic qualifications.

    Science.gov (United States)

    Alsaif, Dalia M; Alfaraidy, Maram; Alsowayigh, Kholoud; Alhusain, Awal; Almadani, Osama M

    2014-10-01

    Forensic nursing was recognized as a nursing subspecialty after the perceived need for forensic nurses to bring about their nursing duties while at the same time helping legal authorities to deliver justice. With the increased rate of cases that are presenting to the forensic centers in Saudi Arabia, there was a need for the presence of nurses to work side by side to physicians. This study was aimed at determining the forensic qualifications of nurses working in emergency departments in the area of Dammam and their knowledge about principles of forensic nursing. A self-administered questionnaire was distributed to registered nurses who are working in Emergency departments of secondary hospitals in the area of Dammam. Questions included knowledge, awareness and attitude toward forensic nursing. A total of 96 participants responded to the questionnaire with females representing 78% (n: 75). Diploma was the highest earned nursing degree in 95% (n: 91) of participants. Only 33% (n: 32) were aware of the term forensic nursing and the majority of the respondents gave invalid or didn't know the answers to knowledge questions. A total of 77% (n: 74) agreed that they are not adequately trained for handling forensic cases. Saudi nurses need forensic education. The presence of qualified forensic nurses would help delivering optimal forensic services and would assist in bringing justice. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  19. Nuclear forensics

    International Nuclear Information System (INIS)

    Venugopal, V.

    2010-01-01

    Nuclear forensics is the analysis of nuclear materials recovered from either the capture of unused materials, or from the radioactive debris following a nuclear explosion and can contribute significantly to the identification of the sources of the materials and the industrial processes used to obtain them. In the case of an explosion, nuclear forensics can also reconstruct key features of the nuclear device. Nuclear forensic analysis works best in conjunction with other law enforcement, radiological protection dosimetry, traditional forensics, and intelligence work to provide the basis for attributing the materials and/or nuclear device to its originators. Nuclear forensics is a piece of the overall attribution process, not a stand-alone activity

  20. Nuclear forensics

    International Nuclear Information System (INIS)

    Karadeniz, O.; Guenalp, G.

    2010-01-01

    This review discusses the methodology of nuclear forensics and illicit trafficking of nuclear materials. Nuclear forensics is relatively new scientific branch whose aim it is to read out material inherent from nuclear material. Nuclear forensics investigations have to be considered as part of a comprehensive set of measures for detection,interception, categorization and characterization of illicitly trafficking nuclear material. Prevention, detection and response are the main elements in combating illicit trafficking. Forensics is a key element in the response process. Forensic science is defined as the application of a broad spectrum of sciences to answer questions of interest to the legal system. Besides, in this study we will explain age determination of nuclear materials.

  1. Author Guidelines: The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM)

    OpenAIRE

    Arab Journal of Forensic Sciences & Forensic Medicine

    2017-01-01

    The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM) is a peer-reviewed, open access (CC BY-NC), international journal for publishing original contributions in various fields of forensic science. These fields include, but are not limited to forensic pathology and histochemistry, toxicology(drugs, alcohol, etc.), forensic biology (serology, human DNA profiling, entomology, population genetics), forensic chemistry(inks, paints, dyes, explosives, fire accelerants), psychiatry and...

  2. Practical mobile forensics

    CERN Document Server

    Bommisetty, Satish; Mahalik, Heather

    2014-01-01

    The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re

  3. The U.S. national nuclear forensics library, nuclear materials information program, and data dictionary

    International Nuclear Information System (INIS)

    Lamont, Stephen Philip; Brisson, Marcia; Curry, Michael

    2011-01-01

    Nuclear forensics assessments to determine material process history requires careful comparison of sample data to both measured and modeled nuclear material characteristics. Developing centralized databases, or nuclear forensics libraries, to house this information is an important step to ensure all relevant data will be available for comparison during a nuclear forensics analysis and help expedite the assessment of material history. The approach most widely accepted by the international community at this time is the implementation of National Nuclear Forensics libraries, which would be developed and maintained by individual nations. This is an attractive alternative toan international database since it provides an understanding that each country has data on materials produced and stored within their borders, but eliminates the need to reveal any proprietary or sensitive information to other nations. To support the concept of National Nuclear Forensics libraries, the United States Department of Energy has developed a model library, based on a data dictionary, or set of parameters designed to capture all nuclear forensic relevant information about a nuclear material. Specifically, information includes material identification, collection background and current location, analytical laboratories where measurements were made, material packaging and container descriptions, physical characteristics including mass and dimensions, chemical and isotopic characteristics, particle morphology or metallurgical properties, process history including facilities, and measurement quality assurance information. While not necessarily required, it may also be valuable to store modeled data sets including reactor burn-up or enrichment cascade data for comparison. It is fully expected that only a subset of this information is available or relevant to many materials, and much of the data populating a National Nuclear Forensics library would be process analytical or material accountability

  4. From forensic epigenetics to forensic epigenomics: broadening DNA investigative intelligence.

    Science.gov (United States)

    Vidaki, Athina; Kayser, Manfred

    2017-12-21

    Human genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We envision future forensic applications of DNA methylation analysis that will broaden DNA-based forensic intelligence. Together with genetic prediction of appearance and biogeographic ancestry, epigenomic lifestyle prediction is expected to increase the ability of police to find unknown perpetrators of crime who are not identifiable using current forensic DNA profiling.

  5. 3rd International Arab Forensic Sciences & Forensic Medicine Conference, ASFSFM 2017: Conference Report

    Directory of Open Access Journals (Sweden)

    Abdulsallam A. Bakdash

    2017-12-01

    Full Text Available The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM at Naif Arab University for Security Sciences seeks to present the latest developments in all fields of forensic sciences through holding specialized scientific events and academic activities. This is also achieved through its periodic scientific peer-reviewed journal, the Arab Journal of Forensic Sciences and Forensic Medicine. It also seeks to promote scientific research in all fields of forensic science and forensic medicine, and seeks actively to contribute in holding scientific meetings in accordance with advanced scientific standards, including the 3rd International Arab Forensic Sciences & Forensic Medicine Conference. This important event was attended by scientists and experts from various fields of criminal and forensic sciences from both Arab and non-Arab countries. This conference was a significant scientific accomplishment that contributed to the advancement of forensic sciences and forensic medicine in the Arab world. The conference aimed, in accordance with the vision of Naif Arab University for Security Sciences, to enhance peace, security and justice in Arab societies.  Naif Arab University for Security Sciences, represented by the Arab Society for Forensic Sciences and Forensic Medicine, held the 3rd International Arab Forensic Sciences & Forensic Medicine Conference on the University's campus during the period from 21st to 23rd November 2017. The event included the participation of more than 720 experts in forensic sciences and forensic medicine from 33 countries all over the world. Experts discussed and presented the latest developments in their fields. The conference provided a creative environment for students from both local and international universities to benefit from experts and specialists, and to access the most recent research.  On behalf of His Excellency the president of Naif Arab University for Security Sciences, and the Arab Society for

  6. Forensic odontology.

    Science.gov (United States)

    Shamim, Thorakkal

    2012-04-01

    Forensic odontology is a specialized field of dentistry which analyses dental evidence in the interest of justice. Forensic odontology embraces all dental specialities and it is almost impossible to segregate this branch from other dental specialities. This review aims to discuss the utility of various dental specialities with forensic odontology.

  7. Forensic nursing in secure environments.

    Science.gov (United States)

    Shelton, Deborah

    2009-01-01

    There are few well-designed studies of corrections or prison nursing roles. This study seeks to describe the corrections or prison role of forensic nurses in the United States who provide care in secure environments. National data detailing the scope of practice in secure environments are limited. This pencil and paper survey describes the roles of 180 forensic nurses from 14 states who work in secure environments. Descriptive statistics are utilized. A repeated measures ANOVA with post hoc analyses was implemented. These nurses were older than average in age, but had 10 years or less experience in forensic nursing practice. Two significant roles emerged to "promote and implement principles that underpin effective quality and practice" and to "assess, develop, implement, and improve programs of care for individuals." Significant roles varied based upon the security classification of the unit or institution in which the nurses were employed. Access to information about these nurses and their nursing practice was difficult in these closed systems. Minimal data are available nationally, indicating a need for collection of additional data over time to examine changes in role. It is through such developments that forensic nursing provided in secure environments will define its specialization and attract the attention it deserves.

  8. A Comparison Study of Adults with Intellectual Disability and Psychiatric Disorder with and without Forensic Involvement

    Science.gov (United States)

    Raina, P.; Lunsky, Y.

    2010-01-01

    The current study describes and compares profiles of patients in the same specialized hospital program for patients with intellectual disability with and without forensic involvement. A retrospective chart review of 78 individuals (39 forensic and 39 non-forensic) served between 2006 and 2008 was completed. The forensic sample was more likely to…

  9. Radiological findings at a South African forensic pathology laboratory in cases of sudden unexpected death in infants

    Directory of Open Access Journals (Sweden)

    Naomi Fenton-Muir

    2012-02-01

    Full Text Available Objectives The work serves as a preliminary evaluation of the utility of the full-body radiography in examining cases of SUDI. Setting This paper reviews findings from full-body digital radiography in cases of sudden unexpected death in infants (SUDI in 2008 at the Salt River Forensic Pathology Laboratory in Cape Town. Subjects Cases of SUDI referred to the mortuary and undergoing full-body digital radiography were reviewed (192 cases. Design Imaging reports were cross-referenced with death registry data. Manner of death, cause of death, whether an autopsy had taken place, and radiological findings, were recorded and analysed. Results The absence of bony fractures was recorded as an imaging finding in 40% of cases. The most common type of imaging pathology was lung disease. In cases where autopsies were performed and pathology was found on imaging, the findings of the two methods of examination were consistent. Conclusions Imaging may have served to assist CoD determination based on case history, and therefore full-body radiography may improve the workflow in busy forensic pathology laboratories. More detailed and consistent recording of imaging findings is required before stronger conclusions may be drawn regarding the utility of full body digital imaging of paediatric cases in forensic pathology laboratories.

  10. Microfluidic Devices for Forensic DNA Analysis: A Review.

    Science.gov (United States)

    Bruijns, Brigitte; van Asten, Arian; Tiggelaar, Roald; Gardeniers, Han

    2016-08-05

    Microfluidic devices may offer various advantages for forensic DNA analysis, such as reduced risk of contamination, shorter analysis time and direct application at the crime scene. Microfluidic chip technology has already proven to be functional and effective within medical applications, such as for point-of-care use. In the forensic field, one may expect microfluidic technology to become particularly relevant for the analysis of biological traces containing human DNA. This would require a number of consecutive steps, including sample work up, DNA amplification and detection, as well as secure storage of the sample. This article provides an extensive overview of microfluidic devices for cell lysis, DNA extraction and purification, DNA amplification and detection and analysis techniques for DNA. Topics to be discussed are polymerase chain reaction (PCR) on-chip, digital PCR (dPCR), isothermal amplification on-chip, chip materials, integrated devices and commercially available techniques. A critical overview of the opportunities and challenges of the use of chips is discussed, and developments made in forensic DNA analysis over the past 10-20 years with microfluidic systems are described. Areas in which further research is needed are indicated in a future outlook.

  11. Computer-aided fiber analysis for crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Arndt, Christian; Makrushin, Andrey; Dittmann, Jana

    2012-03-01

    The forensic analysis of fibers is currently completely manual and therefore time consuming. The automation of analysis steps can significantly support forensic experts and reduce the time, required for the investigation. Moreover, a subjective expert belief is extended by objective machine estimation. This work proposes the pattern recognition pipeline containing the digital acquisition of a fiber media, the pre-processing for fiber segmentation, and the extraction of the distinctive characteristics of fibers. Currently, basic geometrical features like width, height, area of optically dominant fibers are investigated. In order to support the automatic classification of fibers, supervised machine learning algorithms are evaluated. The experimental setup includes a car seat and two pieces clothing of a different fabric. As preliminary work, acrylic as synthetic and sheep wool as natural fiber are chosen to be classified. While sitting on the seat, a test person leaves textile fibers. The test aims at automatic distinguishing of clothes through the fiber traces gained from the seat with the help of adhesive tape. The digitalization of fiber samples is provided by a contactless chromatic white light sensor. First test results showed, that two optically very different fibers can be properly assigned to their corresponding fiber type. The best classifier achieves an accuracy of 75 percent correctly classified samples for our suggested features.

  12. The international development of forensic science standards - A review.

    Science.gov (United States)

    Wilson-Wilde, Linzi

    2018-04-16

    Standards establish specifications and procedures designed to ensure products, services and systems are safe, reliable and consistently perform as intended. Standards can be used in the accreditation of forensic laboratories or facilities and in the certification of products and services. In recent years there have been various international activities aiming at developing forensic science standards and guidelines. The most significant initiative currently underway within the global forensic community is the development of International Organization for Standardization (ISO) standards. This paper reviews the main bodies working on standards for forensic science, the processes used and the implications for accreditation. This paper specifically discusses the work of ISO Technical Committee TC272, the future TC272 work program for the development of forensic science standards and associated timelines. Also discussed, are the lessons learnt to date in navigating the complex environment of multi-country stakeholder deliberations in standards development. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  13. What Makes the Digital "Special"? The Research Program in Digital Collections at the National Library of Wales

    Science.gov (United States)

    Cusworth, Andrew; Hughes, Lorna M.; James, Rhian; Roberts, Owain; Roderick, Gareth Lloyd

    2015-01-01

    This article introduces some of the digital projects currently in development at the National Library of Wales as part of its Research Program in Digital Collections. These projects include the digital representation of the Library's Kyffin Willams art collection, musical collections, and probate collection, and of materials collected by the…

  14. Defense Forensics: Additional Planning and Oversight Needed to Establish an Enduring Expeditionary Forensic Capability

    Science.gov (United States)

    2013-06-01

    forensic pathology, forensic anthropology, and forensic toxicology . 13DOD’s forensic directive defines DOD components as the Office of the...DEFENSE FORENSICS Additional Planning and Oversight Needed to Establish an Enduring Expeditionary Forensic ...COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Defense Forensics : Additional Planning and Oversight Needed to Establish an Enduring

  15. Testing photogrammetry-based techniques for three-dimensional surface documentation in forensic pathology.

    Science.gov (United States)

    Urbanová, Petra; Hejna, Petr; Jurda, Mikoláš

    2015-05-01

    Three-dimensional surface technologies particularly close range photogrammetry and optical surface scanning have recently advanced into affordable, flexible and accurate techniques. Forensic postmortem investigation as performed on a daily basis, however, has not yet fully benefited from their potentials. In the present paper, we tested two approaches to 3D external body documentation - digital camera-based photogrammetry combined with commercial Agisoft PhotoScan(®) software and stereophotogrammetry-based Vectra H1(®), a portable handheld surface scanner. In order to conduct the study three human subjects were selected, a living person, a 25-year-old female, and two forensic cases admitted for postmortem examination at the Department of Forensic Medicine, Hradec Králové, Czech Republic (both 63-year-old males), one dead to traumatic, self-inflicted, injuries (suicide by hanging), the other diagnosed with the heart failure. All three cases were photographed in 360° manner with a Nikon 7000 digital camera and simultaneously documented with the handheld scanner. In addition to having recorded the pre-autopsy phase of the forensic cases, both techniques were employed in various stages of autopsy. The sets of collected digital images (approximately 100 per case) were further processed to generate point clouds and 3D meshes. Final 3D models (a pair per individual) were counted for numbers of points and polygons, then assessed visually and compared quantitatively using ICP alignment algorithm and a cloud point comparison technique based on closest point to point distances. Both techniques were proven to be easy to handle and equally laborious. While collecting the images at autopsy took around 20min, the post-processing was much more time-demanding and required up to 10h of computation time. Moreover, for the full-body scanning the post-processing of the handheld scanner required rather time-consuming manual image alignment. In all instances the applied approaches

  16. Digit ratio (2D:4D – A forensic marker for sexual dimorphism in North Indian population

    Directory of Open Access Journals (Sweden)

    Sangeeta Dey

    2016-12-01

    Conclusion: This research study proves beneficial for identity authentication, for criminal investigation and a powerful forensic tool for medico – legal cases. This will help in the advancement of technology which will prove beneficial for the welfare of indigenous population of India. Also the data so collected can be useful as forensic anthropology population data.

  17. Simulation in computer forensics teaching: the student experience

    OpenAIRE

    Crellin, Jonathan; Adda, Mo; Duke-Williams, Emma; Chandler, Jane

    2011-01-01

    The use of simulation in teaching computing is well established, with digital forensic investigation being a subject area where the range of simulation required is both wide and varied demanding a corresponding breadth of fidelity. Each type of simulation can be complex and expensive to set up resulting in students having only limited opportunities to participate and learn from the simulation. For example students' participation in mock trials in the University mock courtroom or in simulation...

  18. Considerations on the ASTM standards 1789-04 and 1422-05 on the forensic examination of ink.

    Science.gov (United States)

    Neumann, Cedric; Margot, Pierre

    2010-09-01

    The ASTM standards on Writing Ink Identification (ASTM 1789-04) and on Writing Ink Comparison (ASTM 1422-05) are the most up-to-date guidelines that have been published on the forensic analysis of ink. The aim of these documents is to cover most aspects of the forensic analysis of ink evidence, from the analysis of ink samples, the comparison of the analytical profile of these samples (with the aim to differentiate them or not), through to the interpretation of the result of the examination of these samples in a forensic context. Significant evolutions in the technology available to forensic scientists, in the quality assurance requirements brought onto them, and in the understanding of frameworks to interpret forensic evidence have been made in recent years. This article reviews the two standards in the light of these evolutions and proposes some practical improvements in terms of the standardization of the analyses, the comparison of ink samples, and the interpretation of ink examination. Some of these suggestions have already been included in a DHS funded project aimed at creating a digital ink library for the United States Secret Service. © 2010 American Academy of Forensic Sciences.

  19. 2nd Arab Forensic Science & Forensic Medicine Meeting, ASFSFM 2016: Meeting Report

    Directory of Open Access Journals (Sweden)

    Abdulsallam Bakdash

    2016-12-01

    Full Text Available One of the main objectives of Naif Arab University for Security Sciences (NAUSS is to enhance peace, security, and justice in Arab societies through education, research, and advanced professional training in various disciplines of security and forensic sciences. NAUSS strives to improve the academic and professional skills of forensic scientists and security personnel to combat crime and terrorism by utilizing all the available tools of modern technology. NAUSS also realizes the importance of scientific research in the social, economic, and technological development of a society and is, therefore, committed to encouraging and supporting research at every level. NAUSS has given the fields of forensic sciences and forensic medicine a top priority and the attention they deserve. In pursuit of its objectives, and in cooperation with other Arab member organizations, NAUSS launched the Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM in 2013. The Society had the honour of being officially launched by His Royal Highness, Prince Mohammed bin Naif bin Abdul Aziz, Crown Prince, Deputy Prime Minister and the Minister of the Interior, Honorary President of the Council of Arab Ministers of Interior and Chairman of the Supreme Council of NAUSS. The 2nd Arab Forensic Science & Forensic Medicine Meeting (ASFSFM Meeting 2016 was yet another part of the efforts and concern of NAUSS to advance the skills and knowledge of Arab specialists and to facilitate cooperation among forensic scientists and institutions engaged in the practice, education and research of forensic sciences and forensic medicine at various levels.

  20. Forensic culture as epistemic culture: the sociology of forensic science.

    Science.gov (United States)

    Cole, Simon A

    2013-03-01

    This paper explores whether we can interpret the notion of 'forensic culture' as something akin to what Knorr-Cetina called an 'epistemic culture'. Can we speak of a 'forensic culture', and, if so, how is it similar to, or different from, other epistemic cultures that exist in what is conventionally called 'science'? This question has important policy implications given the National Academy Science's (NAS) recent identification of 'culture' as one of the problems at the root of what it identified as 'serious deficiencies' in U.S. forensic science and 'scientific culture' as an antidote to those problems. Finding the NAS's characterisation of 'scientific culture' overly general and naïve, this paper offers a preliminary exploration of what might be called a 'forensic culture'. Specifically, the paper explores the way in which few of the empirical findings accumulated by sociologists of science about research science seem to apply to forensic science. Instead, forensic science seems to have developed a distinct culture for which a sociological analysis will require new explanatory tools. Faithful sociological analysis of 'forensic culture' will be a necessary prerequisite for the kind of culture change prescribed by external reformist bodies like the NAS. Copyright © 2012. Published by Elsevier Ltd.

  1. Development and implementation of an automated quantitative film digitizer quality control program

    Science.gov (United States)

    Fetterly, Kenneth A.; Avula, Ramesh T. V.; Hangiandreou, Nicholas J.

    1999-05-01

    A semi-automated, quantitative film digitizer quality control program that is based on the computer analysis of the image data from a single digitized test film was developed. This program includes measurements of the geometric accuracy, optical density performance, signal to noise ratio, and presampled modulation transfer function. The variability of the measurements was less than plus or minus 5%. Measurements were made on a group of two clinical and two laboratory laser film digitizers during a trial period of approximately four months. Quality control limits were established based on clinical necessity, vendor specifications and digitizer performance. During the trial period, one of the digitizers failed the performance requirements and was corrected by calibration.

  2. Digital forensics in the cloud: The state of the art

    CSIR Research Space (South Africa)

    Sibiya, G

    2015-05-01

    Full Text Available [21], Lee et al. [22], Lee and Un [23], Baar et al. [24] and Ting and Yang [25] implement cloud based services to carry out computing expensive tasks including data analysis and performing searches on big evidence data. The technologies can... as it was also proposed by many other researchers in the last few years including: Lee and Un [23]; Marty, [35]; Ruan et al. [36] and Wen et al. [15]. Copyright © 2015 The authors www.IST-Africa.org/Conference2015 Page 6 of 9 Table 1 Cloud Forensic Systems...

  3. Estimating the measurement uncertainty in forensic blood alcohol analysis.

    Science.gov (United States)

    Gullberg, Rod G

    2012-04-01

    For many reasons, forensic toxicologists are being asked to determine and report their measurement uncertainty in blood alcohol analysis. While understood conceptually, the elements and computations involved in determining measurement uncertainty are generally foreign to most forensic toxicologists. Several established and well-documented methods are available to determine and report the uncertainty in blood alcohol measurement. A straightforward bottom-up approach is presented that includes: (1) specifying the measurand, (2) identifying the major components of uncertainty, (3) quantifying the components, (4) statistically combining the components and (5) reporting the results. A hypothetical example is presented that employs reasonable estimates for forensic blood alcohol analysis assuming headspace gas chromatography. These computations are easily employed in spreadsheet programs as well. Determining and reporting measurement uncertainty is an important element in establishing fitness-for-purpose. Indeed, the demand for such computations and information from the forensic toxicologist will continue to increase.

  4. "Who Dunnit?": Learning Chemistry and Critical Thinking through Hands-On Forensic Science.

    Science.gov (United States)

    Demetry, Chrysanthe; Nicoletti, Denise; Mix, Kimberlee; O'Connor, Kerri; Martin, Andrea

    2002-01-01

    Demonstrates how forensic science can be used as a framework for generating student interest and learning in chemistry and promoting critical thinking. The "Who Dunnit?" forensic science workshop was developed by undergraduate students and is one element of a two-week residential summer outreach program that seeks to develop interest in…

  5. Forensic Experts′ Opinion Regarding Clinical Forensic Medicine Practice in Indonesia and Malaysia

    Directory of Open Access Journals (Sweden)

    Hanusha Nair Gopalakrishnan

    2016-01-01

    Full Text Available Clinical forensic medicine is a progressing branch. In Indonesia and Malaysia, there is inadequate information regarding this practice. It is always unclear about the job scopes and practitioners involved in this field. The study outlined in this article is aimed to explore the current clinical forensic medicine practice compared to existing systematic practice globally and hence analyzing for presence of difference in this practice between these two countries. A qualitative study was conducted by forensic experts in Indonesia and Malaysia from September to November 2015. In-depth interview was carried out to obtain data which were then validated using literature and legal documents in Indonesia and Malaysia known as the triangulation validation method. Data were presented in narrative form. In Indonesia, forensic pathology and clinical forensic medicine were approached as one whereas in Malaysia separately. This practice was conducted by a general practitioner in collaboration with other specialists if needed in Indonesia; whereas, in Malaysia, this practice was conducted by forensic pathologists or medical officers in the absence of forensic pathologists. Both Indonesia and Malaysia followed the continental regimen in practicing clinical forensic medicine. There was still a lack of involvement of doctors in this field due to lack of understanding of clinical forensic medicine. The current clinical forensic medicine practice has not developed much and has no much difference in both countries. The gap between the current practice with systematic practice cannot be justified due to the absence of one standardized code of practice.

  6. Forensic Mass Spectrometry

    Science.gov (United States)

    Hoffmann, William D.; Jackson, Glen P.

    2015-07-01

    Developments in forensic mass spectrometry tend to follow, rather than lead, the developments in other disciplines. Examples of techniques having forensic potential born independently of forensic applications include ambient ionization, imaging mass spectrometry, isotope ratio mass spectrometry, portable mass spectrometers, and hyphenated chromatography-mass spectrometry instruments, to name a few. Forensic science has the potential to benefit enormously from developments that are funded by other means, if only the infrastructure and personnel existed to adopt, validate, and implement the new technologies into casework. Perhaps one unique area in which forensic science is at the cutting edge is in the area of chemometrics and the determination of likelihood ratios for the evaluation of the weight of evidence. Such statistical techniques have been developed most extensively for ignitable-liquid residue analyses and isotope ratio analysis. This review attempts to capture the trends, motivating forces, and likely impact of developing areas of forensic mass spectrometry, with the caveat that none of this research is likely to have any real impact in the forensic community unless: (a) The instruments developed are turned into robust black boxes with red and green lights for positives and negatives, respectively, or (b) there are PhD graduates in the workforce who can help adopt these sophisticated techniques.

  7. Unearthing Truth: Forensic Anthropology, Translocal Memory, and “Provention” in Guatemala

    Directory of Open Access Journals (Sweden)

    Colette G. Mazzucelli

    2015-10-01

    Full Text Available This article deliberately examines the search for truth after decades of conflict in Guatemala. Excavations of mass gravesites and the painstaking exhumation processes carried out by professional forensic anthropology teams continue to allow families to locate lost relatives—reclaiming truth and supporting calls for justice. For Guatemalans, the search for truth now transcends national borders, especially among migrant communities in the United States. The family remains the central unit through which the work of Guatemalan forensic anthropologists is undertaken. In an effort to engender deeper insights about these exhumation processes from a social science perspective, this analysis promotes the use of specific “tools” in Guatemalan forensic anthropology investigations. The first is an exhumations concept map, which yields important questions meant to stimulate meaningful analysis. The second, Story Maps, is a technology application with the potential to mediate digital access to the emerging Guatemalan translocal space. The research in this analysis suggests that these “tools” strengthen Burton’s notion of “provention” in Guatemala.

  8. Graduate forensic nursing education: how to better educate nurses to care for this patient population.

    Science.gov (United States)

    Simmons, Barbara

    2014-01-01

    Nurses are often the first healthcare contact for those affected by violence. Despite the impact of violence on healthcare across specialties and ages, forensic nursing content is limited in undergraduate and graduate curricula. The purpose of this article is to provide background on forensic nursing and present a model of a graduate forensic nursing program that can be used as a curriculum guide.

  9. Digital Forensic Analysis Of Malware Infected Machine- Case Study

    Directory of Open Access Journals (Sweden)

    Amulya Podile

    2015-08-01

    Full Text Available Abstract Internet banking has created a convenient way for us to handle our business without leaving our home. Man-in-the-Browser is a special case of Man-in-the-middle attack targeted against customers of Internet banking. One of the capabilities of Man-in-the-Browser Trojan is modification of html referred to as html injection that allows the attacker to alter the html of a page before it is sent to the browser for interpretation. In this paper the authors discussed about forensic analysis of RAM Volatile data system logs and registry collected from bank customer computer infected with Trojan and confirmed the source of attack time-stamps and the behavior of the malware by using open source and commercial tools.

  10. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  11. Keeping the Momentum and Nuclear Forensics at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Steiner, Robert Ernest; Dion, Heather M.; Dry, Donald E.; Kinman, William Scott; LaMont, Stephen Philip; Podlesak, David; Tandon, Lav

    2016-01-01

    LANL has 70 years of experience in nuclear forensics and supports the community through a wide variety of efforts and leveraged capabilities: Expanding the understanding of nuclear forensics, providing training on nuclear forensics methods, and developing bilateral relationships to expand our understanding of nuclear forensic science. LANL remains highly supportive of several key organizations tasked with carrying forth the Nuclear Security Summit messages: IAEA, GICNT, and INTERPOL. Analytical chemistry measurements on plutonium and uranium matrices are critical to numerous programs including safeguards accountancy verification measurements. Los Alamos National Laboratory operates capable actinide analytical chemistry and material science laboratories suitable for nuclear material and environmental forensic characterization. Los Alamos National Laboratory uses numerous means to validate and independently verify that measurement data quality objectives are met. Numerous LANL nuclear facilities support the nuclear material handling, preparation, and analysis capabilities necessary to evaluate samples containing nearly any mass of an actinide (attogram to kilogram levels).

  12. Forensic autopsy practice in the Middle East: comparisons with the west.

    Science.gov (United States)

    Al-Waheeb, Salah; Al-Kandary, Nadia; Aljerian, Khaldoon

    2015-05-01

    Autopsies are performed in the majority of Arab, Muslim countries. Several of these countries face social challenges and others do not have well established academic programs to teach the science. In this article we intend to review the history and practice of the forensic part of autopsies in a few Arab, Muslim countries (Egypt, Kingdom of Saudi Arabia (KSA) and Kuwait) and compare it with the United States of America (USA) and the United Kingdom (UK), 2 countries where the practice of forensic science and Forensic pathology is well established. This was achieved by pub med literature search and the distribution of a questionnaire to colleagues in Arab countries. We recommend that Arab countries explore the field of virtual autopsy to overcome some of the social challenges related to dissection of the cadaver. Kuwait can benefit from the introduction of Forensic training given the high workload in the country. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  13. Keeping the Momentum and Nuclear Forensics at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dion, Heather M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); LaMont, Stephen Philip [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-22

    LANL has 70 years of experience in nuclear forensics and supports the community through a wide variety of efforts and leveraged capabilities: Expanding the understanding of nuclear forensics, providing training on nuclear forensics methods, and developing bilateral relationships to expand our understanding of nuclear forensic science. LANL remains highly supportive of several key organizations tasked with carrying forth the Nuclear Security Summit messages: IAEA, GICNT, and INTERPOL. Analytical chemistry measurements on plutonium and uranium matrices are critical to numerous programs including safeguards accountancy verification measurements. Los Alamos National Laboratory operates capable actinide analytical chemistry and material science laboratories suitable for nuclear material and environmental forensic characterization. Los Alamos National Laboratory uses numerous means to validate and independently verify that measurement data quality objectives are met. Numerous LANL nuclear facilities support the nuclear material handling, preparation, and analysis capabilities necessary to evaluate samples containing nearly any mass of an actinide (attogram to kilogram levels).

  14. Understanding the Enemy: The Enduring Value of Technical and Forensic Exploitation

    Science.gov (United States)

    2014-01-01

    designers, builders , emplacers, triggermen, financiers, component sup- pliers, trainers, planners, and operational leaders who made up the web of actors...help to isolate insurgents from the populace and under- mine their propaganda. In terms of joint functions , TECHINT and WTI support com- mand and...measurable biological and behavioral characteris- tics to uniquely identify people.24 The Air Force is the EA for Digital and Multimedia Forensics

  15. Automatización y computación distribuida para laboratorios de informática forense

    OpenAIRE

    Gómez, Leopoldo Sebastián M.; Herrera, Hernán Horacio; Uribe, Federico

    2016-01-01

    El crecimiento del volumen digital en las pericias informáticas es uno de los factores críticos que lleva al colapso de los laboratorios de informática forense y al aumento de las listas de espera de casos en trámite. Urge entonces comenzar a transitar un nuevo camino en lo que refiere a aspectos metodológicos, junto con la aplicación de nuevas técnicas y herramientas de informática forense apoyadas en recursos tecnológicos que provean una razonable capacidad de cómputo y de almacenamiento ma...

  16. Overview of Forensic Toxicology, Yesterday, Today and in the Future.

    Science.gov (United States)

    Chung, Heesun; Choe, Sanggil

    2017-01-01

    The scope of forensic toxicology has been tremendously expanded over the past 50 years. From two general sections forensic toxicology can be further classified into 8-9 sections. The most outstanding improvement in forensic toxicology is the changes brought by instrumental development. The field of forensic toxicology was revolutionized by the development of immunoassay and benchtop GC-MS in the 1980's and LC-MS-MS in 2000's. Detection of trace amounts of analytes has allowed the use of new specimens such as hair and oral fluids, along with blood and urine. Over a longer period of time, continuous efforts have been made to efficiently extract and separate drug and poison from biological fluids. International endeavors to develop high quality standards and guidelines for drugs and poisons in biological specimens and to promote them in order to increase reliability of laboratories are also part of the recent advancement of forensic toxicology. Interpretation of postmortem toxicology encompasses various factors including postmortem redistribution and stability. Considering the recent trend, the interpretation of toxicological results should account for autopsy findings, crime scene information, and related medical history. The fields of forensic toxicology will continuously develop to improve analysis of target analytes from various specimens, quality assurance program, and results interpretation. In addition, the development of analytical techniques will also contribute further advancement of forensic toxicology. The societies of forensic toxicologists, such as TIAFT, will play an important role for the advancement of forensic toxicology by collaborating and sharing ideas between toxicologists from both developed and developing countries. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  17. The Relevant Skills for Forensic Accountants – Can the Romanian Accounting Education Programs offer them?

    Directory of Open Access Journals (Sweden)

    Bobițan Nicolae

    2017-01-01

    Full Text Available In Romania for becoming a forensic accountant it is necessary, as preliminary conditions, first,to have a bachelor`s degree in accounting or finance, and second, to attain a certification, aschartered accountant, given by the professional body, CECCAR, and after that, as forensicaccountant. The purpose of this study is to investigate whether the Romanian academic educationand the professional education can assure all the relevant skills for a forensic accountant. In orderto achieve the objective, first, the authors investigated the most important studies which have thepurpose to identify the relevant skills for a forensic accountant. Second, the authors reviewed thecurriculum of the most important faculties with the aim to find and connect different courses withdifferent skills. The purpose was to determine how the forensic accounting education, offered to theprofessional accountants, assures them, all the relevant skills that are necessary in the profession.

  18. A user-friendly technical set-up for infrared photography of forensic findings.

    Science.gov (United States)

    Rost, Thomas; Kalberer, Nicole; Scheurer, Eva

    2017-09-01

    Infrared photography is interesting for a use in forensic science and forensic medicine since it reveals findings that normally are almost invisible to the human eye. Originally, infrared photography has been made possible by the placement of an infrared light transmission filter screwed in front of the camera objective lens. However, this set-up is associated with many drawbacks such as the loss of the autofocus function, the need of an external infrared source, and long exposure times which make the use of a tripod necessary. These limitations prevented up to now the routine application of infrared photography in forensics. In this study the use of a professional modification inside the digital camera body was evaluated regarding camera handling and image quality. This permanent modification consisted of the replacement of the in-built infrared blocking filter by an infrared transmission filter of 700nm and 830nm, respectively. The application of this camera set-up for the photo-documentation of forensically relevant post-mortem findings was investigated in examples of trace evidence such as gunshot residues on the skin, in external findings, e.g. hematomas, as well as in an exemplary internal finding, i.e., Wischnewski spots in a putrefied stomach. The application of scattered light created by indirect flashlight yielded a more uniform illumination of the object, and the use of the 700nm filter resulted in better pictures than the 830nm filter. Compared to pictures taken under visible light, infrared photographs generally yielded better contrast. This allowed for discerning more details and revealed findings which were not visible otherwise, such as imprints on a fabric and tattoos in mummified skin. The permanent modification of a digital camera by building in a 700nm infrared transmission filter resulted in a user-friendly and efficient set-up which qualified for the use in daily forensic routine. Main advantages were a clear picture in the viewfinder, an auto

  19. [Research Progress on Forensic Dentistry].

    Science.gov (United States)

    Liu, F; Dang, Y H

    2017-04-01

    Forensic dentistry is an interdiscipline of forensic medicine and stomatology, which provides legal information by collecting, testing and assessing the dental evidence scientifically. In this review, the present application of forensic dentistry has been described, such as the estimation of age, sex, species, occupation and living habit, as well as the identification of individual, domestic violence or abuse, which aims to enrich and improve forensic dentistry for making it be more useful in forensic medicine even in juridical practice. Copyright© by the Editorial Department of Journal of Forensic Medicine.

  20. Performance Measurement for Mobile Forensic Data Acquisition in Firefox OS

    OpenAIRE

    Mohd Najwadi Yusoff; Ramlan Mahmod; Mohd Taufik Abdullah; Ali Dehghantanha

    2015-01-01

    Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators. Currently, Firefox OS is still not fully supported by most of the existing mobile forensic tools. Even when the phone is detected as Android, only pictures from removable memory was able to be captured. Furthermore, the internal data acquisition is still not working. There...

  1. Metodología y caso práctico de análisis forense en iOS 10

    OpenAIRE

    Rubio Lorente, José Tomás

    2016-01-01

    El objetivo de este Trabajo Final de Master es realizar una metodología para el Análisis Forense Digital adaptada a dispositivos de Apple con Sistema Operativo iOS 10. Se hará un recorrido sobre el estado del arte en las principales herramientas de Análisis Forense de iOS existentes, tanto herramientas open source como propietarias y se validará el correcto funcionamiento en iOS 10 de las herramientas mediante pruebas en diferentes dispositivos y circunstancias. En función de los result...

  2. Modelling live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-06-01

    Full Text Available This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic...

  3. Forensic Science Research and Development at the National Institute of Justice: Opportunities in Applied Physics

    Science.gov (United States)

    Dutton, Gregory

    Forensic science is a collection of applied disciplines that draws from all branches of science. A key question in forensic analysis is: to what degree do a piece of evidence and a known reference sample share characteristics? Quantification of similarity, estimation of uncertainty, and determination of relevant population statistics are of current concern. A 2016 PCAST report questioned the foundational validity and the validity in practice of several forensic disciplines, including latent fingerprints, firearms comparisons and DNA mixture interpretation. One recommendation was the advancement of objective, automated comparison methods based on image analysis and machine learning. These concerns parallel the National Institute of Justice's ongoing R&D investments in applied chemistry, biology and physics. NIJ maintains a funding program spanning fundamental research with potential for forensic application to the validation of novel instruments and methods. Since 2009, NIJ has funded over 179M in external research to support the advancement of accuracy, validity and efficiency in the forensic sciences. An overview of NIJ's programs will be presented, with examples of relevant projects from fluid dynamics, 3D imaging, acoustics, and materials science.

  4. Forensic applications

    International Nuclear Information System (INIS)

    Yellin, E.

    1981-01-01

    Modern scientific technology now plays an increasingly important role in the process of law enforcement. Neutron activation, as developed for elemental analysis offers, in many cases, the suitable answer to forensic problems. The author discusses the use NAA has been put to in forensic science. (Auth.)

  5. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    Science.gov (United States)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  6. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  7. Nuclear Forensic Science: Analysis of Nuclear Material Out of Regulatory Control

    Science.gov (United States)

    Kristo, Michael J.; Gaffney, Amy M.; Marks, Naomi; Knight, Kim; Cassata, William S.; Hutcheon, Ian D.

    2016-06-01

    Nuclear forensic science seeks to identify the origin of nuclear materials found outside regulatory control. It is increasingly recognized as an integral part of a robust nuclear security program. This review highlights areas of active, evolving research in nuclear forensics, with a focus on analytical techniques commonly employed in Earth and planetary sciences. Applications of nuclear forensics to uranium ore concentrates (UOCs) are discussed first. UOCs have become an attractive target for nuclear forensic researchers because of the richness in impurities compared to materials produced later in the fuel cycle. The development of chronometric methods for age dating nuclear materials is then discussed, with an emphasis on improvements in accuracy that have been gained from measurements of multiple radioisotopic systems. Finally, papers that report on casework are reviewed, to provide a window into current scientific practice.

  8. PENINGKATAN KOMPETENSI GURU MELALUI WORKSHOP PENYUSUNAN SOAL DIGITAL BAHASA JAWA DENGAN MENGGUNAKAN PROGRAM ADOBE CAPTIVATE

    Directory of Open Access Journals (Sweden)

    Joko Sukoyo

    2013-02-01

    Full Text Available Kegiatan workshop ini dilakukan dengan tujuan untuk meningkatkan kemampuan guru sekolah dasar di Kecamatan Semarang Utara dalam hal penyusunan soal digital bahasa Jawa dengan menggunakan program adobe captivate. Metode yang digunakan dalam kegiatan ini adalah: ceramah, demonstrasi, praktik langsung, tanya jawab, dan penugasan. Peserta yang mengikuti workshop sebanyak 47 guru SD di Kecamatan Semarang Utara. Materi yang diberikan kepada peserta meliputi pengenalan program adobe captivate, penginstalan program adobe captivate, dan penulisan soal digital bahasa Jawa dengan menggunakan program adobe captivate. Kegiatan workshop ini berdampak positif kepada guru-guru SD di Kecamatan Semarang Utara. Sebelum diadakan kegiatan workshop, mereka sama sekali tidak dapat membuat soal digital dengan program adobe captivate. Setelah diadakan kegiatan worshop dan diadakan evaluasi terjadi peningkatan yang sangat signifikan, lebih dari 75% dapat membuat soal digital.

  9. Nuclear forensics: a comprehensive model action plan for Nuclear Forensics Laboratory in India

    International Nuclear Information System (INIS)

    Deshmukh, A.V.; Nyati, S.; Fatangre, N.M.; Raghav, N.K.; Reddy, P.G.

    2013-01-01

    Nuclear forensic is an emerging and highly specialized discipline which deals with nuclear investigation and analysis of nuclear or radiological/radioactive materials. Nuclear Forensic analysis includes various methodology and analytical methods along with morphology, physical, chemical, elemental and isotopic analysis to characterize and develop nuclear database for the identification of unknown nuclear or radiological/radioactive material. The origin, source history, pathway and attribution of unknown radioactive/nuclear material is possible with certainty through Nuclear Forensics. Establishment of Nuclear Forensic Laboratory and development of expertise for nuclear investigation under one roof by developing the nuclear data base and laboratory network is need of the hour to ably address the problems of all the law enforcement and nuclear agencies. The present study provides insight in Nuclear Forensics and focuses on an urgent need for a comprehensive plan to set up Nuclear Forensic Laboratory across India. (author)

  10. Video gaming and sexual violence: rethinking forensic nursing in a digital age.

    Science.gov (United States)

    Mercer, Dave; Parkinson, Denis

    2014-01-01

    This article reports findings from a qualitative study into how forensic nurses, and male personality disordered sexual offenders, talked about "pornography" in one U.K. high-security hospital. Research rationale was rooted in current professional and political debates, adopting a discourse analytic design to situate the project in a clinical context. Semistructured interviews, as co-constructed accounts, explored talk about sexual media, offending, treatment, and risk. Data were analyzed using a version of discourse analysis popular in healthcare research, identifying discursive repertoires, or collective language use, characteristic of the institutional culture. Findings revealed that masculine discourse marginalized female nurses and contradicted therapeutic goals, where men's talk about pornography, sex, and sexual crime represented discriminatory and gendered language. Nursing definitions of pornography were constructed in the context of the client group and an organizational need to manage risk. In a highly controlled environment, with a long-stay population, priority in respondent talk was given to mainstream commercial sexual media and everyday items/images perceived to have embedded sexual meaning. However, little mention was made of contemporary modes of producing/distributing pornography, where sex and sexual violence are enacted in virtual realities of cyberspace. Failure to engage with information technology, and globally mediated sex, is discussed as a growing concern for forensic health workers.

  11. New perspectives in forensic anthropology.

    Science.gov (United States)

    Dirkmaat, Dennis C; Cabo, Luis L; Ousley, Stephen D; Symes, Steven A

    2008-01-01

    A critical review of the conceptual and practical evolution of forensic anthropology during the last two decades serves to identify two key external factors and four tightly inter-related internal methodological advances that have significantly affected the discipline. These key developments have not only altered the current practice of forensic anthropology, but also its goals, objectives, scope, and definition. The development of DNA analysis techniques served to undermine the classic role of forensic anthropology as a field almost exclusively focused on victim identification. The introduction of the Daubert criteria in the courtroom presentation of scientific testimony accompanied the development of new human comparative samples and tools for data analysis and sharing, resulting in a vastly enhanced role for quantitative methods in human skeletal analysis. Additionally, new questions asked of forensic anthropologists, beyond identity, required sound scientific bases and expanded the scope of the field. This environment favored the incipient development of the interrelated fields of forensic taphonomy, forensic archaeology, and forensic trauma analysis, fields concerned with the reconstruction of events surrounding death. Far from representing the mere addition of new methodological techniques, these disciplines (especially, forensic taphonomy) provide forensic anthropology with a new conceptual framework, which is broader, deeper, and more solidly entrenched in the natural sciences. It is argued that this new framework represents a true paradigm shift, as it modifies not only the way in which classic forensic anthropological questions are answered, but also the goals and tasks of forensic anthropologists, and their perception of what can be considered a legitimate question or problem to be answered within the field.

  12. A computer program for planimetric analysis of digitized images

    DEFF Research Database (Denmark)

    Lynnerup, N; Lynnerup, O; Homøe, P

    1992-01-01

    bones as seen on X-rays. By placing the X-rays on a digitizer tablet and tracing the outline of the cell system, the area was calculated by the program. The calculated data and traced images could be stored and printed. The program is written in BASIC; necessary hardware is an IBM-compatible personal...

  13. Book Review: iOS Forensic Analysis: For iPhone, iPad and iPod Touch

    Directory of Open Access Journals (Sweden)

    Christopher Schulte

    2011-03-01

    Full Text Available As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch is no exception to this rule.(see PDF for full review

  14. Digital Competition Game to Improve Programming Skills

    Science.gov (United States)

    Moreno, Julian

    2012-01-01

    The aim of this paper is to describe a digital game with an educational purpose in the subject of computer programming, which enables students to reinforce and improve their abilities on the concepts of sequencing, defined iteration and nesting. For its design, a problem solving approach was followed and a score comparing mechanism was implemented…

  15. PCR in forensic genetics

    DEFF Research Database (Denmark)

    Morling, Niels

    2009-01-01

    Since the introduction in the mid-1980s of analyses of minisatellites for DNA analyses, a revolution has taken place in forensic genetics. The subsequent invention of the PCR made it possible to develop forensic genetics tools that allow both very informative routine investigations and still more...... and more advanced, special investigations in cases concerning crime, paternity, relationship, disaster victim identification etc. The present review gives an update on the use of DNA investigations in forensic genetics.......Since the introduction in the mid-1980s of analyses of minisatellites for DNA analyses, a revolution has taken place in forensic genetics. The subsequent invention of the PCR made it possible to develop forensic genetics tools that allow both very informative routine investigations and still more...

  16. Wanda ML - a markup language for digital annotation

    NARCIS (Netherlands)

    Franke, K.Y.; Guyon, I.; Schomaker, L.R.B.; Vuurpijl, L.G.

    2004-01-01

    WANDAML is an XML-based markup language for the annotation and filter journaling of digital documents. It addresses in particular the needs of forensic handwriting data examination, by allowing experts to enter information about writer, material (pen, paper), script and content, and to record chains

  17. The WANDAML Markup Language for Digital Document Annotation

    NARCIS (Netherlands)

    Franke, K.; Guyon, I.; Schomaker, L.; Vuurpijl, L.

    2004-01-01

    WANDAML is an XML-based markup language for the annotation and filter journaling of digital documents. It addresses in particular the needs of forensic handwriting data examination, by allowing experts to enter information about writer, material (pen, paper), script and content, and to record chains

  18. Conceptualising forensic science and forensic reconstruction. Part I: A conceptual model.

    Science.gov (United States)

    Morgan, R M

    2017-11-01

    There has been a call for forensic science to actively return to the approach of scientific endeavour. The importance of incorporating an awareness of the requirements of the law in its broadest sense, and embedding research into both practice and policy within forensic science, is arguably critical to achieving such an endeavour. This paper presents a conceptual model (FoRTE) that outlines the holistic nature of trace evidence in the 'endeavour' of forensic reconstruction. This model offers insights into the different components intrinsic to transparent, reproducible and robust reconstructions in forensic science. The importance of situating evidence within the whole forensic science process (from crime scene to court), of developing evidence bases to underpin each stage, of frameworks that offer insights to the interaction of different lines of evidence, and the role of expertise in decision making are presented and their interactions identified. It is argued that such a conceptual model has value in identifying the future steps for harnessing the value of trace evidence in forensic reconstruction. It also highlights that there is a need to develop a nuanced approach to reconstructions that incorporates both empirical evidence bases and expertise. A conceptual understanding has the potential to ensure that the endeavour of forensic reconstruction has its roots in 'problem-solving' science, and can offer transparency and clarity in the conclusions and inferences drawn from trace evidence, thereby enabling the value of trace evidence to be realised in investigations and the courts. Copyright © 2017 The Author. Published by Elsevier B.V. All rights reserved.

  19. 75 FR 7370 - Closed Captioning of Video Programming; Closed Captioning Requirements for Digital Television...

    Science.gov (United States)

    2010-02-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [CG Docket No. 05-231; ET Docket No. 99-254; FCC 08-255] Closed Captioning of Video Programming; Closed Captioning Requirements for Digital Television... Captioning of Video Programming; Closed Captioning Requirements for Digital Television Receivers, Declaratory...

  20. Integrating forensic science into nursing processes in the ICU.

    Science.gov (United States)

    Hoyt, Constance A

    2006-01-01

    The critical care nurse is in an ideal position to assume responsibilities related to the identification of forensic cases and the preservation of associated evidence. Victims of child and elder abuse and neglect, individuals involved in vehicular or industrial accidents, substance abusers, and incarcerated populations are among the several types of patients that are likely to managed in the intensive care unit (ICU). Hospitals and their personnel assume considerable liability in such cases for detecting, collecting, and preserving evidence, as well as for reporting and referring the cases to appropriate law enforcement or judicial authorities. The Joint Commission for the Accreditation of Healthcare Organizations has published specific regulatory guidance to ensure that all healthcare personnel are properly educated to assume certain forensic responsibilities. The orientation and in-service programs of the ICU nurse should include specific guidance regarding forensic principles, practices, and procedures.

  1. CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW

    OpenAIRE

    Elfadil Sabeil; Azizah Bt Abdul Manaf; Zuraini Ismail; Mohamed Abas

    2011-01-01

    Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day‟s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education h...

  2. Review of passive-blind detection in digital video forgery based on sensing and imaging techniques

    Science.gov (United States)

    Tao, Junjie; Jia, Lili; You, Ying

    2016-01-01

    Advances in digital video compression and IP communication technologies raised new issues and challenges concerning the integrity and authenticity of surveillance videos. It is so important that the system should ensure that once recorded, the video cannot be altered; ensuring the audit trail is intact for evidential purposes. This paper gives an overview of passive techniques of Digital Video Forensics which are based on intrinsic fingerprints inherent in digital surveillance videos. In this paper, we performed a thorough research of literatures relevant to video manipulation detection methods which accomplish blind authentications without referring to any auxiliary information. We presents review of various existing methods in literature, and much more work is needed to be done in this field of video forensics based on video data analysis and observation of the surveillance systems.

  3. Forensic DNA testing.

    Science.gov (United States)

    Butler, John M

    2011-12-01

    Forensic DNA testing has a number of applications, including parentage testing, identifying human remains from natural or man-made disasters or terrorist attacks, and solving crimes. This article provides background information followed by an overview of the process of forensic DNA testing, including sample collection, DNA extraction, PCR amplification, short tandem repeat (STR) allele separation and sizing, typing and profile interpretation, statistical analysis, and quality assurance. The article concludes with discussions of possible problems with the data and other forensic DNA testing techniques.

  4. Accuracy Rates of Ancestry Estimation by Forensic Anthropologists Using Identified Forensic Cases.

    Science.gov (United States)

    Thomas, Richard M; Parks, Connie L; Richard, Adam H

    2017-07-01

    A common task in forensic anthropology involves the estimation of the ancestry of a decedent by comparing their skeletal morphology and measurements to skeletons of individuals from known geographic groups. However, the accuracy rates of ancestry estimation methods in actual forensic casework have rarely been studied. This article uses 99 forensic cases with identified skeletal remains to develop accuracy rates for ancestry estimations conducted by forensic anthropologists. The overall rate of correct ancestry estimation from these cases is 90.9%, which is comparable to most research-derived rates and those reported by individual practitioners. Statistical tests showed no significant difference in accuracy rates depending on examiner education level or on the estimated or identified ancestry. More recent cases showed a significantly higher accuracy rate. The incorporation of metric analyses into the ancestry estimate in these cases led to a higher accuracy rate. © 2017 American Academy of Forensic Sciences.

  5. Detection and localization of copy-paste forgeries in digital videos.

    Science.gov (United States)

    Singh, Raahat Devender; Aggarwal, Naveen

    2017-12-01

    Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence operations. However, despite being an indispensable source of information with high evidentiary value, digital videos are also extremely vulnerable to conscious manipulations. Therefore, in a situation where dependence on video evidence is unavoidable, it becomes crucial to authenticate the contents of this evidence before accepting them as an accurate depiction of reality. Digital videos can suffer from several kinds of manipulations, but perhaps, one of the most consequential forgeries is copy-paste forgery, which involves insertion/removal of objects into/from video frames. Copy-paste forgeries alter the information presented by the video scene, which has a direct effect on our basic understanding of what that scene represents, and so, from a forensic standpoint, the challenge of detecting such forgeries is especially significant. In this paper, we propose a sensor pattern noise based copy-paste detection scheme, which is an improved and forensically stronger version of an existing noise-residue based technique. We also study a demosaicing artifact based image forensic scheme to estimate the extent of its viability in the domain of video forensics. Furthermore, we suggest a simplistic clustering technique for the detection of copy-paste forgeries, and determine if it possess the capabilities desired of a viable and efficacious video forensic scheme. Finally, we validate these schemes on a set of realistically tampered MJPEG, MPEG-2, MPEG-4, and H.264/AVC encoded videos in a diverse experimental set-up by varying the strength of post-production re-compressions and transcodings, bitrates, and sizes of the tampered regions. Such an experimental set-up is representative of a neutral testing platform and simulates a real

  6. How to optimize radiological images captured from digital cameras, using the Adobe Photoshop 6.0 program.

    Science.gov (United States)

    Chalazonitis, A N; Koumarianos, D; Tzovara, J; Chronopoulos, P

    2003-06-01

    Over the past decade, the technology that permits images to be digitized and the reduction in the cost of digital equipment allows quick digital transfer of any conventional radiological film. Images then can be transferred to a personal computer, and several software programs are available that can manipulate their digital appearance. In this article, the fundamentals of digital imaging are discussed, as well as the wide variety of optional adjustments that the Adobe Photoshop 6.0 (Adobe Systems, San Jose, CA) program can offer to present radiological images with satisfactory digital imaging quality.

  7. Integrating Forensic Science.

    Science.gov (United States)

    Funkhouser, John; Deslich, Barbara J.

    2000-01-01

    Explains the implementation of forensic science in an integrated curriculum and discusses the advantages of this approach. Lists the forensic science course syllabi studied in three high schools. Discusses the unit on polymers in detail. (YDS)

  8. Learning Android forensics

    CERN Document Server

    Tamma, Rohit

    2015-01-01

    If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

  9. From forensic epigenetics to forensic epigenomics: Broadening DNA investigative intelligence

    NARCIS (Netherlands)

    A. Vidaki (Athina); M.H. Kayser (Manfred)

    2017-01-01

    textabstractHuman genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We

  10. A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

    OpenAIRE

    Zawoad , Shams; Hasan , Ragib

    2015-01-01

    Part 5: CLOUD FORENSICS; International audience; The rapid migration from traditional computing and storage models to cloud computing environments has made it necessary to support reliable forensic investigations in the cloud. However, current cloud computing environments often lack support for forensic investigations and the trustworthiness of evidence is often questionable because of the possibility of collusion between dishonest cloud providers, users and forensic investigators. This chapt...

  11. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  12. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  13. Designing an effective microbial forensics program for law enforcement and national security purposes.

    Science.gov (United States)

    Murch, Randall S

    2014-06-01

    Forensic capabilities that provide lead information, and investigative, intelligence, prosecution and policy decision support can be invaluable for responding to and resolving bioterrorism events. Attributing biological attacks through scientific and other resources and processes is an important goal, for which science can be instrumental. Some even believe that having effective microbial forensics capabilities along with others can even deter adversaries from using biological weapons. For those nations that do not have such or wish to integrate or upgrade capabilities, thoughtful analysis and consideration of certain design principles will increase the likelihood that success will be attained.

  14. Programming Not Required: Skills and Knowledge for the Digital Library Environment

    Science.gov (United States)

    Howard, Katherine

    2010-01-01

    Education for Library and Information professionals in managing the digital environment has been a key topic for discussion within the LIS environment for some time. However, before designing and implementing a program for digital library education, it is prudent to ensure that the skills and knowledge required to work in this environment are…

  15. Xbox one file system data storage: A forensic analysis

    OpenAIRE

    Gravel, Caitlin Elizabeth

    2015-01-01

    The purpose of this research was to answer the question, how does the file system of the Xbox One store data on its hard disk? This question is the main focus of the exploratory research and results sought. The research is focused on digital forensic investigators and experts. An out of the box Xbox One gaming console was used in the research. Three test cases were created as viable scenarios an investigator could come across in a search and seizure of evidence. The three test cases were then...

  16. U.S. initiatives to strengthen forensic science & international standards in forensic DNA

    Science.gov (United States)

    Butler, John M.

    2015-01-01

    A number of initiatives are underway in the United States in response to the 2009 critique of forensic science by a National Academy of Sciences committee. This article provides a broad review of activities including efforts of the White House National Science and Technology Council Subcommittee on Forensic Science and a partnership between the Department of Justice (DOJ) and the National Institute of Standards and Technology (NIST) to create the National Commission on Forensic Science and the Organization of Scientific Area Committees. These initiatives are seeking to improve policies and practices of forensic science. Efforts to fund research activities and aid technology transition and training in forensic science are also covered. The second portion of the article reviews standards in place or in development around the world for forensic DNA. Documentary standards are used to help define written procedures to perform testing. Physical standards serve as reference materials for calibration and traceability purposes when testing is performed. Both documentary and physical standards enable reliable data comparison, and standard data formats and common markers or testing regions are crucial for effective data sharing. Core DNA markers provide a common framework and currency for constructing DNA databases with compatible data. Recent developments in expanding core DNA markers in Europe and the United States are discussed. PMID:26164236

  17. The use of insects in forensic investigations: An overview on the scope of forensic entomology.

    Science.gov (United States)

    Joseph, Isaac; Mathew, Deepu G; Sathyan, Pradeesh; Vargheese, Geetha

    2011-07-01

    Forensic entomology is the study of insects/arthropods in criminal investigation. Right from the early stages insects are attracted to the decomposing body and may lay eggs in it. By studying the insect population and the developing larval stages, forensic scientists can estimate the postmortem index, any change in position of the corpse as well as the cause of death. Forensic odontologists are called upon more frequently to collaborate in criminal investigations and hence should be aware of the possibilities that forensic entomology have to offer and use it as an adjunct to the conventional means of forensic investigation.

  18. Development and evaluation of first responder equipment for nuclear forensics

    International Nuclear Information System (INIS)

    Tsuchiya, Ken'ichi; Kurosawa, Kenji; Akiba, Norimitsu; Kuroki, Kenro; Schwantes, Jon M.; Pierson, Richard; Piper, Roman K.

    2014-01-01

    Nuclear forensics are the technical means by which nuclear and other radioactive materials used in illegal activities are characterized as to physical and chemical condition, provenance, and history. Sampling for traditional forensics evidence (e.g. fingerprints, DNA, hair, fibers, and digital evidence) contaminated by radionuclides, and categorization of nuclear and other radioactive materials by on-sight measurement are required for first responders. Portable radiological equipment and radiation protection for first responders to achieve emergency tasks safely at the incident sites have been developed and evaluated in National Research Institute of Police Science. In this report, we introduce wireless network dosimetry system and neutron protection shield with water under sampling and categorization. Described next in this report are evaluation tests of active personal dosimeters using neutron irradiation field in Pacific Northwest National Laboratory. We evaluated them under fast and thermal neutron field. We confirmed the large fluctuation of the response for each dosimeter caused by the energy dependence of the detectors. (author)

  19. Forensic archaeology and anthropology : An Australian perspective.

    Science.gov (United States)

    Oakley, Kate

    2005-09-01

    Forensic archaeology is an extremely powerful investigative discipline and, in combination with forensic anthropology, can provide a wealth of evidentiary information to police investigators and the forensic community. The re-emergence of forensic archaeology and anthropology within Australia relies on its diversification and cooperation with established forensic medical organizations, law enforcement forensic service divisions, and national forensic boards. This presents a unique opportunity to develop a new multidisciplinary approach to forensic archaeology/anthropology within Australia as we hold a unique set of environmental, social, and cultural conditions that diverge from overseas models and require different methodological approaches. In the current world political climate, more forensic techniques are being applied at scenes of mass disasters, genocide, and terrorism. This provides Australian forensic archaeology/anthropology with a unique opportunity to develop multidisciplinary models with contributions from psychological profiling, ballistics, sociopolitics, cultural anthropology, mortuary technicians, post-blast analysis, fire analysis, and other disciplines from the world of forensic science.

  20. [Forensic entomology].

    Science.gov (United States)

    Açikgöz, Halide Nihal

    2010-01-01

    Odour of the animal or human corpses immediately after death is very attractive for insects and other invertebrates. Blue and green bottle flies from the Calliphoridae family are the first colonizers of cadaver and immediately later necrophagous Diptera from the Sarcophagidae family settle on the same corpse. It is essential to determine the time past after death for elucidating the event in case of the homicide or suspicious death, and it is directly proportional to the post mortem interval expected time, which is based upon the speed of the larval growth. In this article, we purposed to stress the special interest of forensic entomology for the scientists who will apply this science in their forensic researches and case studies, and also to provide information to our judges, prosecutors and law enforcement agents in order to consider the entomological samples to be reliable and applicable evidences as biological stains and hairs. We are of the opinion that if any forensic entomologist is called to the crime scene or if the evidences are collected and then delivered to an entomologist, the forensic cases will be elucidated faster and more accurately.

  1. Research in forensic radiology and imaging

    DEFF Research Database (Denmark)

    Aalders, M. C.; Adolphi, N. L.; Daly, B.

    2017-01-01

    of America, and the Netherlands Forensic Institute. During this meeting, an international and multidisciplinary panel of forensic scientists discussed the current state of science in forensic radiology, and drafted a research agenda to further advance the field. Four groups for further research focus were...... identified: big data and statistics, identification and biological profiling, multimodal imaging, and visualization and presentation. This paper describes each of these research topics and thereby hopes to contribute to the development of this exciting new field of forensic medical science.......This paper presents the outcome of the first international forensic radiology and imaging research summit, organized by the International Society of Forensic Radiology and Imaging, the International Association of Forensic Radiographers, the National Institute of Justice of the United States...

  2. Forensic neuropsychology and expert witness testimony: An overview of forensic practice.

    Science.gov (United States)

    Leonard, Elizabeth L

    2015-01-01

    Neuropsychologists are frequently asked to serve as expert witnesses in an increasing number of legal contexts for civil and criminal proceedings. The skills required to practice forensic neuropsychology expand upon the knowledge, skills, and abilities developed by clinical neuropsychologists. Forensic neuropsychologists acquire expertise in understanding the roles and various functions of the legal system, as well as their role in addressing psycholegal questions to assist fact finders in making legal decisions. The required skills and the unique circumstances for clinical neuropsychologists pursing forensic work are reviewed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Geoethics and Forensic Geology

    Science.gov (United States)

    Donnelly, Laurance

    2017-04-01

    The International Union of Geological Sciences (IUGS), Initiative on Forensic Geology (IFG) was set up in 2011 to promote and develop the applications of geology to policing and law enforcement throughout the world. This includes the provision of crime scene examinations, searches to locate graves or items of interest that have been buried beneath the ground surface as part of a criminal act and geological trace analysis and evidence. Forensic geologists may assist the police and law enforcement in a range of ways including for example; homicide, sexual assaults, counter terrorism, kidnapping, humanitarian incidents, environmental crimes, precious minerals theft, fakes and fraudulent crimes. The objective of this paper is to consider the geoethical aspects of forensic geology. This includes both delivery to research and teaching, and contribution to the practical applications of forensic geology in case work. The case examples cited are based on the personal experiences of the authors. Often, the technical and scientific aspect of forensic geology investigation may be the most straightforward, after all, this is what the forensic geologist has been trained to do. The associated geoethical issues can be the most challenging and complex to manage. Generally, forensic geologists are driven to carry-out their research or case work with integrity, honesty and in a manner that is law abiding, professional, socially acceptable and highly responsible. This is necessary in advising law enforcement organisations, society and the scientific community that they represent. As the science of forensic geology begins to advance around the world it is desirable to establish a standard set of principles, values and to provide an agreed ethical a framework. But what are these core values? Who is responsible for producing these? How may these become enforced? What happens when geoethical standards are breached? This paper does not attempt to provide all of the answers, as further work

  4. Application of modern autoradiography to nuclear forensic analysis.

    Science.gov (United States)

    Parsons-Davis, Tashi; Knight, Kim; Fitzgerald, Marc; Stone, Gary; Caldeira, Lee; Ramon, Christina; Kristo, Michael

    2018-05-01

    Modern autoradiography techniques based on phosphorimaging technology using image plates (IPs) and digital scanning can identify heterogeneities in activity distributions and reveal material properties, serving to inform subsequent analyses. Here, we have adopted these advantages for applications in nuclear forensics, the technical analysis of radioactive or nuclear materials found outside of legal control to provide data related to provenance, production history, and trafficking route for the materials. IP autoradiography is a relatively simple, non-destructive method for sample characterization that records an image reflecting the relative intensity of alpha and beta emissions from a two-dimensional surface. Such data are complementary to information gathered from radiochemical characterization via bulk counting techniques, and can guide the application of other spatially resolved techniques such as scanning electron microscopy (SEM) and secondary ion mass spectrometry (SIMS). IP autoradiography can image large 2-dimenstional areas (up to 20×40cm), with relatively low detection limits for actinides and other radioactive nuclides, and sensitivity to a wide dynamic range (10 5 ) of activity density in a single image. Distributions of radioactivity in nuclear materials can be generated with a spatial resolution of approximately 50μm using IP autoradiography and digital scanning. While the finest grain silver halide films still provide the best possible resolution (down to ∼10μm), IP autoradiography has distinct practical advantages such as shorter exposure times, no chemical post-processing, reusability, rapid plate scanning, and automated image digitization. Sample preparation requirements are minimal, and the analytical method does not consume or alter the sample. These advantages make IP autoradiography ideal for routine screening of nuclear materials, and for the identification of areas of interest for subsequent micro-characterization methods. In this

  5. Forensic Science Technician

    Science.gov (United States)

    Tech Directions, 2010

    2010-01-01

    Forensic science technicians, also called crime laboratory technicians or police science technicians, help solve crimes. They examine and identify physical evidence to reconstruct a crime scene. This article discusses everything students need to know about careers for forensic science technicians--wages, responsibilities, skills needed, career…

  6. An Android Communication App Forensic Taxonomy.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2016-09-01

    Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps. © 2016 American Academy of Forensic Sciences.

  7. U.S. initiatives to strengthen forensic science & international standards in forensic DNA.

    Science.gov (United States)

    Butler, John M

    2015-09-01

    A number of initiatives are underway in the United States in response to the 2009 critique of forensic science by a National Academy of Sciences committee. This article provides a broad review of activities including efforts of the White House National Science and Technology Council Subcommittee on Forensic Science and a partnership between the Department of Justice (DOJ) and the National Institute of Standards and Technology (NIST) to create the National Commission on Forensic Science and the Organization of Scientific Area Committees. These initiatives are seeking to improve policies and practices of forensic science. Efforts to fund research activities and aid technology transition and training in forensic science are also covered. The second portion of the article reviews standards in place or in development around the world for forensic DNA. Documentary standards are used to help define written procedures to perform testing. Physical standards serve as reference materials for calibration and traceability purposes when testing is performed. Both documentary and physical standards enable reliable data comparison, and standard data formats and common markers or testing regions are crucial for effective data sharing. Core DNA markers provide a common framework and currency for constructing DNA databases with compatible data. Recent developments in expanding core DNA markers in Europe and the United States are discussed. Published by Elsevier Ireland Ltd.

  8. FORENSIC SCIENCE:: 20 YEARS OF FORENSIC DENTISTRY AT THE UNIVERSITY OF ZAGREB, 1994 - 2014.

    Science.gov (United States)

    Brkić, Hrvoje

    2014-06-01

    Data from available literature point to an early beginning of Forensic Dentistry in Croatia relating to a post-mortem examination of a female patient after a dental procedure in the 1930s. Later on, there were several mass casualties due to collisions and airplane crashes and a railway accident at the Zagreb Main Railway Station wherein the identity of the victims was established based on dental features. Foreign experts in forensics helped identify those victims, particularly forensic dentists because this specialty was almost unknown in our region at the time. During the twenty-year period of the development of Forensic Dentistry at the University of Zagreb, the School of Dental Medicine, the city of Zagreb and Croatia have become internationally recognised on the forensic map of the world.

  9. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  10. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  11. Forensic and non-forensic psychiatric nursing skills and competencies for psychopathic and personality disordered patients.

    Science.gov (United States)

    Bowen, Matt; Mason, Tom

    2012-12-01

    To understand better the skills and competencies for forensic and non-forensic nursing of psychopathic and personality disordered patients. In the UK, there has been growing interest in service provision for this client group, but with little research to support the nursing skills required. A non-experimental design, using a postal survey to 990 forensic and 500 non-forensic nurses. An information gathering schedule was used to generate data about the most desirable skills and competencies and least desirable weaknesses and nursing attributes to nurse this group. The results for the forensic nurses. Main strengths and skills: being firm, setting limits and defining boundaries. Main weaknesses: inability to engage, inability to resolve conflict and impatience. Main skills and competencies: being non-threatening, non-judgemental and able to expect anything. Least desirable qualities: over-reacting, being judgemental and over-confrontational. The results for the non-forensic nurses. Main strengths and skills: being non-judgemental, listening skills and good risk assessment. Main weaknesses: frustration with the system, a fear of aggression and no skills to engage. Main skills and competencies: being open-minded, non-judgemental and forming relationships. Least desirable qualities: a supercilious attitude, cynicism and being judgemental. The results highlight the importance of forming therapeutic relationships as the bedrock of both forensic and non-forensic nursing, and they also highlight the important differences with regard to the significance of therapeutic action and therapeutic verbal interaction. The provision of better care for this client group will rely on appropriate training for nurses. This research highlights the need for training that supports the development of engagement skills, communication skills and an ability to use reflection in action as a means of providing therapeutic care. It also highlights the different emphasis on the use of these skills

  12. Specialty Guidelines for Forensic Psychology

    Science.gov (United States)

    American Psychologist, 2013

    2013-01-01

    In the past 50 years forensic psychological practice has expanded dramatically. Because the practice of forensic psychology differs in important ways from more traditional practice areas (Monahan, 1980) the "Specialty Guidelines for Forensic Psychologists" were developed and published in 1991 (Committee on Ethical Guidelines for Forensic…

  13. When forensic odontology met biochemistry: Multidisciplinary approach in forensic human identification.

    Science.gov (United States)

    Adserias-Garriga, Joe; Thomas, Christian; Ubelaker, Douglas H; C Zapico, Sara

    2018-03-01

    When human remains are found, the priority of the investigation is to ascertain the identity of the deceased. A positive identification is a key factor in providing closure for the family of the deceased; it is also required to issue the death certificate and therefore, to settle legal affairs. Moreover, it is difficult for any forensic investigation involving human remains to be solved without the determination of an identity. Therefore, personal identification is necessary for social, legal and forensic reasons. In the last thirty years forensic odontology has experienced an important transformation, from primarily involving occasional dental identification into a broader role, contributing to the determination of the biological profile. In the same way, "DNA fingerprinting" has evolved not only in terms of improving its technology, but also in its application beyond the "classical": helping with the estimation of sex, age and ancestry. As these two forensic disciplines have developed independently, their pathways have crossed several times through human identification operations, especially the ones that require a multidisciplinary approach. Thus, the aim of this review is to describe the contributions of both forensic odontology and molecular biology/biochemistry to human identification, demonstrating how a multidisciplinary approach can lead to a better and more efficient identification. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  15. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  16. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  17. Identity Restored: Nesmin's Forensic Facial Reconstruction in Context

    Directory of Open Access Journals (Sweden)

    Branislav Anđelković

    2016-03-01

    Full Text Available A wide range of archaeological human remains stay, for the most part, anonymous and are consequently treated as objects of analysis; not as dead people. With the growing availability of medical imaging and rapidly developing computer technology, 3D digital facial reconstruction, as a noninvasive form of study, offers a successful method of recreating faces from mummified human remains. Forensic facial reconstruction has been utilized for various purposes in scientific investigation, including restoring the physical appearance of the people of ancient civilizations which is an important aspect of their individual identity. Restoring the identity of the Belgrade mummy started in 1991. Along with the absolute dating, gender, age, name, rank and provenance, we also established his genealogy. The owner of Cairo stela 22053 discovered at Akhmim in 1885, and the Belgrade coffin purchased in Luxor in 1888, in which the mummy rests, have been identified as the very same person. Forensic facial reconstruction was used to reproduce, with the highest possible degree of accuracy, the facial appearance of the mummy Nesmin, ca. 300 B.C., a priest from Akhmim, when he was alive.

  18. Nuclear Forensics Technologies in Japan

    International Nuclear Information System (INIS)

    Shinohara, N.; Kimura, Y.; Okubo, A.; Tomikawa, H.

    2015-01-01

    Nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material to provide evidence for nuclear attribution by determining origin, history, transit routes and purpose involving such material. Nuclear forensics activities include sampling of the illicit material, analysis of the samples and evaluation of the attribution by comparing the analysed data with database or numerical simulation. Because the nuclear forensics methodologies provide hints of the origin of the nuclear materials used in illegal dealings or nuclear terrorism, it contributes to identify and indict offenders, hence to enhance deterrent effect against such terrorism. Worldwide network on nuclear forensics can lead to strengthening global nuclear security regime. In the ESARDA Symposium 2015, the results of research and development of fundamental nuclear forensics technologies performed in Japan Atomic Energy Agency during the term of 2011-2013 were reported, namely (1) technique to analyse isotopic composition of nuclear material, (2) technique to identify the impurities contained in the material, (3) technique to determine the age of the purified material by measuring the isotopic ratio of daughter thorium to parent uranium, (4) technique to make image data by observing particle shapes with electron microscope, and (5) prototype nuclear forensics library for comparison of the analysed data with database in order to evaluate its evidence such as origin and history. Japan’s capability on nuclear forensics and effective international cooperation are also mentioned for contribution to the international nuclear forensics community.

  19. [Advances of forensic entomology in China].

    Science.gov (United States)

    Lan, Ling-mei; Liao, Zhi-gang; Chen, Yao-qing; Yao, Yue; Li, Jian-bo; Li, Mao-yang; Cai, Ji-feng

    2006-12-01

    Forensic entomology is a branch of forensic medicine, which applies studies of insects and arthropods to getting evidence for court and has an analogous advantage in the estimation of the postmortem interval (PMI) and other questions of forensic relevance. The paper expounds its definition and contents and reviews some progress of the studies in some aspects in China such as the constitution and succession of insect community on the different cadavers, the applications of morphological features of insects and the technology of analysis of deoxyribonucleic acid (DNA) in forensic entomology, and forensic entomological toxicology etc.

  20. Instrument for Real-Time Digital Nucleic Acid Amplification on Custom Microfluidic Devices.

    Directory of Open Access Journals (Sweden)

    David A Selck

    Full Text Available Nucleic acid amplification tests that are coupled with a digital readout enable the absolute quantification of single molecules, even at ultralow concentrations. Digital methods are robust, versatile and compatible with many amplification chemistries including isothermal amplification, making them particularly invaluable to assays that require sensitive detection, such as the quantification of viral load in occult infections or detection of sparse amounts of DNA from forensic samples. A number of microfluidic platforms are being developed for carrying out digital amplification. However, the mechanistic investigation and optimization of digital assays has been limited by the lack of real-time kinetic information about which factors affect the digital efficiency and analytical sensitivity of a reaction. Commercially available instruments that are capable of tracking digital reactions in real-time are restricted to only a small number of device types and sample-preparation strategies. Thus, most researchers who wish to develop, study, or optimize digital assays rely on the rate of the amplification reaction when performed in a bulk experiment, which is now recognized as an unreliable predictor of digital efficiency. To expand our ability to study how digital reactions proceed in real-time and enable us to optimize both the digital efficiency and analytical sensitivity of digital assays, we built a custom large-format digital real-time amplification instrument that can accommodate a wide variety of devices, amplification chemistries and sample-handling conditions. Herein, we validate this instrument, we provide detailed schematics that will enable others to build their own custom instruments, and we include a complete custom software suite to collect and analyze the data retrieved from the instrument. We believe assay optimizations enabled by this instrument will improve the current limits of nucleic acid detection and quantification, improving our

  1. Parasites in Forensic Science: a historic perspective

    Science.gov (United States)

    Cardoso, Rita; Alves, Helena; Richter, Joachim; Botelho, Monica C

    Parasites show a great potential to Forensic Science. Forensic Science is the application of any science and methodology to the legal system. The forensic scientist collects and analyses the physical evidence and produce a report of the results to the court. A parasite is an organism that lives at the expense of another and they exist in any ecosystem. Parasites are the cause of many important diseases. The forensic scientists can use the parasites to identify a crime scene, to determine the murder weapon or simply identify an individual. The applications for parasites in the Forensic Science can be many and more studies should be made in Forensic Parasitology. The most important parasites in Forensic Science are helminths specifically schistosomes. Through history there are many cases where schistosomes were described in autopsies and it was related to the cause of death. Here we review the applications of parasites in Forensic Science and its importance to the forensic scientist.

  2. Distinguishing between forensic science and forensic pseudoscience: testing of validity and reliability, and approaches to forensic voice comparison.

    Science.gov (United States)

    Morrison, Geoffrey Stewart

    2014-05-01

    In this paper it is argued that one should not attempt to directly assess whether a forensic analysis technique is scientifically acceptable. Rather one should first specify what one considers to be appropriate principles governing acceptable practice, then consider any particular approach in light of those principles. This paper focuses on one principle: the validity and reliability of an approach should be empirically tested under conditions reflecting those of the case under investigation using test data drawn from the relevant population. Versions of this principle have been key elements in several reports on forensic science, including forensic voice comparison, published over the last four-and-a-half decades. The aural-spectrographic approach to forensic voice comparison (also known as "voiceprint" or "voicegram" examination) and the currently widely practiced auditory-acoustic-phonetic approach are considered in light of this principle (these two approaches do not appear to be mutually exclusive). Approaches based on data, quantitative measurements, and statistical models are also considered in light of this principle. © 2013.

  3. Evaluation of NCHRP 747 Pavement Forensic Guide for GDOT’s Adoption

    Science.gov (United States)

    2018-04-01

    This report presents the recommendation for whether the Georgia Department of Transportation (GDOT) should adopt the National Cooperative Highway Research Program (NCHRP) Report 747 (Guide for Conducting Forensic Investigations of Highway Pavements) ...

  4. Nuclear Forensics: Report of the AAAS/APS Working Group

    Science.gov (United States)

    Tannenbaum, Benn

    2008-04-01

    This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics

  5. Nuclear forensics and nuclear analytical chemistry - iridium determination in a referred forensic sample

    International Nuclear Information System (INIS)

    Basu, A.K.; Bhadkambekar, C.A.; Tripathi, A.B.R.; Chattopadhyay, N.; Ghosh, P.

    2010-01-01

    Nuclear approaches for compositional characterization has bright application prospect in forensic perspective towards assessment of nature and origin of seized material. The macro and micro physical properties of nuclear materials can be specifically associated with a process or type of nuclear activity. Under the jurisdiction of nuclear analytical chemistry as well as nuclear forensics, thrust areas of scientific endeavor like determination of radioisotopes, isotopic and mass ratios, analysis for impurity contents, arriving at chemical forms/species and physical parameters play supporting evidence in forensic investigations. The analytical methods developed for this purposes can be used in international safeguards as well for nuclear forensics. Nuclear material seized in nuclear trafficking can be identified and a profile of the nuclear material can be created

  6. Forensic psychologist

    Directory of Open Access Journals (Sweden)

    Tinkara Pavšič Mrevlje

    2011-04-01

    Full Text Available The paper is a review of different issues that a forensic psychologists encounter at work. Forensic assessment might be needed in civil law cases, administrative procedures and in criminal law cases. The paper focuses on referrals in criminal law cases regarding matters such as assessing competence to stand trial, criminal responsibility and violence risk assessment. Finally, the role of expert testimony on eyewitness memory, which is not used in practice in Slovenia yet, is presented.

  7. Recording routine forensic mental health evaluations should be a standard of practice in the 21st century.

    Science.gov (United States)

    Siegel, David M; Kinscherff, Robert

    2018-04-25

    The standard of practice for forensic interviews in criminal and delinquency cases, other than those conducted as part of brief preliminary screening evaluations or in emergency situations, should include a digital recording requirement. This standard should be adopted because of the greater availability of, and familiarity with, recording technology on the part of mental health professionals, the greater use and proven effectiveness of recording in other contexts of the criminal justice system, and the improvement in court presentation and accuracy of judicial determinations involving forensic assessments that recording will provide. The experience of practitioners with recording since professional associations last studied the issue should be taken into account, as informal data suggest it has been positive. Unfortunately, the legal system is unlikely to prompt this advance without its reconsideration by the forensic mental health professions, because current constitutional jurisprudence does not require recording and effectively makes it contingent upon request by examiners. Forensic evaluators thus have a valuable opportunity to educate the legal system on the utility and importance of this key reform, and so should adopt it as a best practice. Copyright © 2018 John Wiley & Sons, Ltd.

  8. Analytical and Radiochemistry for Nuclear Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-26

    Information about nonproliferation nuclear forensics, activities in forensics at Los Alamos National Laboratory, radio analytical work at LANL, radiochemical characterization capabilities, bulk chemical and materials analysis capabilities, and future interests in forensics interactions.

  9. Developing a Forensic Approach to Process Improvement: The Relationship between Curriculum and Impact in Frontline Operator Education

    Science.gov (United States)

    Croom, Simon; Betts, Alan

    2011-01-01

    The authors present a comparative study of 2 in-company educational programs aimed at developing frontline operator capabilities in forensic methods. They discuss the relationship between the application of various forensic tools and conceptual techniques, the process (i.e., curriculum) for developing employee knowledge and capability, and the…

  10. Understanding Nuclear Forensics in 5 Questions

    International Nuclear Information System (INIS)

    2014-01-01

    Forensic science, commonly referred to as forensics, is the examination of physical, biological, behavioural and documentary evidence. The goal of forensics is to discover linkages among people, places, things and events. A sub-discipline of forensic science, nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material, which can assist in law enforcement investigations as well as assessments of the potential vulnerabilities associated with the use, production and storage of these materials as part of a nuclear security infrastructure. The analysis of nuclear or other radioactive material seeks to identify what the materials are, how, when, and where the materials were made, and what their intended uses were. Nuclear forensics is an important tool in the fight against illicit trafficking in nuclear and radiological material

  11. A digital fly-by-wire technology development program using an F-8C test aircraft

    Science.gov (United States)

    Jarvis, C. R.

    1974-01-01

    A digital fly-by-wire flight control system has been installed in an F-8C test airplane and has undergone extensive ground and flight testing as part of an overall program to develop digital fly-by-wire technology. This is the first airplane to fly with a digital fly-by-wire system as its primary means of control and with no mechanical reversion capability. Forty-two test flights were made for a total flight time of 57 hours. Six pilots participated in the evaluation. This paper presents an overview of the digital fly-by-wire program and discusses some of the flight-test results.

  12. The forensic entomologist in the context of the forensic pathologist's role.

    Science.gov (United States)

    Campobasso, C P; Introna, F

    2001-08-15

    An adequate death investigation requires the combined efforts and cooperation of experts in different disciplines: crime scene technicians, death investigators, forensic pathologists, anthropologists, entomologists, other medical and non-medical professionals. These front-line experts play a crucial role in every death investigation process. The forensic pathologist normally has the legal authority to take charge of the dead body at a death scene and his primary functions are the exterior and interior examination of the cadaver by analyzing the extent of antemortem injuries and the postmortem changes and the recovery of physical evidence. He is responsible for determining how, when and why of any death which is the result of violence, suspicious or unexplained circumstances or a death which is sudden or unattended, defending and explaining the reasons for making these diagnoses in a courtroom. The forensic entomologist can provide invaluable aid in death cases where human remains are colonized by insects and in the overall investigation. His principal role is to identify the arthropods associated with such cases and to analyze entomological data for interpreting insect evidence. He is responsible for determining the period of insect activity according to all the variables affecting insect invasion of remains and their development. The major goal of medico-criminal entomology is to contribute to the determination of the time, cause, manner and place of the investigated death (especially on badly decomposed corpses or skeletonized human remains) with the support of all the elements which can be inferred from the study of insects found on the cadaver or nearby. The application of techniques devised recently in forensic entomology can allow experts in the field to collect strong entomological evidence and provide useful information not only in a death investigation including movement or storage of the remains following death, time of dismemberment, postmortem artifacts

  13. Nails in Forensic Toxicology: An Update.

    Science.gov (United States)

    Solimini, Renata; Minutillo, Adele; Kyriakou, Chrystalla; Pichini, Simona; Pacifici, Roberta; Busardo, Francesco Paolo

    2017-01-01

    The analysis of nails as a keratinized matrix to detect drugs or illicit substances has been increasingly used in forensic and clinical toxicology as a complementary test, especially for the specific characteristics of stably accumulating substances for long periods of time. This allows a retrospective investigation of chronic drug abuse, monitoring continuous drug or pharmaceutical use, reveal in utero drug exposure or environmental exposures. We herein review the recent literature investigating drug incorporation mechanisms and drug detection in nails for forensic toxicological purposes. Mechanisms of drug incorporation have not yet been fully elucidated. However, some research has lately contributed to a better understanding of how substances are incorporated into nails, suggesting three potential mechanisms of drug incorporation: contamination from sweat, incorporation from nail bed and incorporation from germinal matrix. In addition, numerous methods dealing with the determination of drugs of abuse, medications and alcohol biomarkers in nails have been reported in studies over the years. The latter methods could find application in clinical and forensic toxicology. The studies herein reviewed point out how important it is to standardize and harmonize the methodologies (either pre-analytical or analytical) for nails analysis and the optimization of sampling as well as the development of proficiency testing programs and the determination of cut-off values. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  14. The Implementation and Growth of an International Online Forensic Science Graduate Program at the University of Florida

    Science.gov (United States)

    Grundmann, Oliver; Wielbo, Donna; Tebbett, Ian

    2010-01-01

    Forensic science education has evolved as an interdisciplinary science that includes medicine, chemistry, biology, and criminal justice. Therefore, multiple paths can lead to a career in forensic science. A formal education usually requires the student to attend a college or university to obtain a bachelor's or master's degree. In many cases,…

  15. The forensic aspects of sexual violence.

    Science.gov (United States)

    Newton, Mary

    2013-02-01

    Complainants of sexual assault may disclose to different agencies, the police and health professionals being the most likely. It is possible for certain evidence types to be collected before a clinical forensic assessment takes place that do not require the need for a Forensic Medical Practitioner. If the time frames after the incident and the nature of assault warrant the need for a forensic medical examination of either a complainant or a suspect, this should only be conducted by doctors and nurses who have received relevant, up-to-date specialist theoretical and practical training. Clear evidence shows that few other criminal offences require as extensive an examination and collection of forensic evidence as that of a sexual assault. The forensic evidence in a case may identify an assailant, eliminate a nominated suspect(s), and assist in the prosecution of a case. The elements of forensic medical examination, reviewed in this chapter, are those that are the most varied across jurisdictions around the world currently. Key focus points of this chapter are considerations for early evidence collection, utilising dedicated medical examination facilities for sample collection, contamination issues associated with evidence collection and certain practical aspects of forensic sampling methods which have evolved given results identified by Forensic Scientists processing evidential samples in sexual assault cases, Some of the problems encountered by the forensic science provider will also be discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Nuclear forensics-metrological basis for legal defensibility

    International Nuclear Information System (INIS)

    Leggitt, J.; Inn, K.; Goldberg, S.; Essex, R.; LaMont, S.; Chase, S.

    2009-01-01

    The admissibility of nuclear forensics measurements and opinions derived from them in US Federal and State courts are based on criteria established by the US Supreme Court in the case of Daubert v. Merrell Dow and the 2000 Amendment of Rule 702 of the Federal Rules of Evidence. These criteria are being addressed by new efforts that include the development of certified reference materials (CRMs) to provide the basis for analytical method development, optimization, calibration, validation, quality control, testing, readiness, and declaration of measurement uncertainties. Quality data is crucial for all stages of the program, from R and D, and database development, to actual casework. Weakness at any point in the program can propagate to reduce the confidence of final conclusions. The new certified reference materials will provide the necessary means to demonstrate a high level of metrological rigor for nuclear forensics evidence and will form a foundation for legally defensible nuclear chemical analysis. The CRMs will allow scientists to devise validated analytical methods, which can be corroborated by independent analytical laboratories. CRMs are required for ISO accreditation of many different analytical techniques which may be employed in the analysis of interdicted nuclear materials. (author)

  17. Forensic Taxonomy of Android Social Apps.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2017-03-01

    An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. © 2016 American Academy of Forensic Sciences.

  18. Forensic psychiatry in Singapore.

    Science.gov (United States)

    Chan, Lai Gwen; Tomita, Todd

    2013-12-01

    Singapore is a geographically small nation-state that has transformed itself from a third-world country to a developed nation after attaining political independence 46 years ago. The pace of change has been tremendous and mental health care is no exception. This paper provides an overview of mental health care and a review of key mental health legislation, including a National Mental Health Blueprint that was rolled out in 2007. On this background, the paper focuses on a description of forensic psychiatric services in Singapore. The role of the Department of Forensic Psychiatry at the Institute of Mental Health, which is the only forensic psychiatry department in the country, will be highlighted. Civil commitment and the treatment of unfit accused persons and insanity acquittees is reviewed. The role of forensic psychiatric assessments in the Singapore courts is examined. The application of the insanity and diminished responsibility defenses are reviewed. A trend is identified in the Singapore courts towards a more rehabilitation-focused sentencing approach and the role that forensic psychiatric assessments play in cases involving mentally disordered offenders is highlighted. Copyright © 2013 Wiley Publishing Asia Pty Ltd.

  19. Veterinary Forensic Pathology: The Search for Truth.

    Science.gov (United States)

    McDonough, S P; McEwen, B J

    2016-09-01

    Veterinary forensic pathology is emerging as a distinct discipline, and this special issue is a major step forward in establishing the scientific basis of the discipline. A forensic necropsy uses the same skill set needed for investigations of natural disease, but the analytical framework and purpose of forensic pathology differ significantly. The requirement of legal credibility and all that it entails distinguishes the forensic from routine diagnostic cases. Despite the extraordinary depth and breadth of knowledge afforded by their training, almost 75% of veterinary pathologists report that their training has not adequately prepared them to handle forensic cases. Many veterinary pathologists, however, are interested and willing to develop expertise in the discipline. Lessons learned from tragic examples of wrongful convictions in medical forensic pathology indicate that a solid foundation for the evolving discipline of veterinary forensic pathology requires a commitment to education, training, and certification. The overarching theme of this issue is that the forensic necropsy is just one aspect in the investigation of a case of suspected animal abuse or neglect. As veterinary pathologists, we must be aware of the roles filled by other veterinary forensic experts involved in these cases and how our findings are an integral part of an investigation. We hope that the outcome of this special issue of the journal is that veterinary pathologists begin to familiarize themselves with not only forensic pathology but also all aspects of veterinary forensic science. © The Author(s) 2016.

  20. Students' conceptions of evidence during a university introductory forensic science course

    Science.gov (United States)

    Yeshion, Theodore Elliot

    Students' Conceptions of Science, Scientific Evidence, and Forensic Evidence during a University Introductory Forensic Science Course This study was designed to examine and understand what conceptions undergraduate students taking an introductory forensic science course had about scientific evidence. Because the relationships between the nature of science, the nature of evidence, and the nature of forensic evidence are not well understood in the science education literature, this study sought to understand how these concepts interact and affect students' understanding of scientific evidence. Four participants were purposefully selected for this study from among 89 students enrolled in two sections of an introductory forensic science course taught during the fall 2005 semester. Of the 89 students, 84 were criminal justice majors with minimal science background and five were chemistry majors with academic backgrounds in the natural and physical sciences. All 89 students completed a biographical data sheet and a pre-instruction Likert scale survey consisting of twenty questions relating to the nature of scientific evidence. An evaluation of these two documents resulted in a purposeful selection of four varied student participants, each of whom was interviewed three times throughout the semester about the nature of science, the nature of evidence, and the nature of forensic evidence. The same survey was administered to the participants again at the end of the semester-long course. This study examined students' assumptions, prior knowledge, their understanding of scientific inference, scientific theory, and methodology. Examination of the data found few differences with regard to how the criminal justice majors and the chemistry majors responded to interview questions about forensic evidence. There were qualitative differences, however, when the same participants answered interview questions relating to traditional scientific evidence. Furthermore, suggestions are

  1. Home - Virginia Department of Forensic Science

    Science.gov (United States)

    Collecting DNA Data Bank Samples Forensic Training Forensic Science Academy Short Course Schedule Forensic gross weights, marijuana food products and search warrant cases. Click anywhere on the image to open the -screen comparison software system to perform and document the comparison. Virginia DNA Data Bank

  2. A forensic identification case and DPid - can it be a useful tool?

    Science.gov (United States)

    Queiroz, Cristhiane Leão de; Bostock, Ellen Marie; Santos, Carlos Ferreira; Guimarães, Marco Aurélio; Silva, Ricardo Henrique Alves da

    2017-01-01

    The aim of this study was to show DPid as an important tool of potential application to solve cases with dental prosthesis, such as the forensic case reported, in which a skull, denture and dental records were received for analysis. Human identification is still challenging in various circumstances and Dental Prosthetics Identification (DPid) stores the patient's name and prosthesis information and provides access through an embedded code in dental prosthesis or an identification card. All of this information is digitally stored on servers accessible only by dentists, laboratory technicians and patients with their own level of secure access. DPid provides a complete single-source list of all dental prosthesis features (materials and components) under complete and secure documentation used for clinical follow-up and for human identification. If DPid tool was present in this forensic case, it could have been solved without requirement of DNA exam, which confirmed the dental comparison of antemortem and postmortem records, and concluded the case as a positive identification.

  3. [Professional competence of the graduates of the clinical residency and internship in the speciality 31.08.10 'forensic medical expertise'].

    Science.gov (United States)

    Kovalev, A V; Romanenko, G Kh; Makarov, I Yu; Zharov, V V; Bereznikov, A V

    The objective of the present study was the definition of the basic professional competences of the graduates of the clinical residency and internship in the speciality 31.08.10 'forensic medical expertise'. The program for the acquirement of the basic knowledge, skills, and professional competences needed to be trained in the speciality 31.08.10 'forensic medical expertise' has been elaborated in the framework of the more extensive program for the clinical residency and internship intended for the training of the highly qualified specialists in this discipline. The preliminary list of basic professional competences of a graduate from the clinical residency and internship has been formulated in accordance with the program for the training of a competitive and highly qualified forensic medical experts. The practical professional activities are considered to be an indispensable component of the training and educational process for a future forensic medical expert. It is believed that the strengthening of this training component will greatly contribute to the improvement of the quality of training of such specialists.

  4. [Applicability of non-invasive imaging methods in forensic medicine and forensic anthropology in particular].

    Science.gov (United States)

    Marcinková, Mária; Straka, Ľubomír; Novomeský, František; Janík, Martin; Štuller, František; Krajčovič, Jozef

    2018-01-01

    Massive progress in developing even more precise imaging modalities influenced all medical branches including the forensic medicine. In forensic anthropology, an inevitable part of forensic medicine itself, the use of all imaging modalities becomes even more important. Despite of acquiring more accurate informations about the deceased, all of them can be used in the process of identification and/or age estimation. X - ray imaging is most commonly used in detecting foreign bodies or various pathological changes of the deceased. Computed tomography, on the other hand, can be very helpful in the process of identification, whereas outcomes of this examination can be used for virtual reconstruction of living objects. Magnetic resonance imaging offers new opportunities in detecting cardiovascular pathological processes or develompental anomalies. Ultrasonography provides promising results in age estimation of living subjects without excessive doses of radiation. Processing the latest information sources available, authors introduce the application examples of X - ray imaging, computed tomography, magnetic resonance imaging and ultrasonography in everyday forensic medicine routine, with particular focusing on forensic anthropology.

  5. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  6. The suitability of visual taphonomic methods for digital photographs: An experimental approach with pig carcasses in a tropical climate.

    Science.gov (United States)

    Ribéreau-Gayon, Agathe; Rando, Carolyn; Morgan, Ruth M; Carter, David O

    2018-05-01

    In the context of increased scrutiny of the methods in forensic sciences, it is essential to ensure that the approaches used in forensic taphonomy to measure decomposition and estimate the postmortem interval are underpinned by robust evidence-based data. Digital photographs are an important source of documentation in forensic taphonomic investigations but the suitability of the current approaches for photographs, rather than real-time remains, is poorly studied which can undermine accurate forensic conclusions. The present study aimed to investigate the suitability of 2D colour digital photographs for evaluating decomposition of exposed human analogues (Sus scrofa domesticus) in a tropical savanna environment (Hawaii), using two published scoring methods; Megyesi et al., 2005 and Keough et al., 2017. It was found that there were significant differences between the real-time and photograph decomposition scores when the Megyesi et al. method was used. However, the Keough et al. method applied to photographs reflected real-time decomposition more closely and thus appears more suitable to evaluate pig decomposition from 2D photographs. The findings indicate that the type of scoring method used has a significant impact on the ability to accurately evaluate the decomposition of exposed pig carcasses from photographs. It was further identified that photographic taphonomic analysis can reach high inter-observer reproducibility. These novel findings are of significant importance for the forensic sciences as they highlight the potential for high quality photograph coverage to provide useful complementary information for the forensic taphonomic investigation. New recommendations to develop robust transparent approaches adapted to photographs in forensic taphonomy are suggested based on these findings. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  7. Computer Forensics JumpStart

    CERN Document Server

    Solomon, Michael G; Tittel, Ed; Broom, Neil; Barrett, Diane

    2011-01-01

    Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes

  8. Forensic Interviews for Child Sexual Abuse Allegations: An Investigation into the Effects of Animal-Assisted Intervention on Stress Biomarkers.

    Science.gov (United States)

    Krause-Parello, Cheryl A; Gulick, Elsie E

    2015-01-01

    The use of therapy animals during forensic interviews for child sexual abuse allegations is a recommendation by the Therapy Animals Supporting Kids Program to help ease children's discomfort during the forensic interview process. Based on this recommendation, this study incorporated a certified therapy canine into the forensic interview process for child sexual abuse allegations. This study investigated changes in salivary cortisol, immunoglobulin A, blood pressure, and heart rate as a result of forensic interview phenomenon (e.g., outcry) incorporating animal-assisted intervention versus a control condition in children (N = 42) interviewed for alleged child sexual abuse. The results supported significantly greater heart rate values for the control group (n = 23) who experienced sexual contact and/or indecency than the experience of aggravated sexual assault compared to no difference in HR for the intervention group (n = 19). The results suggest that the presence of the canine in the forensic interview may have acted as a buffer or safeguard for the children when disclosing details of sexual abuse. In the intervention group, children's HR was lower at the start of the forensic interview compared to the control group. Finding an effect of having a certified handler-canine team available during the forensic interview on physiological measures of stress has real-world value for children, child welfare personnel, and clinical therapists. It is suggested that animal-assisted intervention be expanded to children facing other types of trauma and to treatment programs for child survivors of sexual abuse.

  9. Nuclear forensic analysis

    International Nuclear Information System (INIS)

    Tomar, B.S.

    2016-01-01

    In the present talk the fundamentals of the nuclear forensic investigations will be discussed followed by the detailed standard operating procedure (SOP) for the nuclear forensic analysis. The characteristics, such as, dimensions, particle size, elemental and isotopic composition help the nuclear forensic analyst in source attribution of the interdicted material, as the specifications of the nuclear materials used by different countries are different. The analysis of elemental composition could be done by SEM-EDS, XRF, CHNS analyser, etc. depending upon the type of the material. Often the trace constituents (analysed by ICP-AES, ICP-MS, AAS, etc) provide valuable information about the processes followed during the production of the material. Likewise the isotopic composition determined by thermal ionization mass spectrometry provides useful information about the enrichment of the nuclear fuel and hence its intended use

  10. Frequently cited journals in forensic psychology.

    Science.gov (United States)

    Black, Steve

    2012-02-01

    Works cited in six forensic psychology journals published 2008-2010 were counted to identify the most frequently cited journals. The sample of works cited (N = 21,776) was not a definitive ranked list of important journals in forensic psychology, but was large enough to indicate high-impact journals. The list of frequently cited publications included more general psychiatry and psychology journals than titles specific to forensic psychology. The implications of the proportion of general versus specific titles for collections supporting research in forensic psychology were discussed.

  11. Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies

    OpenAIRE

    Yusoff, Mohd Najwadi; Dehghantanha, Ali; Mahmod, Ramlan

    2017-01-01

    Development of mobile web-centric OS such as Firefox OS has created new challenges, and opportunities for digital investigators. Network traffic forensic plays an important role in cybercrime investigation to detect subject(s) and object(s) of the crime. In this chapter, we detect and analyze residual network traffic artefacts of Firefox OS in relation to two popular social networking applications (Facebook and Twitter) and one instant messaging application (Telegram). We utilized a Firefox O...

  12. A Positive Behavioral Approach for Aggression in Forensic Psychiatric Settings.

    Science.gov (United States)

    Tolisano, Peter; Sondik, Tracey M; Dike, Charles C

    2017-03-01

    Aggression toward self and others by complex patients admitted to forensic psychiatric settings is a relatively common yet extremely difficult behavior to treat. Traditional interventions in forensic inpatient settings have historically emphasized control and management over treatment. Research over the past several years has demonstrated the value of behavioral and psychosocial treatment interventions to reduce aggression and to increase prosocial skill development in inpatient forensic population. Positive behavioral support (PBS) offers a comprehensive approach that incorporates the science of applied behavioral analysis (ABA) in support of patients with challenging behaviors, including aggression and violence. In this article, we describe a PBS model to treat aggression in forensic settings. PBS includes a comprehensive functional assessment, along with four basic elements: ecological strategies, positive programming, focused support strategies, and reactive strategies. Other key components are described, including data collection, staff training, fidelity checks to ensure correct implementation of the plan, and ongoing monitoring and revision of PBS strategies, according to treatment outcomes. Finally, a behavioral consultation team approach within the inpatient forensic setting is recommended, led by an assigned doctoral-level psychologist with specialized knowledge and training in behavioral methods. The behavioral consultation team works directly with the unit treatment team and the identified patient to develop, implement, and track a plan that may extend over several weeks to several months including transition into the community. PBS can offer a positive systemic impact in forensic inpatient settings, such as providing a nonpharmacologic means to address aggression, reducing the incidences of restraint and seclusion, enhancing staff proficiency in managing challenging patient presentations, and reducing recidivism when used as part of the bridge to

  13. Naturalistic decision making in forensic science: toward a better understanding of decision making by forensic team leaders.

    Science.gov (United States)

    Helsloot, Ira; Groenendaal, Jelle

    2011-07-01

    This study uses the naturalistic decision-making (NDM) perspective to examine how Dutch forensic team leaders (i.e., the officers in charge of criminal forensic research from the crime scene until the use of laboratory assistance) make decisions in real-life settings and identifies the contextual factors that might influence those decisions. First, a focus group interview was conducted to identify four NDM mechanisms in day-to-day forensic decision making. Second, a serious game was conducted to examine the influence of three of these contextual mechanisms. The results uncovered that forensic team leaders (i) were attracted to obtain further information when more information was initially made available, (ii) were likely to devote more attention to emotionally charged cases, and (iii) used not only forensic evidence in the decision making but also tactical, unverified information of the police inquiry. Interestingly, the measured contextual influences did not deviate significantly from a control group of laypeople. © 2011 American Academy of Forensic Sciences.

  14. Emergence of forensic podiatry--A novel sub-discipline of forensic sciences.

    Science.gov (United States)

    Krishan, Kewal; Kanchan, Tanuj; DiMaggio, John A

    2015-10-01

    "Forensic podiatry is defined as the application of sound and researched podiatric knowledge and experience in forensic investigations; to show the association of an individual with a scene of crime, or to answer any other legal question concerned with the foot or footwear that requires knowledge of the functioning foot". Forensic podiatrists can contribute to forensic identification by associating the pedal evidence with the criminal or crime scene. The most common pedal evidence collected from the crime scene is in the form of footprints, shoeprints and their tracks and trails. Forensic podiatrists can establish identity of the individuals from the footprints in many ways. The analysis of bare footprints involves the identification based on the individualistic features like flat footedness, ridges, humps, creases, an extra toe, missing toe, corns, cuts, cracks, pits, deformities, and various features of the toe and heel region. All these individualistic features can link the criminal with the crime. In addition to these, parameters of body size like stature and body weight as well as sex can also be estimated by using anthropometric methods. If a series of footprints are recovered from the crime scene, then parameters of the gait analysis such as stride/step length and general movement of the criminal can be traced. Apart from these, a newly established biometric parameter of the footprints i.e. footprint ridge density can also be evaluated for personal identification. Careful analysis of the footprint ridge density can give an idea about the sex of the criminal whose footprints are recovered at the scene which can further help to reduce the burden of the investigating officer as the investigations then may be directed toward either a male suspect or a female suspect accordingly. This paper highlights various aspects of Forensic Podiatry and discusses the different methods of personal identification related to pedal evidence. Copyright © 2015 Elsevier Ireland

  15. The nucleic acid revolution continues - will forensic biology become forensic molecular biology?

    Science.gov (United States)

    Gunn, Peter; Walsh, Simon; Roux, Claude

    2014-01-01

    Molecular biology has evolved far beyond that which could have been predicted at the time DNA identity testing was established. Indeed we should now perhaps be referring to "forensic molecular biology." Aside from DNA's established role in identifying the "who" in crime investigations, other developments in medical and developmental molecular biology are now ripe for application to forensic challenges. The impact of DNA methylation and other post-fertilization DNA modifications, plus the emerging role of small RNAs in the control of gene expression, is re-writing our understanding of human biology. It is apparent that these emerging technologies will expand forensic molecular biology to allow for inferences about "when" a crime took place and "what" took place. However, just as the introduction of DNA identity testing engendered many challenges, so the expansion of molecular biology into these domains will raise again the issues of scientific validity, interpretation, probative value, and infringement of personal liberties. This Commentary ponders some of these emerging issues, and presents some ideas on how they will affect the conduct of forensic molecular biology in the foreseeable future.

  16. A call for more science in forensic science.

    Science.gov (United States)

    Bell, Suzanne; Sah, Sunita; Albright, Thomas D; Gates, S James; Denton, M Bonner; Casadevall, Arturo

    2018-05-01

    Forensic science is critical to the administration of justice. The discipline of forensic science is remarkably complex and includes methodologies ranging from DNA analysis to chemical composition to pattern recognition. Many forensic practices developed under the auspices of law enforcement and were vetted primarily by the legal system rather than being subjected to scientific scrutiny and empirical testing. Beginning in the 1990s, exonerations based on DNA-related methods revealed problems with some forensic disciplines, leading to calls for major reforms. This process generated a National Academy of Science report in 2009 that was highly critical of many forensic practices and eventually led to the establishment of the National Commission for Forensic Science (NCFS) in 2013. The NCFS was a deliberative body that catalyzed communication between nonforensic scientists, forensic scientists, and other stakeholders in the legal community. In 2017, despite continuing problems with forensic science, the Department of Justice terminated the NCFS. Just when forensic science needs the most support, it is getting the least. We urge the larger scientific community to come to the aid of our forensic colleagues by advocating for urgently needed research, testing, and financial support.

  17. Human resources and their possible forensic meanings.

    Science.gov (United States)

    Russo, Andrea; Urlić, Ivan; Kasum, Josip

    2015-09-01

    Forensics (forensic--before the Forum) means the application of knowledge from different scientific fields in order to define facts in judicial and/or administrative procedures. Nowadays forensics, besides this, finds its application even in different economic processes. For example, forensics enters the commercial areas of business intelligence and of different security areas. The European Commission recognized the importance of forensics, and underscored the importance of development of its scientific infrastructure in member States. We are witnessing the rise of various tragedies in economic and other kinds of processes. Undoubtedly, the world is increasingly exposed to various forms of threats whose occurrences regularly involve people. In this paper we are proposing the development of a new approach in the forensic assessment of the state of human resources. We are suggesting that in the focus should be the forensic approach in the psychological assessment of awareness of the individual and of the critical infrastructure sector operator (CISO) in determining the level of actual practical, rather than formal knowledge of an individual in a particular field of expertise, or in a specific scientific field, and possible forensic meanings.

  18. Linear programming phase unwrapping for dual-wavelength digital holography.

    Science.gov (United States)

    Wang, Zhaomin; Jiao, Jiannan; Qu, Weijuan; Yang, Fang; Li, Hongru; Tian, Ailing; Asundi, Anand

    2017-01-20

    A linear programming phase unwrapping method in dual-wavelength digital holography is proposed and verified experimentally. The proposed method uses the square of height difference as a convergence standard and theoretically gives the boundary condition in a searching process. A simulation was performed by unwrapping step structures at different levels of Gaussian noise. As a result, our method is capable of recovering the discontinuities accurately. It is robust and straightforward. In the experiment, a microelectromechanical systems sample and a cylindrical lens were measured separately. The testing results were in good agreement with true values. Moreover, the proposed method is applicable not only in digital holography but also in other dual-wavelength interferometric techniques.

  19. Conceptualising forensic science and forensic reconstruction. Part II: The critical interaction between research, policy/law and practice.

    Science.gov (United States)

    Morgan, R M

    2017-11-01

    This paper builds on the FoRTE conceptual model presented in part I to address the forms of knowledge that are integral to the four components of the model. Articulating the different forms of knowledge within effective forensic reconstructions is valuable. It enables a nuanced approach to the development and use of evidence bases to underpin decision-making at every stage of a forensic reconstruction by enabling transparency in the reporting of inferences. It also enables appropriate methods to be developed to ensure quality and validity. It is recognised that the domains of practice, research, and policy/law intersect to form the nexus where forensic science is situated. Each domain has a distinctive infrastructure that influences the production and application of different forms of knowledge in forensic science. The channels that can enable the interaction between these domains, enhance the impact of research in theory and practice, increase access to research findings, and support quality are presented. The particular strengths within the different domains to deliver problem solving forensic reconstructions are thereby identified and articulated. It is argued that a conceptual understanding of forensic reconstruction that draws on the full range of both explicit and tacit forms of knowledge, and incorporates the strengths of the different domains pertinent to forensic science, offers a pathway to harness the full value of trace evidence for context sensitive, problem-solving forensic applications. Copyright © 2017 The Author. Published by Elsevier B.V. All rights reserved.

  20. Status of nuclear forensic support in Sudan

    International Nuclear Information System (INIS)

    Mokhtar, Mohammedelmoez Eltayeb Abderahman

    2015-08-01

    The central problem investigated in this thesis is nuclear forensic support in Sudan, the thesis comprises five chapters, began with an introduction containing the art of forensic science, stated the importance of the it in criminal investigations. The forensic science was defined, and stated the principle of which it underlying, including: principle of individuality and principle of exchange, the divisions of this science has been clarified, then it discussed the crime scene and the collecting of evidence, where starting the forensic science at the crime scene, with clarifying the principle of crime scene investigation. Nuclear and other radioactive material was discussed: defining a radioactivity with the material source. It placed into 3 general categories: special nuclear materials, reactor fuel, and commercial radioactive sources, and mention each category and it characteristics. Radiation is part of our environment was clarified, and discussed what the effect on organisms and populations are. Nuclear forensics was presented,and how problem of the safeguarding of the nuclear material beginning. The emerging nature of the problem was discussed, the radiological crime scene management was explained, importance of securing the scene with an examples of equipment and instruments for on-scene radiation safety assessment and how the collection of evidence, storage forensic laboratory analysis was discussed and how set the designated nuclear forensic laboratory, also nuclear forensic interpretation, and the chain of custody was mentioned. The role of Regulating Authority in Nuclear forensic support was discussed, specifically in Sudan, International Cooperation have also been reminded, as well as memorandum of understanding was mentioned between SNRRA and the administration of forensic evidence, and one of it results is the radiological surveys unit in forensic administration, how the unit is configured, the role of the unit, finally conclusion of research was

  1. Digital Badges and Library Instructional Programs: Academic Library Case Study

    Science.gov (United States)

    Rodgers, Andrea Reed; Puterbaugh, Mark

    2017-01-01

    This case study describes the planning, implementation, and migration process of Eastern University Library's information literacy digital badge. Prior to implementing a badging program, information literacy sessions were informally embedded in first-year college writing courses as a "one-shot" presentation. Spurred on by accreditation…

  2. The use of insects in forensic investigations: An overview on the scope of forensic entomology

    OpenAIRE

    Joseph, Isaac; Mathew, Deepu G; Sathyan, Pradeesh; Vargheese, Geetha

    2011-01-01

    Forensic entomology is the study of insects/arthropods in criminal investigation. Right from the early stages insects are attracted to the decomposing body and may lay eggs in it. By studying the insect population and the developing larval stages, forensic scientists can estimate the postmortem index, any change in position of the corpse as well as the cause of death. Forensic odontologists are called upon more frequently to collaborate in criminal investigations and hence should be aware of ...

  3. Civil forensic psychiatry - Part 1: an overview.

    Science.gov (United States)

    Samuels, Anthony H

    2018-02-01

    Objectives This paper provides an overview for general and forensic psychiatrists of the complexity and challenge of working in the civil medico-legal arena. It covers expert evidence, ethics, core concepts in civil forensic psychiatry and report writing. Conclusions Civil forensic psychiatry is an important sub-speciality component of forensic psychiatry that requires specific skills, knowledge and the ability to assist legal bodies in determining the significance of psychiatric issues.

  4. Forensic age assessment of asylum seekers in Finland.

    Science.gov (United States)

    Metsäniitty, Mari; Varkkola, Olli; Waltimo-Sirén, Janna; Ranta, Helena

    2017-01-01

    In Finland, forensic age assessment is strictly regulated by legislation. According to the Aliens Act (301/2004) and the amendment of the Act (549/2010), the police authorities, the frontier guard authorities, and the immigration authorities have the right to refer asylum seekers to the University of Helsinki, Department of Forensic Medicine, for age assessment. These assessments are especially performed to solve if the person is of major age, the cutoff being 18 completed years. The forensic age assessment is largely based on dental development, since the special permit of the Radiation and Nuclear Safety Authority (STUK) to the Department of Forensic Medicine of the University of Helsinki, allowing the use of ionizing radiation for non-medical purposes, includes dental and hand X-rays. Forensic age assessment is always performed by two forensic odontologists. In 2015, the total number of forensic age assessment examinations was 149, and the countries of origin of the asylum seekers were most commonly Iraq, Afghanistan, and Somalia. The current legislation on forensic age assessment has been well received and approved. Radiological and other examinations can be performed in different parts of Finland, but the forensic odontologist at the University of Helsinki is always involved in the process and ensures joint quality standards for the forensic age assessment.

  5. Proposals for best-quality immunohistochemical staining of paraffin-embedded brain tissue slides in forensics.

    Science.gov (United States)

    Trautz, Florian; Dreßler, Jan; Stassart, Ruth; Müller, Wolf; Ondruschka, Benjamin

    2018-01-03

    Immunohistochemistry (IHC) has become an integral part in forensic histopathology over the last decades. However, the underlying methods for IHC vary greatly depending on the institution, creating a lack of comparability. The aim of this study was to assess the optimal approach for different technical aspects of IHC, in order to improve and standardize this procedure. Therefore, qualitative results from manual and automatic IHC staining of brain samples were compared, as well as potential differences in suitability of common IHC glass slides. Further, possibilities of image digitalization and connected issues were investigated. In our study, automatic staining showed more consistent staining results, compared to manual staining procedures. Digitalization and digital post-processing facilitated direct analysis and analysis for reproducibility considerably. No differences were found for different commercially available microscopic glass slides regarding suitability of IHC brain researches, but a certain rate of tissue loss should be expected during the staining process.

  6. A history of forensic anthropology.

    Science.gov (United States)

    Ubelaker, Douglas H

    2018-04-01

    Forensic anthropology represents a dynamic and rapidly evolving complex discipline within anthropology and forensic science. Academic roots extend back to early European anatomists but development coalesced in the Americas through high-profile court testimony, assemblage of documented collections and focused research. Formation of the anthropology section of the American Academy of Forensic Sciences in 1972, the American Board of Forensic Anthropology in 1977/1978 and other organizational advances provided important stimuli for progress. While early pioneers concentrated on analysis of skeletonized human remains, applications today have expanded to include complex methods of search and recovery, the biomechanics of trauma interpretation, isotopic analysis related to diet and region of origin, age estimation of the living and issues related to humanitarian and human rights investigations. © 2018 Wiley Periodicals, Inc.

  7. Teaching forensic pathology to undergraduates at Zhongshan School of Medicine.

    Science.gov (United States)

    Zhou, Nan; Wu, Qiu-Ping; Su, Terry; Zhao, Qian-Hao; Yin, Kun; Zheng, Da; Zheng, Jing-Jing; Huang, Lei; Cheng, Jian-Ding

    2018-04-01

    Producing qualified forensic pathological practitioners is a common difficulty around the world. In China, forensic pathology is one of the required major subspecialties for undergraduates majoring in forensic medicine, in contrast to forensic education in Western countries where forensic pathology is often optional. The enduring predicament is that the professional qualities and abilities of forensic students from different institutions vary due to the lack of an efficient forensic pedagogical model. The purpose of this article is to describe the new pedagogical model of forensic pathology at Zhongshan School of Medicine, Sun Yat-sen University, which is characterised by: (a) imparting a broad view of forensic pathology and basic knowledge of duties and tasks in future careers to students; (b) educating students in primary skills on legal and medical issues, as well as advanced forensic pathological techniques; (c) providing students with resources to broaden their professional minds, and opportunities to improve their professional qualities and abilities; and (d) mentoring students on occupational preparation and further forensic education. In the past few years, this model has resulted in numerous notable forensic students accomplishing achievements in forensic practice and forensic scientific research. We therefore expect this pedagogical model to establish the foundation for forensic pathological education and other subspecialties of forensic medicine in China and abroad.

  8. Nuclear Forensics: A Methodology Applicable to Nuclear Security and to Non-Proliferation

    International Nuclear Information System (INIS)

    Mayer, K; Wallenius, M; Luetzenkirchen, K; Galy, J; Varga, Z; Erdmann, N; Buda, R; Kratz, J-V; Trautmann, N; Fifield, K

    2011-01-01

    Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material and accompanying elements, chemical impurities, macroscopic appearance and microstructure of the material. In the present paper, we discuss the opportunities for attribution of nuclear material offered by nuclear forensics as well as its limitations. Particular attention will be given to the role of nuclear reactions. Such reactions include the radioactive decay of the nuclear material, but also reactions with neutrons. When uranium (of natural composition) is exposed to neutrons, plutonium is formed, as well as 236 U. We will illustrate the methodology using the example of a piece of uranium metal that dates back to the German nuclear program in the 1940's. A combination of different analytical techniques and model calculations enables a nuclear forensics interpretation, thus correlating the material characteristics with the production history.

  9. Nuclear Forensics: A Methodology Applicable to Nuclear Security and to Non-Proliferation

    Science.gov (United States)

    Mayer, K.; Wallenius, M.; Lützenkirchen, K.; Galy, J.; Varga, Z.; Erdmann, N.; Buda, R.; Kratz, J.-V.; Trautmann, N.; Fifield, K.

    2011-09-01

    Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material and accompanying elements, chemical impurities, macroscopic appearance and microstructure of the material. In the present paper, we discuss the opportunities for attribution of nuclear material offered by nuclear forensics as well as its limitations. Particular attention will be given to the role of nuclear reactions. Such reactions include the radioactive decay of the nuclear material, but also reactions with neutrons. When uranium (of natural composition) is exposed to neutrons, plutonium is formed, as well as 236U. We will illustrate the methodology using the example of a piece of uranium metal that dates back to the German nuclear program in the 1940's. A combination of different analytical techniques and model calculations enables a nuclear forensics interpretation, thus correlating the material characteristics with the production history.

  10. Founding editorial--forensics and TheScientificWorld.

    Science.gov (United States)

    Rowe, W

    2001-10-30

    At the beginning of a new millennium it seems a good idea to stop for a moment and take stock of the current state of forensic science. As a field of scientific research and scientific application, forensic science is a little more than a century old. Forensic science may be said to have begun in 1887 with the simultaneous publication of A. Conan Doyle's A Study in Scarlet and Hans Gross's Handbuch f1/4r Untersuchungsrichter. Conan Doyle's novel introduced to the world the character of Sherlock Holmes, whose literary career would popularize the use of physical evidence in criminal investigations. Gross's manual for examining magistrates suggests ways in which the expertise of chemists, biologists, geologists, and other natural scientists could contribute to investigations. Gross's book was translated into a number of languages and went through various updated editions during the course of the century. The intervening century saw the development and application of fingerprinting, firearm and tool mark identification, forensic chemistry, forensic biology, forensic toxicology, forensic odontology, forensic pathology, and forensic engineering. Increasingly, the judicial systems of the industrial nations of the world have come to rely upon the expertise of scientists in a variety of disciplines. In most advanced countries, virtually all criminal prosecutions now involve the presentation of scientific testimony. This has had the beneficial effect of diminishing the reliance of courts on eyewitness testimony and defendant confessions.

  11. Ancestry Estimation in Forensic Anthropology: Geometric Morphometric versus Standard and Nonstandard Interlandmark Distances.

    Science.gov (United States)

    Katherine Spradley, M; Jantz, Richard L

    2016-07-01

    Standard cranial measurements are commonly used for ancestry estimation; however, 3D digitizers have made cranial landmark data collection and geometric morphometric (GM) analyses more popular within forensic anthropology. Yet there has been little focus on which data type works best. The goal of the present research is to test the discrimination ability of standard and nonstandard craniometric measurements and data derived from GM analysis. A total of 31 cranial landmarks were used to generate 465 interlandmark distances, including a subset of 20 commonly used measurements, and to generate principal component scores from procrustes coordinates. All were subjected to discriminant function analysis to ascertain which type of data performed best for ancestry estimation of American Black and White and Hispanic males and females. The nonstandard interlandmark distances generated the highest classification rates for females (90.5%) and males (88.2%). Using nonstandard interlandmark distances over more commonly used measurements leads to better ancestry estimates for our current population structure. © 2016 American Academy of Forensic Sciences.

  12. A Review of Forensic Science Management Literature.

    Science.gov (United States)

    Houck, M M; McAndrew, W P; Porter, M; Davies, B

    2015-01-01

    The science in forensic science has received increased scrutiny in recent years, but interest in how forensic science is managed is a relatively new line of research. This paper summarizes the literature in forensic science management generally from 2009 to 2013, with some recent additions, to provide an overview of the growth of topics, results, and improvements in the management of forensic services in the public and private sectors. This review covers only the last three years or so and a version of this paper was originally produced for the 2013 Interpol Forensic Science Managers Symposium and is available at interpol.int. Copyright © 2015 Central Police University.

  13. Forensic Uncertainty Quantification of Explosive Dispersal of Particles

    Science.gov (United States)

    Hughes, Kyle; Park, Chanyoung; Haftka, Raphael; Kim, Nam-Ho

    2017-06-01

    In addition to the numerical challenges of simulating the explosive dispersal of particles, validation of the simulation is often plagued with poor knowledge of the experimental conditions. The level of experimental detail required for validation is beyond what is usually included in the literature. This presentation proposes the use of forensic uncertainty quantification (UQ) to investigate validation-quality experiments to discover possible sources of uncertainty that may have been missed in initial design of experiments or under-reported. The current experience of the authors has found that by making an analogy to crime scene investigation when looking at validation experiments, valuable insights may be gained. One examines all the data and documentation provided by the validation experimentalists, corroborates evidence, and quantifies large sources of uncertainty a posteriori with empirical measurements. In addition, it is proposed that forensic UQ may benefit from an independent investigator to help remove possible implicit biases and increases the likelihood of discovering unrecognized uncertainty. Forensic UQ concepts will be discussed and then applied to a set of validation experiments performed at Eglin Air Force Base. This work was supported in part by the U.S. Department of Energy, National Nuclear Security Administration, Advanced Simulation and Computing Program.

  14. [Research Progress on Forensic Entomotoxicology].

    Science.gov (United States)

    Liu, Zhi-jiang; Zhai, Xian-dun; Guan, Ling; Mo, Yao-nan

    2015-06-01

    Forensic entomotoxicology is a branch of forensic medicine, which applies entomology, toxicology and other related studies to solve the poisoning cases. It has an obvious advantage in the investigation on poisoning death. Based on the expounding definition and research of entomotoxicology, this paper reviews research progress and application value in some aspects of forensic medicine, such as the effects of drugs/toxins on the growth and development of sarcosaphagous insects and the qualitative and quantitative analysis of the drugs/toxins in the poisoned body tissue.

  15. Choosing the right laboratory: a review of clinical and forensic toxicology services for urine drug testing in pain management.

    Science.gov (United States)

    Reisfield, Gary M; Goldberger, Bruce A; Bertholf, Roger L

    2015-01-01

    Urine drug testing (UDT) services are provided by a variety of clinical, forensic, and reference/specialty laboratories. These UDT services differ based on the principal activity of the laboratory. Clinical laboratories provide testing primarily focused on medical care (eg, emergency care, inpatients, and outpatient clinics), whereas forensic laboratories perform toxicology tests related to postmortem and criminal investigations, and drug-free workplace programs. Some laboratories now provide UDT specifically designed for monitoring patients on chronic opioid therapy. Accreditation programs for clinical laboratories have existed for nearly half a century, and a federal certification program for drug-testing laboratories was established in the 1980s. Standards of practice for forensic toxicology services other than workplace drug testing have been established in recent years. However, no accreditation program currently exists for UDT in pain management, and this review considers several aspects of laboratory accreditation and certification relevant to toxicology services, with the intention to provide guidance to clinicians in their selection of the appropriate laboratory for UDT surveillance of their patients on opioid therapy.

  16. Forensic Toxicology: An Introduction.

    Science.gov (United States)

    Smith, Michael P; Bluth, Martin H

    2016-12-01

    This article presents an overview of forensic toxicology. The authors describe the three components that make up forensic toxicology: workplace drug testing, postmortem toxicology, and human performance toxicology. Also discussed are the specimens that are tested, the methods used, and how the results are interpreted in this particular discipline. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. Molecular Imprinting Applications in Forensic Science.

    Science.gov (United States)

    Yılmaz, Erkut; Garipcan, Bora; Patra, Hirak K; Uzun, Lokman

    2017-03-28

    Producing molecular imprinting-based materials has received increasing attention due to recognition selectivity, stability, cast effectiveness, and ease of production in various forms for a wide range of applications. The molecular imprinting technique has a variety of applications in the areas of the food industry, environmental monitoring, and medicine for diverse purposes like sample pretreatment, sensing, and separation/purification. A versatile usage, stability and recognition capabilities also make them perfect candidates for use in forensic sciences. Forensic science is a demanding area and there is a growing interest in molecularly imprinted polymers (MIPs) in this field. In this review, recent molecular imprinting applications in the related areas of forensic sciences are discussed while considering the literature of last two decades. Not only direct forensic applications but also studies of possible forensic value were taken into account like illicit drugs, banned sport drugs, effective toxins and chemical warfare agents in a review of over 100 articles. The literature was classified according to targets, material shapes, production strategies, detection method, and instrumentation. We aimed to summarize the current applications of MIPs in forensic science and put forth a projection of their potential uses as promising alternatives for benchmark competitors.

  18. Principal forensic physicians as educational supervisors.

    Science.gov (United States)

    Stark, Margaret M

    2009-10-01

    This research project was performed to assist the Faculty of Forensic and Legal Medicine (FFLM) with the development of a training programme for Principal Forensic Physicians (PFPs) (Since this research was performed the Metropolitan Police Service have dispensed with the services of the Principal Forensic Physicians so currently (as of January 2009) there is no supervision of newly appointed FMEs or the development training of doctors working in London nor any audit or appraisal reviews.) to fulfil their role as educational supervisors. PFPs working in London were surveyed by questionnaire to identify the extent of their knowledge with regard to their role in the development training of all forensic physicians (FPs) in their group, the induction of assistant FPs and their perceptions of their own training needs with regard to their educational role. A focus group was held at the FFLM annual conference to discuss areas of interest that arose from the preliminary results of the questionnaire. There is a clear need for the FFLM to set up a training programme for educational supervisors in clinical forensic medicine, especially with regard to appraisal. 2009 Elsevier Ltd and Faculty of Forensic and Legal Medicine.

  19. Molecular DNA Analysis in Forensic Identification.

    Science.gov (United States)

    Dumache, Raluca; Ciocan, Veronica; Muresan, Camelia; Enache, Alexandra

    2016-01-01

    Serological and biochemical identification methods used in forensics have several major disadvantages, such as: long time in processing biological sample and lack of sensitivity and specificity. In the last 30 years, DNA molecular analysis has become an important tool in forensic investigations. DNA profiling is based on the short tandem repeats (STR) and aids in human identification from biological samples. Forensic genetics, can provide information on the events which occurred at the crime scene or to supplement other methods of forensic identification. Currently, the methods used in identification are based on polymerase chain reaction (PCR) analyses. This method analyses the autosomal STRs, the Y-chromosome, and the mitochondrial DNA. Correlation of biological samples present at the crime scene with identification, selection, and the probative value factor is therefore the first aspect to be taken into consideration in the forensic genetic analysis. In the last decade, because of the advances in the field of molecular biology, new biomarkers such as: microRNAs (miR), messenger RNA (mRNA), and DNA methylation have been studied and proposed to be used in the forensic identifications of body fluids.

  20. A Phenomenological Study of the Lived Experiences of Digital Immigrants in a Fully Online Master's Degree Program

    Science.gov (United States)

    Kieschnick, Stuart

    2012-01-01

    This qualitative study was designed to investigate the challenges encountered and support systems needed by digital immigrants enrolled in an online master's degree program. Participants were digital immigrants who were born before 1980 and enrolled or recently graduated from an online master's degree program. Survey data and demographic data were…

  1. Using environmental forensic microscopy in exposure science.

    Science.gov (United States)

    Millette, James R; Brown, Richard S; Hill, Whitney B

    2008-01-01

    Environmental forensic microscopy investigations are based on the methods and procedures developed in the fields of criminal forensics, industrial hygiene and environmental monitoring. Using a variety of microscopes and techniques, the environmental forensic scientist attempts to reconstruct the sources and the extent of exposure based on the physical evidence left behind after particles are exchanged between an individual and the environments he or she passes through. This article describes how environmental forensic microscopy uses procedures developed for environmental monitoring, criminal forensics and industrial hygiene investigations. It provides key references to the interdisciplinary approach used in microscopic investigations. Case studies dealing with lead, asbestos, glass fibers and other particulate contaminants are used to illustrate how environmental forensic microscopy can be very useful in the initial stages of a variety of environmental exposure characterization efforts to eliminate some agents of concern and to narrow the field of possible sources of exposure.

  2. Virtual forensic anthropology: Novel applications of anthropometry and technology in a child death case.

    Science.gov (United States)

    Davy-Jow, Stephanie Lynn; Lees, Duncan M B; Russell, Sean

    2013-01-10

    Full-body 3D virtual reconstructions were generated using 3D technology and anthropometry following the death of a young girl, allegedly from severe malnutrition as a result of abuse and neglect. Close range laser scanning, in conjunction with full colour digital texture photography, was used to document the child's condition shortly after death in order to demonstrate the number and pattern of injuries and to be able to demonstrate her condition forensically. Full-body digital reconstructions were undertaken to illustrate the extent of the malnutrition by comparing the processed post mortem scans with reconstructed images at normal weight for height and age. This is the first known instance of such an investigative tool. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  3. Development of forensic medicine in post reform Indonesia.

    Science.gov (United States)

    Syukriani, Yoni Fuadah; Novita, Nita; Sunjaya, Deni K

    2018-05-03

    Forensic medicine practice in Indonesia was introduced through the Dutch colonial criminal justice system in the early twentieth century. After more than 70 years of national independence, the development of forensic medicine still faces fundamental challenges, including confusion in the distribution of responsibility with law enforcement agencies, difficulties in managing conflicts of interest, and impediments in scientific practice and professional development. Despite of the golden opportunity from the Indonesian Reform movement in the late 1990s, the impact on forensic medicine development has been less than expected. It is thus important to identify the scope of the problems plaguing the development of forensic medicine, as well as its causes. We conducted a qualitative study to explain the problems and propose solutions. The results show that the standards of practice have developed more slowly than those in many other branches of medicine, despite its increasing popularity from its role in counterterrorism and disaster victim identification. A strong thriving spirit exists in forensic science, although growth in forensic research activities should be facilitated more. The 2009 Health Law has included forensic medicine practice in the health system to cover the role of forensic medicine for health and medical education purposes. It also potentially provides a way to support the justice system without exposing forensic practitioners to possible conflicts of interest, for instance, by utilizing a tiered referral system. To this aim, an alternative is proposed: to place forensic medicine practice within the context of the health system. Copyright © 2018 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  4. A brief overview of forensic herpetology

    OpenAIRE

    Baker, Barry

    2008-01-01

    The emerging field of forensic herpetology is reviewed. This research focus, defined here as the application of science to studies of reptiles and amphibians when these animals become the subject of legal investigations, has gained increasing attention in recent years. A diverse range of experts contributes to methods in forensic herpetology including forensic scientists, herpetologists, veterinarians, zookeepers, physicians, pathologists and toxicologists. The English language literature in ...

  5. Assessing the impact of a remote digital coaching engagement program on patient-reported outcomes in asthma.

    Science.gov (United States)

    Rasulnia, Mazi; Burton, Billy Stephen; Ginter, Robert P; Wang, Tracy Y; Pleasants, Roy Alton; Green, Cynthia L; Lugogo, Njira

    2017-08-11

    Low adherence and poor outcomes provide opportunity for digital coaching to engage patients with uncontrolled asthma in their care to improve outcomes. To examine the impact of a remote digital coaching program on asthma control and patient experience. We recruited 51 adults with uncontrolled asthma, denoted by albuterol use of >2 times per week and/or exacerbations requiring corticosteroids, and applied a 12-week patient-centered remote digital coaching program using a combination of educational pamphlets, symptom trackers, best peak flow establishment, physical activity, and dietary counseling, as well as coaches who implemented emotional enforcement to motivate disease self-management through telephone, text, and email. Baseline and post-intervention measures were quality of life (QOL), spirometry, Asthma Control Test (ACT), Asthma Symptom Utility Index (ASUI), rescue albuterol use, and exacerbation history. Among 51 patients recruited, 40 completed the study. Eight subjects required assistance reading medical materials. Significant improvements from baseline were observed for Patient-Reported Outcomes Measurement Information System mental status (p = 0.010), body weight, and outpatient exacerbation frequency (p = 0.028). The changes from baseline in ACT (p = 0.005) were statistically significant but did not achieve the pre-specified minimum clinically important difference (MCID), whereas for ASUI, the MCID and statistical significance were achieved. Spirometry and rescue albuterol use were no different. A patient-oriented, remote digital coaching program that utilized trained health coaches and digital materials led to statistically significant improvement in mental status, outpatient exacerbations, body weight, and ASUI. Digital coaching programs may improve some outcomes in adults with uncontrolled asthma.

  6. Computer program user's manual for FIREFINDER digital topographic data verification library dubbing system

    Science.gov (United States)

    Ceres, M.; Heselton, L. R., III

    1981-11-01

    This manual describes the computer programs for the FIREFINDER Digital Topographic Data Verification-Library-Dubbing System (FFDTDVLDS), and will assist in the maintenance of these programs. The manual contains detailed flow diagrams and associated descriptions for each computer program routine and subroutine. Complete computer program listings are also included. This information should be used when changes are made in the computer programs. The operating system has been designed to minimize operator intervention.

  7. Forensic botany: usability of bryophyte material in forensic studies.

    Science.gov (United States)

    Virtanen, Viivi; Korpelainen, Helena; Kostamo, Kirsi

    2007-10-25

    Two experiments were performed to test the relevance of bryophyte (Plantae, Bryophyta) material for forensic studies. The first experiment was conducted to reveal if, and how well, plant fragments attach to footwear in general. In the test, 16 persons walked outdoors wearing rubber boots or hiking boots. After 24h of use outdoors the boots were carefully cleaned, and all plant fragments were collected. Afterwards, all plant material was examined to identify the species. In the second experiment, fresh material of nine bryophyte species was kept in a shed in adverse conditions for 18 months, after which DNA was extracted and subjected to genotyping to test the quality of the material. Both experiments give support for the usability of bryophyte material in forensic studies. The bryophyte fragments become attached to shoes, where they remain even after the wearer walks on a dry road for several hours. Bryophyte DNA stays intact, allowing DNA profiling after lengthy periods following detachment from the original plant source. Based on these experiments, and considering the fact that many bryophytes are clonal plants, we propose that bryophytes are among the most usable plants to provide botanical evidence for forensic investigations.

  8. Application of DNA-based methods in forensic entomology.

    Science.gov (United States)

    Wells, Jeffrey D; Stevens, Jamie R

    2008-01-01

    A forensic entomological investigation can benefit from a variety of widely practiced molecular genotyping methods. The most commonly used is DNA-based specimen identification. Other applications include the identification of insect gut contents and the characterization of the population genetic structure of a forensically important insect species. The proper application of these procedures demands that the analyst be technically expert. However, one must also be aware of the extensive list of standards and expectations that many legal systems have developed for forensic DNA analysis. We summarize the DNA techniques that are currently used in, or have been proposed for, forensic entomology and review established genetic analyses from other scientific fields that address questions similar to those in forensic entomology. We describe how accepted standards for forensic DNA practice and method validation are likely to apply to insect evidence used in a death or other forensic entomological investigation.

  9. Client-side Skype forensics: an overview

    Science.gov (United States)

    Meißner, Tina; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.

  10. The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era

    Directory of Open Access Journals (Sweden)

    Hai-Cheng Chu

    2015-04-01

    Full Text Available Internet Communication Technologies (ICTs are making progress day by day, driven by the relentless need to utilize them for everything from leisure to business. This inevitable trend has dramatically changed contemporary digital behavior in all aspects. Undoubtedly, digital fingerprints will be at some point unwarily left on crime scenes creating digital information security incidents. On the other hand, corporates in the private sector or governments are on the edge of being exploited in terms of confidential digital information leakages. Some digital fingerprinting is volatile by its nature. Alternatively, once the power of computing devices is no longer sustainable, these digital traces could disappear forever. Due to the pervasive usage of Google Calendar and Safari browser among network communities, digital fingerprinting could be disclosed if forensics is carried out in a sound manner, which could be admitted in a court of law as probative evidences concerning certain cybercrime incidents.

  11. Evidentiary standards for forensic anthropology.

    Science.gov (United States)

    Christensen, Angi M; Crowder, Christian M

    2009-11-01

    As issues of professional standards and error rates continue to be addressed in the courts, forensic anthropologists should be proactive by developing and adhering to professional standards of best practice. There has been recent increased awareness and interest in critically assessing some of the techniques used by forensic anthropologists, but issues such as validation, error rates, and professional standards have seldom been addressed. Here we explore the legal impetus for this trend and identify areas where we can improve regarding these issues. We also discuss the recent formation of a Scientific Working Group for Forensic Anthropology (SWGANTH), which was created with the purposes of encouraging discourse among anthropologists and developing and disseminating consensus guidelines for the practice of forensic anthropology. We believe it is possible and advisable for anthropologists to seek and espouse research and methodological techniques that meet higher standards to ensure quality and consistency in our field.

  12. Forensic historiography: narratives and science.

    Science.gov (United States)

    Drukteinis, Albert M

    2014-01-01

    Psychiatrists function, in part, as historians who rely on patient narratives to help them understand presenting mental disorders and explain their causes. Forensic psychiatrists have been skeptical of using narratives, raising concerns about their lack of objectivity and potential for bias. They also have criticized narratives as being more performative than scientific. Recent authors, however, have pointed out that narratives may be helpful in forming forensic opinions and supporting oral testimony, while stressing that their use must be consistent with the ethics espoused by forensic psychiatry. This article reviews the role of narratives in understanding human events and the ubiquitous presence of narratives in the judicial process. It delves into the inescapability of using explicit or implicit narratives in the course of forensic practice, as well as how they may be meaningfully incorporated into evaluations and find expression alongside scientific principles. © 2014 American Academy of Psychiatry and the Law.

  13. THE ROLE OF FORENSIC DENTIST FOLLOWING MASS ...

    African Journals Online (AJOL)

    and dental practitioners of the crucial role of dentist in victim's identification and ... role of forensic dental personnel in human identification following ... matrimonial, or financial reasons6. The first and .... chief physician during the systematic extermination of the Jews at ... of police officers with forensic pathologist and forensic.

  14. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

    Science.gov (United States)

    Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Dargahi, Tooska; Conti, Mauro

    2017-05-01

    Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under-explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log-in to and log-out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in-depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. © 2016 American Academy of Forensic Sciences.

  15. Nuclear forensic analysis capabilities and experience at the Oak Ridge Y-12 National Security Complex

    International Nuclear Information System (INIS)

    Hembree, D.M.; Carter, J.A.; Hinton, E.R. Jr.

    2002-01-01

    Full text: The Oak Ridge Y-12 National Security Complex has been involved in the U.S. nuclear weapons program since the program's inception in the 1940's. Known as the U.S. 'Fort Knox of uranium', the site is also a repository of unique expertise and experience related to enriched uranium and other weapons-related materials. Y-12's Analytical Chemistry Organization (ACO) contains a wide range of analytical instrumentation that has demonstrated the ability to provide important forensic information in a short period of time. This rapid response capability is in part due to having all of the analytical instrumentation and expertise contained in one building, within one organization. Rapid-response teams are easily formed to quickly obtain key information. The infrastructure to handle nuclear materials, e.g. chain-of-custody, radiological control, information management, etc. is maintained for normal operations. As a result, the laboratory has demonstrated the capability for rapid response times for nuclear forensic samples. This poster presentation will discuss Y-12's analytical capabilities and the importance of key instruments and highly trained personnel in providing critical information. The laboratory has collaborated with both state and federal law enforcement agencies to analyze non-nuclear forensic evidence. Y-12's participation in two nuclear forensic events, as part of multi-laboratory teams, will be described. (author)

  16. Approach for Establishing a National Nuclear Forensics System

    International Nuclear Information System (INIS)

    Kim, Jaekwang; Hyung, Sangcheol

    2014-01-01

    The increasing number could give rise to posing a potential threat to national infrastructure which is very vulnerable to radiological sabotage with the materials. International community has been emphasizing the importance of nuclear forensics through the Nuclear Security Summit process as a countermeasure against nuclear terrorism. Global Initiative to Combat Nuclear Terrorism(GICNT) and nuclear forensics International Technology Working Group(ITWG) suggest the establishment of national nuclear forensics system which has a law enforcement for forensic management and maintenance of nuclear forensics database including nuclear material and other radioactive materials. We suggest the legal and institutional system through this paper in an effort to set up a multi expert group and the nuclear forensics DB which can contribute to effective Core capabilities

  17. Approach for Establishing a National Nuclear Forensics System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jaekwang; Hyung, Sangcheol [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    The increasing number could give rise to posing a potential threat to national infrastructure which is very vulnerable to radiological sabotage with the materials. International community has been emphasizing the importance of nuclear forensics through the Nuclear Security Summit process as a countermeasure against nuclear terrorism. Global Initiative to Combat Nuclear Terrorism(GICNT) and nuclear forensics International Technology Working Group(ITWG) suggest the establishment of national nuclear forensics system which has a law enforcement for forensic management and maintenance of nuclear forensics database including nuclear material and other radioactive materials. We suggest the legal and institutional system through this paper in an effort to set up a multi expert group and the nuclear forensics DB which can contribute to effective Core capabilities.

  18. Forensic importance of jealousy.

    Science.gov (United States)

    Muzinić, Lana; Goreta, Miroslav; Jukić, Vlado; Dordević, Veljko; Koić, Elvira; Herceg, Miroslav

    2003-06-01

    The aim of the investigation is to define as clearly as possible specific forensic psychiatric characteristics of persons who committed homicide and or attempted due to jealousy (the nature and severity of psychopathology, the level of responsibility, danger for the community, intensity and nature of aggression, the victimologic dimension, the relation of alcohol and jealousy). A retrospective method based on forensic psychiatric expertises in the period 1975-1999 was used. They encompassed 200 examinees that committed murder or attempted it. The results show the connection of psychotic jealousy with the highest degree of danger in diagnostic categories of paranoid psychosis and paranoid schizophrenia. The time span from the first manifestations of jealousy until the actual commitment of a crime is the longest in personality disorders and the shortest in schizophrenia. Exogenous provoking situations were dominant for committing homicide due to jealousy in personality disorders. Acute alcohol intoxication has a specific significance in crime due to jealousy in the same diagnostic category. Clear criteria were designed for forensic psychiatric evaluation of murder and attempts of homicide caused by jealousy, which will be of help in everyday practice in the field forensic work and treatment.

  19. Theory and the scientific basis for forensic anthropology.

    Science.gov (United States)

    Boyd, Clifford; Boyd, Donna C

    2011-11-01

    Forensic anthropology has long been criticized for its lack of a strong theoretical and scientific foundation. This paper addresses this problem by examining the role of theory in forensic anthropology at different hierarchical levels (high-level, middle-range, and low-level) and the relevance of various theoretical concepts (taphonomic, agency, behavioral archaeology, nonlinear systems, and methodological theories) to the interpretation of forensic contexts. Application of these theories to a case study involving the search for the WWII Goettge Patrol illustrates the explanatory power these theories offer to the interpretation of forensic events as the end product of an often complex set of environmental constraints and behavioral interactions and choices. It also emphasizes the importance of case studies in theory building and hypothesis testing. A theoretical foundation does indeed currently exist in forensic anthropology; however, a recognition and broader implementation of anthropological (archaeological) theory is warranted and will further define forensic anthropology as a scientific endeavor. © 2011 American Academy of Forensic Sciences.

  20. Forensic Analysis Demonstration via Hawaii Five-O

    Science.gov (United States)

    Shmaefsky, Brian R.

    2006-01-01

    "Forensics," in its most universal sense, is defined as the use of science or technology in the investigation and establishment of facts or evidence for determining identity or relatedness. Most forensic reasoning is used for arguing legal matters. However, forensic studies are also used in agronomy, biology, chemistry, geology, and…

  1. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Quaglia, Adamo; Epifano, Calogera M.

    2012-01-01

    The improvements of automatic face recognition during the last 2 decades have disclosed new applications like border control and camera surveillance. A new application field is forensic face recognition. Traditionally, face recognition by human experts has been used in forensics, but now there is a

  2. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    Microorganisms have been used as weapons in criminal acts, most recently highlighted by the terrorist attack using anthrax in the fall of 2001. Although such ''biocrimes'' are few compared with other crimes, these acts raise questions about the ability to provide forensic evidence for criminal prosecution that can be used to identify the source of the microorganisms used as a weapon and, more importantly, the perpetrator of the crime. Microbiologists traditionally investigate the sources of microorganisms in epidemiological investigations, but rarely have been asked to assist in criminal investigations. A colloquium was convened by the American Academy of Microbiology in Burlington, Vermont, on June 7-9, 2002, in which 25 interdisciplinary, expert scientists representing evolutionary microbiology, ecology, genomics, genetics, bioinformatics, forensics, chemistry, and clinical microbiology, deliberated on issues in microbial forensics. The colloquium's purpose was to consider issues relating to microbial forensics, which included a detailed identification of a microorganism used in a bioattack and analysis of such a microorganism and related materials to identify its forensically meaningful source--the perpetrators of the bioattack. The colloquium examined the application of microbial forensics to assist in resolving biocrimes with a focus on what research and education are needed to facilitate the use of microbial forensics in criminal investigations and the subsequent prosecution of biocrimes, including acts of bioterrorism. First responders must consider forensic issues, such as proper collection of samples to allow for optimal laboratory testing, along with maintaining a chain of custody that will support eventual prosecution. Because a biocrime may not be immediately apparent, a linkage must be made between routine diagnosis, epidemiological investigation, and criminal investigation. There is a need for establishing standard operating

  3. NEWLIN: A digital computer program for the linearisation of sets of algebraic and first order differential equations

    International Nuclear Information System (INIS)

    Hopkinson, A.

    1969-05-01

    The techniques normally used for linearisation of equations are not amenable to general treatment by digital computation. This report describes a computer program for linearising sets of equations by numerical evaluations of partial derivatives. The program is written so that the specification of the non-linear equations is the same as for the digital simulation program, FIFI, and the linearised equations can be punched out in form suitable for input to the frequency response program FRP2 and the poles and zeros program ZIP. Full instructions for the use of the program are given and a sample problem input and output are shown. (author)

  4. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  5. Forensic psychiatric nursing: skills and competencies: I role dimensions.

    Science.gov (United States)

    Mason, T; Lovell, A; Coyle, D

    2008-03-01

    This paper reports on an investigation into the skills and competencies of forensic psychiatric nurses from the perspective of three groups: (A) forensic psychiatric nurses; (B) non-forensic psychiatric nurses; and (C) other disciplines. A national survey of forensic psychiatric services in the UK was conducted, and information gathered on the perceived skills and competencies in this growing field of psychiatric practice. From 3360 questionnaires, 1172 were returned, making a response rate of 35%. The results indicate a small discrepancy between forensic nurses' and non-forensic nurses' perceptions of the role constructs of forensic practice. However, a larger difference was noted between nurses' perceptions and other disciplines' perceptions of the constituent parts to forensic psychiatric nursing. Nurses tended to focus on personal qualities both in relation to themselves and the patients, while the other disciplines focused on organizational structures both in defining the role and in the resolution of perceived deficits. The findings have implications for multidisciplinary working, as well as policy formulation and curriculum development in terms of the skills and competencies of forensic nurse training.

  6. Forensic entomologists: an evaluation of their status.

    Science.gov (United States)

    Magni, Paola; Guercini, Silvia; Leighton, Angela; Dadour, Ian

    2013-01-01

    The National Academy of Sciences ( 2009 ) published a review charting several key recommendations on strengthening the forensic sciences as an entity as part of an initiative put forth by the USA Congress to streamline and improve the quality of the forensic sciences and their impact on the judiciary process. Although the review was not totally inclusive, many of its sentiments have permeated into all the forensic sciences. The following paper is designed to determine who is practicing the science of forensic entomology, and in what capacity, by questioning practicing forensic entomologists about the type of education obtained, their countries' standards and accreditation processes, as well as general demographic information such as age and gender. A 28-question survey was sent out to 300 forensic entomologists worldwide in 2009. Of the 70 respondents, 80% had a formal education (either Masters or PhD), and 66% published their research. Approximately 50% of respondents were involved in the delivery of expert evidence and writing up case reports, and countries were actively involved with accrediting personnel, facilities, and entomology kits. Many discrepancies within the reported practices and accreditation processes highlight the need for the adoption of a standard code of practice among forensic entomologists.

  7. Forensic Entomologists: An Evaluation of their Status

    Science.gov (United States)

    Magni, Paola; Guercini, Silvia; Leighton, Angela; Dadour, Ian

    2013-01-01

    The National Academy of Sciences (2009) published a review charting several key recommendations on strengthening the forensic sciences as an entity as part of an initiative put forth by the USA Congress to streamline and improve the quality of the forensic sciences and their impact on the judiciary process. Although the review was not totally inclusive, many of its sentiments have permeated into all the forensic sciences. The following paper is designed to determine who is practicing the science of forensic entomology, and in what capacity, by questioning practicing forensic entomologists about the type of education obtained, their countries' standards and accreditation processes, as well as general demographic information such as age and gender. A 28-question survey was sent out to 300 forensic entomologists worldwide in 2009. Of the 70 respondents, 80% had a formal education (either Masters or PhD), and 66% published their research. Approximately 50% of respondents were involved in the delivery of expert evidence and writing up case reports, and countries were actively involved with accrediting personnel, facilities, and entomology kits. Many discrepancies within the reported practices and accreditation processes highlight the need for the adoption of a standard code of practice among forensic entomologists. PMID:24219583

  8. [Application of DNA labeling technology in forensic botany].

    Science.gov (United States)

    Znang, Xian; Li, Jing-Lin; Zhang, Xiang-Yu

    2008-12-01

    Forensic botany is a study of judicial plant evidence. Recently, researches on DNA labeling technology have been a mainstream of forensic botany. The article systematically reviews various types of DNA labeling techniques in forensic botany with enumerated practical cases, as well as the potential forensic application of each individual technique. The advantages of the DNA labeling technology over traditional morphological taxonomic methods are also summarized.

  9. Adaptation and Feasibility Study of a Digital Health Program to Prevent Diabetes among Low-Income Patients: Results from a Partnership between a Digital Health Company and an Academic Research Team

    Directory of Open Access Journals (Sweden)

    Valy Fontil

    2016-01-01

    Full Text Available Background. The feasibility of digital health programs to prevent and manage diabetes in low-income patients has not been adequately explored. Methods. Researchers collaborated with a digital health company to adapt a diabetes prevention program for low-income prediabetes patients at a large safety net clinic. We conducted focus groups to assess patient perspectives, revised lessons for improved readability and cultural relevance to low-income and Hispanic patients, conducted a feasibility study of the adapted program in English and Spanish speaking cohorts, and implemented real-time adaptations to the program for commercial use and for a larger trial of in multiple safety net clinics. Results. The majority of focus group participants were receptive to the program. We modified the curriculum to a 5th-grade reading level and adapted content based on patient feedback. In the feasibility study, 54% of eligible contacted patients expressed interest in enrolling (n=23. Although some participants’ computer access and literacy made registration challenging, they were highly satisfied and engaged (80% logged in at least once/week. Conclusions. Underserved prediabetic patients displayed high engagement and satisfaction with a digital diabetes prevention program despite lower digital literacy skills. The collaboration between researchers and a digital health company enabled iterative improvements in technology implementation to address challenges in low-income populations.

  10. Towards automatic forensic face recognition

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2011-01-01

    In this paper we present a methodology and experimental results for evidence evaluation in the context of forensic face recognition. In forensic applications, the matching score (hereafter referred to as similarity score) from a biometric system must be represented as a Likelihood Ratio (LR). In our

  11. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan

    2010-01-01

    Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition. In this report, we review forensic facial identification which is

  12. Significance of Dental Records in Personal Identification in Forensic Sciences

    Directory of Open Access Journals (Sweden)

    Vagish Kumar L Shanbhag

    2016-01-01

    Full Text Available Forensic odontology is a branch that connects dentistry and the legal profession. One of the members in the forensic investigation team is a dentist. Dentists play an important and significant role in various aspects of the identification of persons in various forensic circumstances. However, several dentists and legal professionals are quite ignorant of this fascinating aspect of forensic odontology. A need was felt to fill this gap. The dental record is a legal document possessed by the dentist and it contains subjective and objective information about the patient. A PubMed search and Google search were done for articles highlighting the importance of dental records in forensic sciences using the key words "forensic odontology, forensic dentistry, forensic dentists, identification, dental records, and dental chart". A total of 42 articles relevant to the title of the article were found and reviewed. The present article highlights the role of dentists in forensic sciences, their possible contributions to forensics, and the various aspects of forensic dentistry, thus bridging the gap of knowledge between the legal and the dental fraternities.

  13. Error and its meaning in forensic science.

    Science.gov (United States)

    Christensen, Angi M; Crowder, Christian M; Ousley, Stephen D; Houck, Max M

    2014-01-01

    The discussion of "error" has gained momentum in forensic science in the wake of the Daubert guidelines and has intensified with the National Academy of Sciences' Report. Error has many different meanings, and too often, forensic practitioners themselves as well as the courts misunderstand scientific error and statistical error rates, often confusing them with practitioner error (or mistakes). Here, we present an overview of these concepts as they pertain to forensic science applications, discussing the difference between practitioner error (including mistakes), instrument error, statistical error, and method error. We urge forensic practitioners to ensure that potential sources of error and method limitations are understood and clearly communicated and advocate that the legal community be informed regarding the differences between interobserver errors, uncertainty, variation, and mistakes. © 2013 American Academy of Forensic Sciences.

  14. Professional convergence in forensic practice.

    Science.gov (United States)

    Mercer, D; Mason, T; Richman, J

    2001-06-01

    This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.

  15. Psychiatric comorbidity in forensic psychiatry.

    Science.gov (United States)

    Palijan, Tija Zarković; Muzinić, Lana; Radeljak, Sanja

    2009-09-01

    For the past several years a numerous studies in the field of forensic psychiatry confirmed a close relationship between violent offenders and comorbid substance abuse. The comorbid substance abuse in violent offenders was usually unrecognized and misdiagnosed. Furthermore, comorbidity in forensic psychiatry describes the co-occurrence of two or more conditions or psychiatric disorder known in the literature as dual diagnosis and defined by World Health Organization (WHO). In fact, many violent offenders have multiple psychiatric diagnoses. Recent studies have confirmed causal relationship between major psychiatric disorders and concomitant substance abuse (comorbidity) in 50-80% of forensic cases. In general, there is a high level of psychiatric comorbidity in forensic patients with prevalence of personality disorders (50-90%), mood disorders (20-60%) and psychotic disorders (15-20%) coupled with substance abuse disorders. Moreover, the high prevalence of psychiatric comorbidities could be found in mentally retarded individuals, as well as, in epileptic patients. Drugs and alcohol abuse can produce serious psychotoxic effects that may lead to extreme violent behavior and consequently to serious criminal offence such as physical assault, rape, armed robbery, attempted murder and homicide, all due to an altered brain function and generating psychotic-like symptoms. Studies have confirmed a significant statistical relevance in causal relationship between substance abuse and violent offences. In terms of forensic psychiatry, the comorbidity strongly contributes in the process of establishing psychiatric diagnosis of diminished mental capacity or insanity at the time of the offence in the course of clinical assessment and evaluation of violent offenders. Today, the primary focus of forensic psychiatry treatment services (in-patient or community) is management of the violent offenders with psychiatric comorbidity which requires a multilevel, evidence based approach to

  16. The digital computer

    CERN Document Server

    Parton, K C

    2014-01-01

    The Digital Computer focuses on the principles, methodologies, and applications of the digital computer. The publication takes a look at the basic concepts involved in using a digital computer, simple autocode examples, and examples of working advanced design programs. Discussions focus on transformer design synthesis program, machine design analysis program, solution of standard quadratic equations, harmonic analysis, elementary wage calculation, and scientific calculations. The manuscript then examines commercial and automatic programming, how computers work, and the components of a computer

  17. The Development of Interactive World Wide Web Based Teaching Material in Forensic Science.

    Science.gov (United States)

    Daeid, Niamh Nic

    2001-01-01

    Describes the development of a Web-based tutorial in the forensic science teaching program at the University of Strathclyde (Scotland). Highlights include the theoretical basis for course development; objectives; Web site design; student feedback; and staff feedback. (LRW)

  18. On the added value of forensic science and grand innovation challenges for the forensic community

    NARCIS (Netherlands)

    van Asten, A.C.

    2014-01-01

    In this paper the insights and results are presented of a long term and ongoing improvement effort within the Netherlands Forensic Institute (NFI) to establish a valuable innovation programme. From the overall perspective of the role and use of forensic science in the criminal justice system, the

  19. Analysis of forensic odontological examinations at the National Forensic Service of Korea from 2011 to 2015.

    Science.gov (United States)

    Roh, Byung-Yoon; Lee, Won-Joon; Seo, Jeong-Uk; Lee, U-Young; Lee, Sang-Seob

    2018-03-02

    The National Forensic Service (NFS) of Korea is a government agency responsible for examining and evaluating evidence obtained at crime scenes. The Section of Forensic Odontology of the Medical Examiner's Office conducts forensic odontological analyses of human remains, and mainly criminal cases are handled. In this study, 588 forensic odontological cases referred to NFS during 2011-2015 were analyzed for referral pattern, evidence material, examination criteria, and other factors and were compared with respective data from 2007 to 2010. Majority of the requests were internal (further dental examinations after autopsy) rather than external (direct requests from other agencies such as police departments). Regarding evidence materials, "Teeth" (including teeth and resected jaws) were dominant evidences. Due to the seasonal effects in Korea, the highest number of requests was in September of each year, but the number of requests in April has recently increased. Evidence materials were mostly found in suburban and rural area, especially in mountainous area due to the geographic characteristics of Korea. Regarding specific examinations, profiling, including age estimation, accounted for majority of the requests; this number had increased relative to the findings of a previous study, whereas the number of requests for dental identification and bite mark analysis had decreased. With this analysis, trends in forensic odontology can be observed, and we expect that these trends would be served as a reference for designing study and making training protocol for forensic odontology. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. Comparing the Scoring of Human Decomposition from Digital Images to Scoring Using On-site Observations.

    Science.gov (United States)

    Dabbs, Gretchen R; Bytheway, Joan A; Connor, Melissa

    2017-09-01

    When in forensic casework or empirical research in-person assessment of human decomposition is not possible, the sensible substitution is color photographic images. To date, no research has confirmed the utility of color photographic images as a proxy for in situ observation of the level of decomposition. Sixteen observers scored photographs of 13 human cadavers in varying decomposition stages (PMI 2-186 days) using the Total Body Score system (total n = 929 observations). The on-site TBS was compared with recorded observations from digital color images using a paired samples t-test. The average difference between on-site and photographic observations was -0.20 (t = -1.679, df = 928, p = 0.094). Individually, only two observers, both students with human decomposition based on digital images can be substituted for assessments based on observation of the corpse in situ, when necessary. © 2017 American Academy of Forensic Sciences.

  1. Assessing thermochromatography as a separation method for nuclear forensics. Current capability vis-a-vis forensic requirements

    International Nuclear Information System (INIS)

    Hanson, D.E.; Garrison, J.R.; Hall, H.L.

    2011-01-01

    Nuclear forensic science has become increasingly important for global nuclear security. However, many current laboratory analysis techniques are based on methods developed without the imperative for timely analysis that underlies the post-detonation forensics mission requirements. Current analysis of actinides, fission products, and fuel-specific materials requires time-consuming chemical separation coupled with nuclear counting or mass spectrometry. High-temperature gas-phase separations have been used in the past for the rapid separation of newly created elements/isotopes and as a basis for chemical classification of that element. We are assessing the utility of this method for rapid separation in the gas-phase to accelerate the separations of radioisotopes germane to post-detonation nuclear forensic investigations. The existing state of the art for thermo chromatographic separations, and its applicability to nuclear forensics, will be reviewed. (author)

  2. Founding Editorial – Forensics and TheScientificWorld

    Directory of Open Access Journals (Sweden)

    Walter Rowe

    2001-01-01

    Full Text Available At the beginning of a new millennium it seems a good idea to stop for a moment and take stock of the current state of forensic science. As a field of scientific research and scientific application, forensic science is a little more than a century old. Forensic science may be said to have begun in 1887 with the simultaneous publication of A. Conan Doyle’s A Study in Scarlet and Hans Gross’s Handbuch für Untersuchungsrichter. Conan Doyle’s novel introduced to the world the character of Sherlock Holmes, whose literary career would popularize the use of physical evidence in criminal investigations. Gross’s manual for examining magistrates suggests ways in which the expertise of chemists, biologists, geologists, and other natural scientists could contribute to investigations. Gross’s book was translated into a number of languages and went through various updated editions during the course of the century. The intervening century saw the development and application of fingerprinting, firearm and tool mark identification, forensic chemistry, forensic biology, forensic toxicology, forensic odontology, forensic pathology, and forensic engineering. Increasingly, the judicial systems of the industrial nations of the world have come to rely upon the expertise of scientists in a variety of disciplines. In most advanced countries, virtually all criminal prosecutions now involve the presentation of scientific testimony. This has had the beneficial effect of diminishing the reliance of courts on eyewitness testimony and defendant confessions.

  3. My-Forensic-Loci-queries (MyFLq) framework for analysis of forensic STR data generated by massive parallel sequencing.

    Science.gov (United States)

    Van Neste, Christophe; Vandewoestyne, Mado; Van Criekinge, Wim; Deforce, Dieter; Van Nieuwerburgh, Filip

    2014-03-01

    Forensic scientists are currently investigating how to transition from capillary electrophoresis (CE) to massive parallel sequencing (MPS) for analysis of forensic DNA profiles. MPS offers several advantages over CE such as virtually unlimited multiplexy of loci, combining both short tandem repeat (STR) and single nucleotide polymorphism (SNP) loci, small amplicons without constraints of size separation, more discrimination power, deep mixture resolution and sample multiplexing. We present our bioinformatic framework My-Forensic-Loci-queries (MyFLq) for analysis of MPS forensic data. For allele calling, the framework uses a MySQL reference allele database with automatically determined regions of interest (ROIs) by a generic maximal flanking algorithm which makes it possible to use any STR or SNP forensic locus. Python scripts were designed to automatically make allele calls starting from raw MPS data. We also present a method to assess the usefulness and overall performance of a forensic locus with respect to MPS, as well as methods to estimate whether an unknown allele, which sequence is not present in the MySQL database, is in fact a new allele or a sequencing error. The MyFLq framework was applied to an Illumina MiSeq dataset of a forensic Illumina amplicon library, generated from multilocus STR polymerase chain reaction (PCR) on both single contributor samples and multiple person DNA mixtures. Although the multilocus PCR was not yet optimized for MPS in terms of amplicon length or locus selection, the results show excellent results for most loci. The results show a high signal-to-noise ratio, correct allele calls, and a low limit of detection for minor DNA contributors in mixed DNA samples. Technically, forensic MPS affords great promise for routine implementation in forensic genomics. The method is also applicable to adjacent disciplines such as molecular autopsy in legal medicine and in mitochondrial DNA research. Copyright © 2013 The Authors. Published by

  4. Cognitive neuroscience in forensic science: understanding and utilizing the human element

    Science.gov (United States)

    Dror, Itiel E.

    2015-01-01

    The human element plays a critical role in forensic science. It is not limited only to issues relating to forensic decision-making, such as bias, but also relates to most aspects of forensic work (some of which even take place before a crime is ever committed or long after the verification of the forensic conclusion). In this paper, I explicate many aspects of forensic work that involve the human element and therefore show the relevance (and potential contribution) of cognitive neuroscience to forensic science. The 10 aspects covered in this paper are proactive forensic science, selection during recruitment, training, crime scene investigation, forensic decision-making, verification and conflict resolution, reporting, the role of the forensic examiner, presentation in court and judicial decisions. As the forensic community is taking on the challenges introduced by the realization that the human element is critical for forensic work, new opportunities emerge that allow for considerable improvement and enhancement of the forensic science endeavour. PMID:26101281

  5. Equipment line-up developed for structuring programmed digital systems important to safety

    International Nuclear Information System (INIS)

    Remus, L.; Colling, J.M.; Buisson, J.

    1986-01-01

    The use of the programmed digital techniques in systems important to safety led to developing equipment line-ups which allow to procedure, through using a restricted number of sub-assemblies, a variety of facilities capable of performing diversified functions. Upon remembering the requirements that such equipment are required to meet (quality assurance both at the design and production stages, qualification, testing opportunities, etc.) the equipments produced by MERLIN GERIN are described in this paper. Such equipments include a whole set of printed circuit boards, plug-in units with self-engaging connectors and the related cabinets to accomodate them. The following systems are made up of such equipments: Digital integrated protection system; Rod control and monitoring system; Reactor power distribution monitoring equipment. This equipment line-up has been gradually complemented and is still further expanding both as a result of the component further development or for the purpose of meeting new requirements or applications (new digital neutron instrumentation, local area networks). Experience gained thus far provides us with the capability of working out in a short time programmed systems for further applications in the nuclear power field

  6. Forensic Science Education and Educational Requirements for Forensic Scientists.

    Science.gov (United States)

    Gaensslen, Robert E.

    2002-01-01

    Focuses on criminalistics, which can be understood to mean the activities and specialty areas characteristic of most municipal, county, or state forensic science laboratories in the United States. (DDR)

  7. Research in computer forensics

    OpenAIRE

    Wai, Hor Cheong

    2002-01-01

    Approved for public release; distribution is unlimited Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing criminal activities on the web, this area of study is catching on in the IT industry and among the law enforcement agencies. The objective of the study is to explore the techniques of computer forensics ...

  8. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  9. Awareness of forensic odontology among dentists in Australia; are they keeping forensically valuable dental records?

    Science.gov (United States)

    Al-Azri, Abdul Rahman; Harford, Jane; James, Helen

    2015-03-30

    Forensic odontologists provide an important service to the community by identifying unknown deceased people, allowing both legal outcomes and family closure. Non-visual identification may be achieved by comparison of post-mortem data with ante-mortem dental records provided by oral health practitioners. Success is dependent largely on the accuracy and adequacy of data in the dental records. An online self-administered questionnaire evaluated Australian dentists' knowledge and behaviours relevant to forensic odontology. Reported record keeping practices were assessed for detail, legibility, accessibility and retention. Behaviours were classified according to the frequency of response. Dentists reported overall reasonable awareness of the major applications of forensic odontology. Personal information and details of restorative treatment were recorded at high levels, while tooth anomalies, photography, additional patient details and denture marking were recorded inadequately. Legible tooth coding was reported at a high level, while other key legibility practices were recorded inadequately. Few of the behaviours related to retention or to maximise accessibility were recorded at a high level. Australian dentists have high expectations of the forensic value of their dental records; however many practices that would enhance the diagnostic, medico-legal and forensic value of dental records are not routinely applied. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  10. History, research and practice of forensic anthropology in Thailand.

    Science.gov (United States)

    Traithepchanapai, Pongpon; Mahakkanukrauh, Pasuk; Kranioti, Elena F

    2016-04-01

    Forensic anthropology is an increasingly developing discipline born about a century ago in the United States with the objective to contribute the knowledge of bone biology and physical anthropology to the emerging needs of the court of law. The development of research in biological and forensic anthropology has made rapid progress worldwide in the past few years, however, in most countries--with the exception of the United States--forensic anthropology work is still considered within the duties of the forensic pathologist. This paper attempts to summarise the history and development of forensic anthropology in Thailand by providing information on past and current research and practice that can help forensic practitioners to apply existing methods in forensic cases and mass disasters. It is hoped that the lessons learned from the tsunami catastrophe and the emerging need for positive identification in medicolegal settings will lead to rapid advances in education, training and professional engagement of anthropologists from the forensic departments and the law enforcement agencies in Thailand. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices

    Directory of Open Access Journals (Sweden)

    Shahzad Saleem

    2014-09-01

    Full Text Available In this work, a survey was conducted to help quantify the relevance of nineteen types of evidence (such as SMS to seven types of digital investigations associated with mobile devices (MD (such as child pornography. 97 % of the respondents agreed that every type of digital evidence has a different level of relevance to further or solve a particular investigation. From 55 serious participants, a data set of 5,772 responses regarding the relevance of nineteen types of digital evidence for all the seven types of digital investigations was obtained. The results showed that (i SMS belongs to the most relevant type of digital evidence for all the seven types of investigations, (ii MMS belongs to the most relevant type of digital evidence for all the types of digital investigations except espionage and eavesdropping where it is the second most relevant type of digital evidence, (iii Phonebook and Contacts is the most relevant type of digital evidence for all types of digital investigations except child pornography, (iv Audio Calls is the most relevant type of digital evidence for all types of digital investigations except credit card fraud and child pornography and (v Standalone Files are the least relevant type of digital evidence for most of the digital investigations. The size of the response data set was fairly reasonable to analyze and then define; by generalization, relevance based best practices for mobile device forensics, which can supplement any forensics process model, including digital triage. For the reliability of these best practices, the impact of responses from the participants with more than five years of experience was analyzed by using one hundred and thirty three (133 instances of One-Way ANOVA tests. The results of this research can help investigators concentrate on the relevant types of digital evidence when investigating a specific case, consequently saving time and effort.

  12. Basic processes in nuclear forensics and analytical plan

    International Nuclear Information System (INIS)

    Venugopal, V.

    2016-01-01

    Nuclear forensics is the analysis of nuclear materials recovered from either the capture of unused materials, or from the radioactive debris following a nuclear explosion and can contribute significantly to the identification of the sources of the materials and the industrial processes used to obtain them. In the case of an explosion, nuclear forensics can also reconstruct key features of the nuclear device. Nuclear forensic analysis works best in conjunction with other law enforcement, radiological protection dosimetry, traditional forensics, and intelligence work to provide the basis for attributing the materials and/or nuclear device to its originators. Nuclear forensics is a piece of the overall attribution process, not a stand-alone activity

  13. Course constructions: A case-base of forensic toxicology.

    Science.gov (United States)

    Zhou, Nan; Wu, Yeda; Su, Terry; Zhang, Liyong; Yin, Kun; Zheng, Da; Zheng, Jingjing; Huang, Lei; Wu, Qiuping; Cheng, Jianding

    2017-08-01

    Forensic toxicology education in China is limited by insufficient teaching methods and resources, resulting in students with adequate theoretical principles but lacking practice experience. Typical cases used as teaching materials vividly represent intoxication and provide students with an opportunity to practice and hone resolving skills. In 2013, the Department of Forensic Pathology at Zhongshan School of Medicine began to construct top-quality courses in forensic toxicology, with its first step, creating a base containing typical cases of intoxication. This essay reviews the construction process of said cases-base, which is intended to set an example of forensic toxicology education. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  14. Cognitive neuroscience in forensic science: understanding and utilizing the human element.

    Science.gov (United States)

    Dror, Itiel E

    2015-08-05

    The human element plays a critical role in forensic science. It is not limited only to issues relating to forensic decision-making, such as bias, but also relates to most aspects of forensic work (some of which even take place before a crime is ever committed or long after the verification of the forensic conclusion). In this paper, I explicate many aspects of forensic work that involve the human element and therefore show the relevance (and potential contribution) of cognitive neuroscience to forensic science. The 10 aspects covered in this paper are proactive forensic science, selection during recruitment, training, crime scene investigation, forensic decision-making, verification and conflict resolution, reporting, the role of the forensic examiner, presentation in court and judicial decisions. As the forensic community is taking on the challenges introduced by the realization that the human element is critical for forensic work, new opportunities emerge that allow for considerable improvement and enhancement of the forensic science endeavour. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  15. Risk assessment of forensic patients: nurses' role.

    Science.gov (United States)

    Encinares, Maxima; McMaster, Jeff James; McNamee, Jim

    2005-03-01

    One of the unique roles of forensic nurses is to conduct risk assessments. Establishing a therapeutic nurse-patient relationship helps forensic nurses perform accurate and useful risk assessments. Accurate risk assessments can facilitate formulation of individualized risk management plans, designed to meet patients' needs and ensure public safety. The importance of forensic nurses' knowledge and application of appropriate communication and proper documentation cannot be overemphasized.

  16. Pediatric sexual assault nurse examiner care: trace forensic evidence, ano-genital injury, and judicial outcomes.

    Science.gov (United States)

    Hornor, Gail; Thackeray, Jonathan; Scribano, Philip; Curran, Sherry; Benzinger, Elizabeth

    2012-09-01

    Although pediatric sexual assault nurse examiners (P-SANEs) have been providing care for over two decades there remain major gaps in the literature describing the quality of P-SANE care and legal outcomes associated with their cases. The purpose of this study was to compare quality indicators of care in a pediatric emergency department (PED) before and after the implementation of a P-SANE program described in terms of trace forensic evidence yield, identification of perpetrator DNA, and judicial outcomes in pediatric acute sexual assault. A retrospective review of medical and legal records of all patients presenting to the PED at Nationwide Children's Hospital with concerns of acute sexual abuse/assault requiring forensic evidence collection from 1/1/04 to 12/31/07 was conducted. Detection and documentation of ano-genital injury, evaluation and documentation of pregnancy status, and testing for N. gonorrhea and C. trachomatis was significantly improved since implementation of the P-SANE Program compared to the historical control. The addition of a P-SANE to the emergency department (ED) provider team improved the quality of care to child/adolescent victims of acute sexual abuse/assault. © 2012 International Association of Forensic Nurses.

  17. Active Traffic Capture for Network Forensics

    Science.gov (United States)

    Slaviero, Marco; Granova, Anna; Olivier, Martin

    Network traffic capture is an integral part of network forensics, but current traffic capture techniques are typically passive in nature. Under heavy loads, it is possible for a sniffer to miss packets, which affects the quality of forensic evidence.

  18. A method for digital image registration using a mathematical programming technique

    Science.gov (United States)

    Yao, S. S.

    1973-01-01

    A new algorithm based on a nonlinear programming technique to correct the geometrical distortions of one digital image with respect to another is discussed. This algorithm promises to be superior to existing ones in that it is capable of treating localized differential scaling, translational and rotational errors over the whole image plane. A series of piece-wise 'rubber-sheet' approximations are used, constrained in such a manner that a smooth approximation over the entire image can be obtained. The theoretical derivation is included. The result of using the algorithm to register four channel S065 Apollo IX digitized photography over Imperial Valley, California, is discussed in detail.

  19. What is nuclear forensics?

    International Nuclear Information System (INIS)

    Halevy, Itzhak

    2014-01-01

    Nuclear forensics is the investigation of nuclear materials to find evidence for example the source, the trafficking, and the enrichment of the material. The material can be recovered from various sources including dust from the vicinity of a nuclear facility, or from the radioactive debris following a nuclear explosion. Results of nuclear forensic testing are used by different organizations to make decisions. The information is typically combined with other sources of information such as law enforcement and intelligence information

  20. Efficacy of nuclear forensics

    International Nuclear Information System (INIS)

    Kazi, Reshmi

    2011-01-01

    In a strange turn of history, the threat of global nuclear war has gone down, but the risk of a nuclear attack has gone up. The danger of nuclear terrorism and ways to thwart it, tackle it and manage it in the event of an attack is increasingly gaining the attention of nuclear analysts all over the world. There is rising awareness among nuclear experts to develop mechanisms to prevent, deter and deal with the threat of nuclear terrorism. Nuclear specialists are seeking to develop and improve the science of nuclear forensics so as to provide faster analysis during a crisis. Nuclear forensics can play an important role in detecting illicit nuclear materials to counter trafficking in nuclear and radiological materials. An effective nuclear forensic and attribution strategy can enable policy makers, decision makers and technical managers to respond to situations involving interception of special nuclear materials

  1. Radiological field exercises for forensic investigators. Technical memorandum

    International Nuclear Information System (INIS)

    Larsson, C.L.; Clement, C.; Estan, D.; McDiarmid, C.; Tessier, M.

    2006-06-01

    A series of tabletop and field exercises were designed and executed to test traditional forensic investigation procedures in a crime scene with radioactive material present. This allowed for specific training needs of forensic identification specialists to be identified and revised procedures to be drafted. Two scenarios were exercised, first as tabletop discussions with the Royal Canadian Mounted Police (RCMP), the Canadian Nuclear Safety Commission (CNSC), and DRDC Ottawa, and then as field exercises with the participation of the RCMP and Ottawa Police Services (OPS) forensic investigators. These exercises produced a number of lessons learned with regard to protocols for forensic investigators and led to the development of a one-page fact sheet on performing forensic identification tasks in a radiation environment. (author)

  2. Best practice in forensic entomology--standards and guidelines.

    Science.gov (United States)

    Amendt, Jens; Campobasso, Carlo P; Gaudry, Emmanuel; Reiter, Christian; LeBlanc, Hélène N; Hall, Martin J R

    2007-03-01

    Forensic entomology, the use of insects and other arthropods in forensic investigations, is becoming increasingly more important in such investigations. To ensure its optimal use by a diverse group of professionals including pathologists, entomologists and police officers, a common frame of guidelines and standards is essential. Therefore, the European Association for Forensic Entomology has developed a protocol document for best practice in forensic entomology, which includes an overview of equipment used for collection of entomological evidence and a detailed description of the methods applied. Together with the definitions of key terms and a short introduction to the most important methods for the estimation of the minimum postmortem interval, the present paper aims to encourage a high level of competency in the field of forensic entomology.

  3. Forensic anthropology casework-essential methodological considerations in stature estimation.

    Science.gov (United States)

    Krishan, Kewal; Kanchan, Tanuj; Menezes, Ritesh G; Ghosh, Abhik

    2012-03-01

    The examination of skeletal remains is a challenge to the medical examiner's/coroner's office and the forensic anthropologist conducting the investigation. One of the objectives of the medico-legal investigation is to estimate stature or height from various skeletal remains and body parts brought for examination. Various skeletal remains and body parts bear a positive and linear correlation with stature and have been successfully used for stature estimation. This concept is utilized in estimation of stature in forensic anthropology casework in mass disasters and other forensic examinations. Scientists have long been involved in standardizing the anthropological data with respect to various populations of the world. This review deals with some essential methodological issues that need to be addressed in research related to estimation of stature in forensic examinations. These issues have direct relevance in the identification of commingled or unknown remains and therefore it is essential that forensic nurses are familiar with the theories and techniques used in forensic anthropology. © 2012 International Association of Forensic Nurses.

  4. Comparative study of age estimation using dentinal translucency by digital and conventional methods

    Science.gov (United States)

    Bommannavar, Sushma; Kulkarni, Meena

    2015-01-01

    Introduction: Estimating age using the dentition plays a significant role in identification of the individual in forensic cases. Teeth are one of the most durable and strongest structures in the human body. The morphology and arrangement of teeth vary from person-to-person and is unique to an individual as are the fingerprints. Therefore, the use of dentition is the method of choice in the identification of the unknown. Root dentin translucency is considered to be one of the best parameters for dental age estimation. Traditionally, root dentin translucency was measured using calipers. Recently, the use of custom built software programs have been proposed for the same. Objectives: The present study describes a method to measure root dentin translucency on sectioned teeth using a custom built software program Adobe Photoshop 7.0 version (Adobe system Inc, Mountain View California). Materials and Methods: A total of 50 single rooted teeth were sectioned longitudinally to derive a 0.25 mm uniform thickness and the root dentin translucency was measured using digital and caliper methods and compared. The Gustafson's morphohistologic approach is used in this study. Results: Correlation coefficients of translucency measurements to age were statistically significant for both the methods (P < 0.125) and linear regression equations derived from both methods revealed better ability of the digital method to assess age. Conclusion: The custom built software program used in the present study is commercially available and widely used image editing software. Furthermore, this method is easy to use and less time consuming. The measurements obtained using this method are more precise and thus help in more accurate age estimation. Considering these benefits, the present study recommends the use of digital method to assess translucency for age estimation. PMID:25709325

  5. Evaluation of a Digital Game-Based Learning Program for Enhancing Youth Mental Health: A Structural Equation Modeling of the Program Effectiveness.

    Science.gov (United States)

    Huen, Jenny My; Lai, Eliza Sy; Shum, Angie Ky; So, Sam Wk; Chan, Melissa Ky; Wong, Paul Wc; Law, Y W; Yip, Paul Sf

    2016-10-07

    Digital game-based learning (DGBL) makes use of the entertaining power of digital games for educational purposes. Effectiveness assessment of DGBL programs has been underexplored and no attempt has been made to simultaneously model both important components of DGBL: learning attainment (ie, educational purposes of DGBL) and engagement of users (ie, entertaining power of DGBL) in evaluating program effectiveness. This study aimed to describe and evaluate an Internet-based DGBL program, Professor Gooley and the Flame of Mind, which promotes mental health to adolescents in a positive youth development approach. In particular, we investigated whether user engagement in the DGBL program could enhance their attainment on each of the learning constructs per DGBL module and subsequently enhance their mental health as measured by psychological well-being. Users were assessed on their attainment on each learning construct, psychological well-being, and engagement in each of the modules. One structural equation model was constructed for each DGBL module to model the effect of users' engagement and attainment on the learning construct on their psychological well-being. Of the 498 secondary school students that registered and participated from the first module of the DGBL program, 192 completed all 8 modules of the program. Results from structural equation modeling suggested that a higher extent of engagement in the program activities facilitated users' attainment on the learning constructs on most of the modules and in turn enhanced their psychological well-being after controlling for users' initial psychological well-being and initial attainment on the constructs. This study provided evidence that Internet intervention for mental health, implemented with the technologies and digital innovations of DGBL, could enhance youth mental health. Structural equation modeling is a promising approach in evaluating the effectiveness of DGBL programs.

  6. Evaluating osteological ageing from digital data

    DEFF Research Database (Denmark)

    Villa, Chiara; Buckberry, Jo; Lynnerup, Niels

    2018-01-01

    Age at death estimation of human skeletal remains is one of the key issues in constructing a biological profile both in forensic and archaeological contexts. The traditional adult osteological methods evaluate macroscopically the morphological changes that occur with increasing age of specific...... on how the osteological age-related changes have been evaluated in digital data. First, the 3D virtual copies of the bones have been used to mimic the appearance of the dry bones and the application of the traditional methods. Secondly, the information directly extrapolated from CT scans has been used...

  7. Location tracking forensics on mobile devices

    Science.gov (United States)

    Sack, Stefan; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the

  8. Practice Parameter for Child and Adolescent Forensic Evaluations

    Science.gov (United States)

    Journal of the American Academy of Child & Adolescent Psychiatry, 2011

    2011-01-01

    This Parameter addresses the key concepts that differentiate the forensic evaluation of children and adolescents from a clinical assessment. There are ethical issues unique to the forensic evaluation, because the forensic evaluator's duty is to the person, court, or agency requesting the evaluation, rather than to the patient. The forensic…

  9. The science and knowledge of forensic odontology: repositioning ...

    African Journals Online (AJOL)

    This paper was based on a survey of the knowledge of forensic odontology among professionals in medicine, dentistry, law and the law enforcement agents. The results show low level knowledge of forensic odontology among the professionals. It is recommended that forensic odontology be introduced as a course in dental ...

  10. Tattoos: forensic considerations.

    Science.gov (United States)

    Byard, Roger W

    2013-12-01

    Tattooing refers to marking of the skin by puncturing and introducing pigmented material. Although it derives from a Polynesian word, tautau, decorative tattooing has been found in most societies over many centuries. The purpose of tattooing has varied from simple decoration, to a marker of social rank, criminal and noncriminal group membership, or a particular rite of passage in tribal communities. Tattooing may be used in medicine to mark areas for radiotherapy, and may occur inadvertently associated with certain occupations such as coal mining. Forensically, tattoos may be very useful in assisting with body identification if facial features or fingers have been damaged or removed. Aspects of a decedent's history may also be deduced from certain tattoos such as military tattoos in service personnel, rudimentary line tattoos with antisocial and anti-police messages in ex-prisoners, and syringes, marihuana leaves or mushrooms in illicit drug users. Tattoos have become more common in recent years in younger individuals in the West and so should be expected to be found with increasing incidence at the time of forensic autopsy examinations. Increasing population movements also mean that less common tattoos may be encountered during forensic evaluations.

  11. An Improved Forensic Science Information Search.

    Science.gov (United States)

    Teitelbaum, J

    2015-01-01

    Although thousands of search engines and databases are available online, finding answers to specific forensic science questions can be a challenge even to experienced Internet users. Because there is no central repository for forensic science information, and because of the sheer number of disciplines under the forensic science umbrella, forensic scientists are often unable to locate material that is relevant to their needs. The author contends that using six publicly accessible search engines and databases can produce high-quality search results. The six resources are Google, PubMed, Google Scholar, Google Books, WorldCat, and the National Criminal Justice Reference Service. Carefully selected keywords and keyword combinations, designating a keyword phrase so that the search engine will search on the phrase and not individual keywords, and prompting search engines to retrieve PDF files are among the techniques discussed. Copyright © 2015 Central Police University.

  12. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  13. A Study on Research Trend in Nuclear Forensics

    International Nuclear Information System (INIS)

    Kim, Kyungmin; Yim, Hobin; Lee, Seungmin; Hong, Yunjeong; Kim, Jae Kwang

    2014-01-01

    The international community has recognized the serious threat posed by nuclear and other radioactive material out of regulatory control. To address these concerns, the Office of Nuclear Security of the international Atomic Energy Agency (IAEA) is developing, inter alia, guidance for nuclear forensics to assist Member States. According to the IAEA Incident and Trafficking Database (ITDB) of the IAEA to record the illegal trade and trafficking incidents of nuclear material or other radioactive material, incidents of 2331 have been reported in 1993 to 2012. These incidents mean that we are not safe for nuclear material. In order to solve the case generated by the illicit trafficking of nuclear material and the efficient management of nuclear material, the study of nuclear forensics is very important. In this study, we investigated the analytical techniques and the current status of nuclear forensics research. In this study, we investigated the current status of research of nuclear forensics, procedures for analysis and nuclear forensics analysis technique. A result of the study, we have been found that the major institutes and laboratory actively research on analysis technique and nuclear forensics. However, research on nuclear forensics is still in early stage, ROK is necessary preliminary survey of analysis technique and foundation of physical, chemical, and morphology characteristics of nuclear materials

  14. [Profile, competencies and digital fluency of nurses in the Professional Improvement Program].

    Science.gov (United States)

    Tanabe, Lyvia Pini; Kobayashi, Rika Miyahara

    2013-08-01

    A descriptive exploratory study conducted in the city of São Paulo, which aimed to identify the profile, competencies and digital fluency of nurses in the Professional Improvement Program in handling technology at work. The population, composed by 60 nurses in the program, answered a questionnaire with data about profile, digital fluency and professional competencies. The participants were found to be: 95.0% female, 61.7% between 23 and 25 years old, 75.0% from public schools, 58.3% enrolled in cardiovascular nursing, 98.3% had contact with computing resources during graduation, 100.0% had a computer at home, 86.7% accessed the internet daily, 96.7% used Messenger and 58.3% had an intermediate level of knowledge and skill in computing. Professional competencies required for technology management referred to knowing how to be innovative, creative, and updated to identify and manage software and to use technological resources.

  15. Massively parallel sequencing of forensic STRs

    DEFF Research Database (Denmark)

    Parson, Walther; Ballard, David; Budowle, Bruce

    2016-01-01

    The DNA Commission of the International Society for Forensic Genetics (ISFG) is reviewing factors that need to be considered ahead of the adoption by the forensic community of short tandem repeat (STR) genotyping by massively parallel sequencing (MPS) technologies. MPS produces sequence data that...

  16. Bovine and equine forensic DNA analysis

    NARCIS (Netherlands)

    van de Goor, L.H.P.

    2011-01-01

    Animal forensic DNA analysis is being used for human criminal investigations (e.g traces from cats and dogs), wildlife management, breeding and food safety. The most common DNA markers used for such forensic casework are short tandem repeats (STR). Rules and guidelines concerning quality assurance

  17. Child abduction murder: the impact of forensic evidence on solvability.

    Science.gov (United States)

    Brown, Katherine M; Keppel, Robert D

    2012-03-01

    This study examined 733 child abduction murders (CAMs) occurring from 1968 to 2002 to explore the influence of forensic evidence on case solvability in CAM investigations. It was hypothesized that the presence of forensic evidence connecting the offender to the crime would enhance case solvability in murder investigations of abducted children. This study examined the impact of CAM of different types of forensic evidence and the impact of the summed total of forensic evidence items on case solvability by controlling for victim age, victim race, victim gender, and victim-offender relationship. Time and distance theoretical predictors were also included. Binomial logistic regression models were used to determine whether forensic evidence was a critical solvability factor in murder investigations of abducted children. This research indicated that, while forensic evidence increased case solvability, the impact of forensic evidence on solvability was not as important as other solvability factors examined. © 2011 American Academy of Forensic Sciences.

  18. [Forensic nursing in Germany? Nurses' perceptions of domestic violence].

    Science.gov (United States)

    Blättner, Beate; Georgy, Sascha; Krüger, Kerstin

    2008-12-01

    More than one of three women has been a victim of domestic violence at least once. Victims would like to have a well-informed contact person within the healthcare system who knows about support programs. In many countries that is the responsibility of the healthcare system and is called Forensic Nursing. Therefore, it is interesting to know how nurses in Germany perceive domestic violence and under what circumstances they could imagine taking on tasks in the fields of documentation and nursing. The data for this qualitative study was collected via four focus groups consisting of 38 nurses--3 men and 35 women--with work experience in a hospital. Nurses seem to have difficulties in recognising domestic violence. Whether the subject of domestic violence is addressed explicitly depends on the relationship built up between the patient and the nurses. Nurses do not necessarily take further steps. They could imagine providing help by listening actively, providing information about support programs and providing consulting services. Only occasionally nurses agree to document the case to be used as forensic evidence. Another open issue is appropriate remuneration. It is necessary to integrate that subject systematically into basic and advanced training on different levels of qualification.

  19. Readiness for Delivering Digital Health at Scale: Lessons From a Longitudinal Qualitative Evaluation of a National Digital Health Innovation Program in the United Kingdom

    Science.gov (United States)

    Lennon, Marilyn R; Bouamrane, Matt-Mouley; Devlin, Alison M; O'Connor, Siobhan; O'Donnell, Catherine; Chetty, Ula; Agbakoba, Ruth; Bikker, Annemieke; Grieve, Eleanor; Finch, Tracy; Watson, Nicholas; Wyke, Sally

    2017-01-01

    Background Digital health has the potential to support care delivery for chronic illness. Despite positive evidence from localized implementations, new technologies have proven slow to become accepted, integrated, and routinized at scale. Objective The aim of our study was to examine barriers and facilitators to implementation of digital health at scale through the evaluation of a £37m national digital health program: ‟Delivering Assisted Living Lifestyles at Scale” (dallas) from 2012-2015. Methods The study was a longitudinal qualitative, multi-stakeholder, implementation study. The methods included interviews (n=125) with key implementers, focus groups with consumers and patients (n=7), project meetings (n=12), field work or observation in the communities (n=16), health professional survey responses (n=48), and cross program documentary evidence on implementation (n=215). We used a sociological theory called normalization process theory (NPT) and a longitudinal (3 years) qualitative framework analysis approach. This work did not study a single intervention or population. Instead, we evaluated the processes (of designing and delivering digital health), and our outcomes were the identified barriers and facilitators to delivering and mainstreaming services and products within the mixed sector digital health ecosystem. Results We identified three main levels of issues influencing readiness for digital health: macro (market, infrastructure, policy), meso (organizational), and micro (professional or public). Factors hindering implementation included: lack of information technology (IT) infrastructure, uncertainty around information governance, lack of incentives to prioritize interoperability, lack of precedence on accountability within the commercial sector, and a market perceived as difficult to navigate. Factors enabling implementation were: clinical endorsement, champions who promoted digital health, and public and professional willingness. Conclusions

  20. Peer review in forensic science.

    Science.gov (United States)

    Ballantyne, Kaye N; Edmond, Gary; Found, Bryan

    2017-08-01

    Peer review features prominently in the forensic sciences. Drawing on recent research and studies, this article examines different types of peer review, specifically: editorial peer review; peer review by the scientific community; technical and administrative review; and verification (and replication). The article reviews the different meanings of these quite disparate activities and their utility in relation to enhancing performance and reducing error. It explains how forensic practitioners should approach and use peer review, as well as how it should be described in expert reports and oral testimony. While peer review has considerable potential, and is a key component of modern quality management systems, its actual value in most forensic science settings has yet to be determined. In consequence, forensic practitioners should reflect on why they use specific review procedures and endeavour to make their actual practices and their potential value transparent to consumers; whether investigators, lawyers, jurors or judges. Claims that review increases the validity of a scientific technique or accuracy of opinions within a particular case should be avoided until empirical evidence is available to support such assertions. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Forensic radiology: An emerging tool in identification

    Directory of Open Access Journals (Sweden)

    Raghav Kumar

    2015-01-01

    Full Text Available In any mass disaster condition, identification of the person is most important. For this purpose, the forensic investigators use different methods for identifying the dead. They consider skeletal remains of the dead as the initial step in identification. Radiographs carry great evidence to act as antemortem records and also assist in identifying the person, age, gender, race, etc. Forensic dentistry is also emerging as a new branch in forensics. So, the forensic dentist must be aware of different techniques, developments, and resources to incorporate the technology in order to achieve success in human identification. So, our aim of the present review is to focus on different radiological techniques and new developments available for successful identification of the dead.

  2. The Department of Homeland Security’s Approach to Countering Nuclear Terrorism through Detection and Technical Forensics

    Directory of Open Access Journals (Sweden)

    Huban A. Gowadia

    2015-07-01

    Full Text Available To combat the threat of nuclear terrorism, the Domestic Nuclear Detection Office (DNDO was established within the U.S. Department of Homeland Security to focus efforts on developing and enhancing radiological and nuclear detection and national technical nuclear forensics capabilities. With respect to nuclear detection, we at DNDO, in concert with interagency partners, are developing and enhancing a multi-faceted, layered, defense-in-depth framework to make prohibitively difficult the importation, possession, storage, development, transportation, or use of nuclear or other radioactive material that is out of regulatory control. In furtherance of this framework, we conduct research and development on detection and forensics technologies, characterize system performance, acquire and deploy detection systems, and support operational partners with the development of programs to effectively perform detection operations. To support the U.S. Government’s (USG attribution process, we focus on improving the readiness of the overarching USG forensic capabilities; advancing the technical capabilities to perform forensic analyses on pre-detonation nuclear and other radioactive materials; and building and sustaining an expertise pipeline for nuclear forensic scientists. These efforts, coupled with the work of interagency partners, will advance USG capabilities to detect and interdict a nuclear threat and hold accountable those who are responsible for such actions.

  3. Are UK undergraduate Forensic Science degrees fit for purpose?

    Science.gov (United States)

    Welsh, Charles; Hannis, Marc

    2011-09-01

    In October 2009 Skills for Justice published the social research paper 'Fit for purpose?: Research into the provision of Forensic Science degree programmes in UK Higher Education Institutions.' The research engaged employers representing 95% of UK Forensic Science providers and 79% of UK universities offering Forensic Science or Crime Scene degree programmes. In addition to this, the research collected the views of 430 students studying these degrees. In 2008 there were approximately 9000 people working in the Forensic Science sector in the UK. The research found that the numbers of students studying Forensic Science or Crime Scene degrees in the UK have more than doubled since 2002-03, from 2191 in to 5664 in 2007-08. Over the same period there were twice as many females as males studying for these degrees. The research concluded that Forensic Science degree programmes offered by UK universities were of a good quality and they provided the student with a positive learning experience but the content was not relevant for Forensic Science employers. This echoed similar research by the former Government Department for Innovation, Universities and Skills on graduates from wider science, technology, engineering and mathematics degree programmes. The research also found that 75% of students studying Forensic Science or Crime Scene degrees expected to have a career in the Forensic Science sector, meaning that ensuring these courses are relevant for employers is a key challenge for universities. This paper reflects on the original research and discusses the implications in light of recent government policy. Copyright © 2011 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  4. Bayesian networks for evaluation of evidence from forensic entomology.

    Science.gov (United States)

    Andersson, M Gunnar; Sundström, Anders; Lindström, Anders

    2013-09-01

    In the aftermath of a CBRN incident, there is an urgent need to reconstruct events in order to bring the perpetrators to court and to take preventive actions for the future. The challenge is to discriminate, based on available information, between alternative scenarios. Forensic interpretation is used to evaluate to what extent results from the forensic investigation favor the prosecutors' or the defendants' arguments, using the framework of Bayesian hypothesis testing. Recently, several new scientific disciplines have been used in a forensic context. In the AniBioThreat project, the framework was applied to veterinary forensic pathology, tracing of pathogenic microorganisms, and forensic entomology. Forensic entomology is an important tool for estimating the postmortem interval in, for example, homicide investigations as a complement to more traditional methods. In this article we demonstrate the applicability of the Bayesian framework for evaluating entomological evidence in a forensic investigation through the analysis of a hypothetical scenario involving suspect movement of carcasses from a clandestine laboratory. Probabilities of different findings under the alternative hypotheses were estimated using a combination of statistical analysis of data, expert knowledge, and simulation, and entomological findings are used to update the beliefs about the prosecutors' and defendants' hypotheses and to calculate the value of evidence. The Bayesian framework proved useful for evaluating complex hypotheses using findings from several insect species, accounting for uncertainty about development rate, temperature, and precolonization. The applicability of the forensic statistic approach to evaluating forensic results from a CBRN incident is discussed.

  5. Forensic use of fingermarks and fingerprints

    NARCIS (Netherlands)

    Meuwly, Didier; Li, Stan Z.; Jain, Anil K.

    2014-01-01

    The aim of this entry is to describe and explain the main forensic uses of fingermarks and fingerprints. It defines the concepts and provides the nomenclature related to forensic dactyloscopy. It describes the structure of the papillary ridges, the organization of the information in three levels,

  6. Forensic psychiatric nursing: skills and competencies: II clinical aspects.

    Science.gov (United States)

    Mason, T; Coyle, D; Lovell, A

    2008-03-01

    This study reports on research undertaken to identify the skills and competencies of forensic psychiatric nurses working in secure psychiatric services in the UK. The rationale for this research is the lack of clarity in the role definition of nurses working in these environments and the specific content that may underscore the curriculum for training forensic nurses. Over 3300 questionnaires were distributed to forensic psychiatric nurses, non-forensic psychiatric nurses and other disciplines and information obtained on (1) the perceived clinical problems that give forensic nurses the most difficulty; (2) the skills best suited to overcome those problems; and (3) the priority aspects of clinical nursing care that needs to be developed. A 35% response rate was obtained with 1019 forensic psychiatric nurses, 110 non-forensic psychiatric nurses and 43 other disciplines. The results highlighted a 'top ten' list of main problems with possible solutions and main areas for development. The conclusions drawn include a focus on skills and competencies regarding the management of personality disorders and the management of violence and aggression.

  7. Kindle Forensics: Acquisition & Analysis

    Directory of Open Access Journals (Sweden)

    Peter Hannay

    2011-06-01

    Full Text Available The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

  8. Review of Forensic Tools for Smartphones

    Science.gov (United States)

    Jahankhani, Hamid; Azam, Amir

    The technological capability of mobile devices in particular Smartphones makes their use of value to the criminal community as a data terminal in the facilitation of organised crime or terrorism. The effective targeting of these devices from criminal and security intelligence perspectives and subsequent detailed forensic examination of the targeted device will significantly enhance the evidence available to the law enforcement community. When phone devices are involved in crimes, forensic examiners require tools that allow the proper retrieval and prompt examination of information present on these devices. Smartphones that are compliant to Global System for Mobile Communication (GSM) standards, will maintains their identity and user's personal information on Subscriber Identity Module (SIM). Beside SIM cards, substantial amount of information is stored on device's internal memory and external memory modules. The aim of this paper is to give an overview of the currently available forensic software tools that are developed to carry out forensic investigation of mobile devices and point to current weaknesses within this process.

  9. Digital Citizenship Means Character Education for the Digital Age

    Science.gov (United States)

    Ohler, Jason

    2012-01-01

    The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…

  10. Gamma spectra pictures using a digital plotter. Program MONO

    International Nuclear Information System (INIS)

    Los Arcos Merino, J.M.

    1978-01-01

    The program MONO has been written for a CALCOMP-936 digital plotter operating off- -line with a UMI VAC 1106 computer, to obtain graphic representations of single gamma spectra stored on magnetic tape. It allows to plot the whole spectrum or only a part, as well as to draw a given spectrum on the same or different picture than the previous one. Ten representation scales are available and at up nine comment lines can be written in a graphic. (Author) 4 refs

  11. Testing Framework for Mobile Device Forensics Tools

    Directory of Open Access Journals (Sweden)

    Maxwell Anobah

    2014-09-01

    Full Text Available The proliferation of mobile communication and computing devices, in particular smart mobile phones, is almost paralleled with the increasing number of mobile device forensics tools in the market. Each mobile forensics tool vendor, on one hand claims to have a tool that is best in terms of performance, while on the other hand each tool vendor seems to be using different standards for testing their tools and thereby defining what support means differently. To overcome this problem, a testing framework based on a series of tests ranging from basic forensics tasks such as file system reconstruction up to more complex ones countering antiforensic techniques is proposed. The framework, which is an extension of an existing effort done in 2010, prescribes a method to clearly circumscribe the term support into precise levels. It also gives an idea of the standard to be developed and accepted by the forensic community that will make it easier for forensics investigators to quickly select the most appropriate tool for a particular mobile device.

  12. The development and practice of forensic podiatry.

    Science.gov (United States)

    Vernon, Wesley

    2006-01-01

    Forensic podiatry is a small, but potentially useful specialty using clinical podiatric knowledge for the purpose of person identification. The practice of forensic podiatry began in the early 1970s in Canada and the UK, although supportive research commenced later in the 1990s. Techniques of forensic podiatry include identification from podiatry records, the human footprint, footwear, and the analysis of gait forms captured on Closed Circuit Television Cameras. The most valuable techniques relate to the comparison of the foot impressions inside shoes. Tools to describe, measure and compare foot impressions with footwear wear marks have been developed through research with potential for further development. The role of forensic podiatrists is of particular value when dealing with variable factors relating to the functioning and the shod foot. Case studies demonstrate the approach of podiatrists, in footwear identification, when comparing exemplar with questioned foot impressions. Forensic podiatry practice should be approached cautiously and it is essential for podiatrists undertaking this type of work to understand the context within which the process of person identification takes place.

  13. U.S. and Russian Collaboration in the Area of Nuclear Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, M J

    2007-10-22

    Nuclear forensics has become increasingly important in the fight against illicit trafficking in nuclear and other radioactive materials. The illicit trafficking of nuclear materials is, of course, an international problem; nuclear materials may be mined and milled in one country, manufactured in a second country, diverted at a third location, and detected at a fourth. There have been a number of articles in public policy journals in the past year that call for greater interaction between the U. S. and the rest of the world on the topic of nuclear forensics. Some believe that such international cooperation would help provide a more certain capability to identify the source of the nuclear material used in a terrorist event. An improved international nuclear forensics capability would also be important as part of the IAEA verification toolkit, particularly linked to increased access provided by the additional protocol. A recent study has found that, although international progress has been made in securing weapons-usable HEU and Pu, the effort is still insufficient. They found that nuclear material, located in 40 countries, could be obtained by terrorists and criminals and used for a crude nuclear weapon. Through 2006, the IAEA Illicit Trafficking Database had recorded a total of 607 confirmed events involving illegal possession, theft, or loss of nuclear and other radioactive materials. Although it is difficult to predict the future course of such illicit trafficking, increasingly such activities are viewed as significant threats that merit the development of special capabilities. As early as April, 1996, nuclear forensics was recognized at the G-8 Summit in Moscow as an important element of an illicit nuclear trafficking program. Given international events over the past several years, the value and need for nuclear forensics seems greater than ever. Determining how and where legitimate control of nuclear material was lost and tracing the route of the material from

  14. U.S. and Russian Collaboration in the Area of Nuclear Forensics

    International Nuclear Information System (INIS)

    Kristo, M J

    2007-01-01

    Nuclear forensics has become increasingly important in the fight against illicit trafficking in nuclear and other radioactive materials. The illicit trafficking of nuclear materials is, of course, an international problem; nuclear materials may be mined and milled in one country, manufactured in a second country, diverted at a third location, and detected at a fourth. There have been a number of articles in public policy journals in the past year that call for greater interaction between the U. S. and the rest of the world on the topic of nuclear forensics. Some believe that such international cooperation would help provide a more certain capability to identify the source of the nuclear material used in a terrorist event. An improved international nuclear forensics capability would also be important as part of the IAEA verification toolkit, particularly linked to increased access provided by the additional protocol. A recent study has found that, although international progress has been made in securing weapons-usable HEU and Pu, the effort is still insufficient. They found that nuclear material, located in 40 countries, could be obtained by terrorists and criminals and used for a crude nuclear weapon. Through 2006, the IAEA Illicit Trafficking Database had recorded a total of 607 confirmed events involving illegal possession, theft, or loss of nuclear and other radioactive materials. Although it is difficult to predict the future course of such illicit trafficking, increasingly such activities are viewed as significant threats that merit the development of special capabilities. As early as April, 1996, nuclear forensics was recognized at the G-8 Summit in Moscow as an important element of an illicit nuclear trafficking program. Given international events over the past several years, the value and need for nuclear forensics seems greater than ever. Determining how and where legitimate control of nuclear material was lost and tracing the route of the material from

  15. Assessment of the Forensic Sciences Profession: A Legal Study Concerning the Forensic Sciences Personnel. Volume III.

    Science.gov (United States)

    Schroeder, Oliver, Jr.

    The place and function of forensic sciences personnel in American criminal law and court procedure, and the criteria used by criminal trial judges and lawyers to assess the value of forensic sciences personnel were investigated. Federal, state, Virgin Island, and Puerto Rican laws were examined, and a search of the medical and legal literature…

  16. Identical twins in forensic genetics

    DEFF Research Database (Denmark)

    Tvedebrink, Torben; Morling, Niels

    2015-01-01

    The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where...... published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator......, then data relevant for the Danish society suggests that the threshold of likelihood ratios should approximately be between 150,000 and 2,000,000 in order to take the risk of an unrecognised identical, monozygotic twin into consideration. In other societies, the threshold of the likelihood ratio in crime...

  17. Nuclear Forensics and Attribution: A National Laboratory Perspective

    Science.gov (United States)

    Hall, Howard L.

    2008-04-01

    Current capabilities in technical nuclear forensics - the extraction of information from nuclear and/or radiological materials to support the attribution of a nuclear incident to material sources, transit routes, and ultimately perpetrator identity - derive largely from three sources: nuclear weapons testing and surveillance programs of the Cold War, advances in analytical chemistry and materials characterization techniques, and abilities to perform ``conventional'' forensics (e.g., fingerprints) on radiologically contaminated items. Leveraging that scientific infrastructure has provided a baseline capability to the nation, but we are only beginning to explore the scientific challenges that stand between today's capabilities and tomorrow's requirements. These scientific challenges include radically rethinking radioanalytical chemistry approaches, developing rapidly deployable sampling and analysis systems for field applications, and improving analytical instrumentation. Coupled with the ability to measure a signature faster or more exquisitely, we must also develop the ability to interpret those signatures for meaning. This requires understanding of the physics and chemistry of nuclear materials processes well beyond our current level - especially since we are unlikely to ever have direct access to all potential sources of nuclear threat materials.

  18. Forensic anthropology and mortuary archaeology in Lithuania.

    Science.gov (United States)

    Jankauskas, Rimantas

    2009-12-01

    Forensic anthropology (in Lithuania, as everywhere in Eastern Europe, traditionally considered as a narrower field--forensic osteology) has a long history, experience being gained both during exhumations of mass killings during the Second World War and the subsequent totalitarian regime, investigations of historical mass graves, identification of historical personalities and routine forensic work. Experts of this field (usually a branch of forensic medicine) routinely are solving "technical" questions of crime investigation, particularly identification of (usually dead) individuals. Practical implementation of the mission of forensic anthropology is not an easy task due to interdisciplinary character of the field. On one hand, physical anthropology has in its disposition numerous scientifically tested methods, however, their practical value in particular legal processes is limited. Reasons for these discrepancies can be related both to insufficient understanding of possibilities and limitations of forensic anthropology and archaeology by officials representing legal institutions that perform investigations, and sometimes too "academic" research, that is conducted at anthropological laboratories, when methods developed are not completely relevant to practical needs. Besides of answering to direct questions (number of individuals, sex, age, stature, population affinity, individual traits, evidence of violence), important humanitarian aspects--the individual's right for identity, the right of the relatives to know the fate of their beloved ones--should not be neglected. Practical use of other identification methods faces difficulties of their own (e.g., odontology--lack of regular dental registration system and compatible database). Two examples of forensic anthropological work of mass graves, even when the results were much influenced by the questions raised by investigators, can serve as an illustration of the above-mentioned issues.

  19. Forensic anthropology in Europe: an assessment of current status and application.

    Science.gov (United States)

    Kranioti, Elena; Paine, Robert

    2011-01-01

    Forensic anthropology is the discipline that traditionally deals with the examination of human remains for legal purposes and it derives from the fields of anatomy, physical anthropology and forensic medicine. For more than a century, forensic anthropologists in the United States have been offering their services in the court of law complementing the medico-legal investigation of other forensic professionals. The current status in European countries is presented here. The development of forensic anthropology varies significantly among the countries of Europe. Whereas some countries show a long history of research activity in the forensic sciences, including forensic anthropology (i.e. France, Germany and Spain), others are exhibiting a recent, rapid development (i.e. United Kingdom). In some cases, forensic anthropologists are employed within the academic realm (i.e. U.K., Denmark, Portugal, Turkey), forensic institutions (Netherlands) or government organizations (Spain, Hungary), although the vast majority of them remain limited to freelance activities on a sporadic basis. Often, European scientists that deal with skeletal remains come from nonphysical anthropology disciplines such as archaeology, forensic medicine and biology. In many cases they do not have adequate training equivalent to the forensic anthropologists in the USA. Naturally, without common training and a common legal system, an accreditation system for Europe will be difficult to implement.

  20. Nuclear forensics: Soil content

    International Nuclear Information System (INIS)

    Beebe, Merilyn Amy

    2015-01-01

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  1. Nuclear forensics: Soil content

    Energy Technology Data Exchange (ETDEWEB)

    Beebe, Merilyn Amy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-31

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  2. Macromodels of digital integrated circuits for program packages of circuit engineering design

    Science.gov (United States)

    Petrenko, A. I.; Sliusar, P. B.; Timchenko, A. P.

    1984-04-01

    Various aspects of the generation of macromodels of digital integrated circuits are examined, and their effective application in program packages of circuit engineering design is considered. Three levels of macromodels are identified, and the application of such models to the simulation of circuit outputs is discussed.

  3. Forensic geotechnical engineering

    CERN Document Server

    Babu, GL

    2016-01-01

    In this edited volume on advances in forensic geotechnical engineering, a number of technical contributions by experts and professionals in this area are included. The work is the outcome of deliberations at various conferences in the area conducted by Prof. G.L. Sivakumar Babu and Dr. V.V.S. Rao as secretary and Chairman of Technical Committee on Forensic Geotechnical Engineering of International Society for Soil Mechanics and Foundation Engineering (ISSMGE). This volume contains papers on topics such as guidelines, evidence/data collection, distress characterization, use of diagnostic tests (laboratory and field tests), back analysis, failure hypothesis formulation, role of instrumentation and sensor-based technologies, risk analysis, technical shortcomings. This volume will prove useful to researchers and practitioners alike.

  4. Role of dental expert in forensic odontology

    Science.gov (United States)

    Verma, Anoop K.; Kumar, Sachil; Rathore, Shiuli; Pandey, Abhishek

    2014-01-01

    Forensic dentistry has become an integral part of forensic science over the past 100 years that utilizes dental or oro-facial findings to serve the judicial system. This has been due to the dedication of people like Gustafson's, Keiser-Nielson, and Suzuki for this field. They established the essential role which forensic dentistry plays mainly in the identification of human remains. The tooth has been used as weapons and under certain circumstances, may leave information about the identity of the biter. Dental professionals have a major role to play in keeping accurate dental records and providing all necessary information so that legal authorities may recognize mal practice, negligence, fraud or abuse, and identity of unknown individuals. This paper will try to summarize the various roles of dental experts in forensic medicine. PMID:25298709

  5. WHATSAPP FORENSICS PADA ANDROID SMARTPHONE : A SURVEY

    Directory of Open Access Journals (Sweden)

    Zulkarnaen Akbar

    2016-12-01

    Full Text Available Salah satu applikasi jejaring sosial yang sangat populer saat ini adalah WhatsApp. Hampir seluruh pengguna smartphone menggunakan applikasi ini sebagai media komunikasi. Berbagai macam perkembangan atau fitur baru telah banyak ditambahkan pengembang sebagai fasilitas yang dapat memanjakan para pengguna. Peranan sistem keamanan tentunya sangat penting untuk menunjang keamanan privasi para pengguna agar kerahasiaan tetap terjaga. Beberapa peneliti telah banyak melakukan experimen mobile forensics untuk mendapatkan berbagai informasi dari para pengguna WhatsApp. Pada paper ini membahas survey berbagai metoda dari berbagai para peneliti WhatsApp forensics. Dalam sebuah proses mobile metoda yang digunakan dalam proses forensics antara lain menggunakan internet protocol dan live memory. Untuk proses mobile forensics khususnya pada applikasi WhatsApp dapat dilakukan dengan menggunakan metoda tersebut untuk memperoleh data informasi yang dibutuhkan.

  6. Routine outcome monitoring and clinical decision-making in forensic psychiatry based on the Instrument for Forensic Treatment Evaluation

    NARCIS (Netherlands)

    van der Veeken, F.C.A.; Lucieer, Jacques; Bogaerts, S.

    2016-01-01

    Background Rehabilitation in forensic psychiatry is achieved gradually with different leave modules, in line with the Risk Need Responsivity model. A forensic routine outcome monitoring tool should measure treatment progress based on the rehabilitation theory, and it should be predictive of

  7. Three-dimensional computer visualization of forensic pathology data.

    Science.gov (United States)

    March, Jack; Schofield, Damian; Evison, Martin; Woodford, Noel

    2004-03-01

    Despite a decade of use in US courtrooms, it is only recently that forensic computer animations have become an increasingly important form of communication in legal spheres within the United Kingdom. Aims Research at the University of Nottingham has been influential in the critical investigation of forensic computer graphics reconstruction methodologies and techniques and in raising the profile of this novel form of data visualization within the United Kingdom. The case study presented demonstrates research undertaken by Aims Research and the Department of Forensic Pathology at the University of Sheffield, which aims to apply, evaluate, and develop novel 3-dimensional computer graphics (CG) visualization and virtual reality (VR) techniques in the presentation and investigation of forensic information concerning the human body. The inclusion of such visualizations within other CG or VR environments may ultimately provide the potential for alternative exploratory directions, processes, and results within forensic pathology investigations.

  8. Light Water Reactor Sustainability Program: Digital Architecture Project Plan

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    There are many technologies available to the nuclear power industry to improve efficiency in plant work activities. These range from new control room technologies to those for mobile field workers. They can make a positive impact on a wide range of performance objectives – increase in productivity, human error reduction, validation of results, accurate transfer of data, and elimination of repetitive tasks. It is expected that the industry will more and more turn to these technologies to achieve these operational efficiencies to lower costs. At the same time, this will help utilities manage a looming staffing problem as the inevitable retirement wave of the more seasoned workers affects both staffing levels and knowledge retention. A barrier to this wide-scale implementation of new technologies for operational efficiency is the lack of a comprehensive digital architecture that can support the real-time information exchanges needed to achieve the desired operational efficiencies. This project will define an advanced digital architecture that will accommodate the entire range of system, process, and plant worker activity to enable the highest degree of integration, thereby creating maximum efficiency and productivity. This pilot project will consider a range of open standards that are suitable for the various data and communication requirements of a seamless digital environment. It will map these standards into an overall architecture to support the II&C developments of this research program.

  9. Psychological effects of violence on forensic nurses.

    Science.gov (United States)

    Zimmer, Katherine K; Cabelus, Nancy B

    2003-11-01

    1. Forensic nurses frequently work in violent settings without regard for self-preservation to save the lives of injured individuals or investigate the deaths of deceased individuals. 2. Cases involving children and victims with disfiguring injuries, and incidents when their personal safety was compromised are most disturbing to forensic nurses. 3. Providing means for health care professionals to cope appropriately encourages healthy healing. 4. Forensic nurses must learn to self-assess and recognize the signs and symptoms associated with unhealthy coping, depression, or posttraumatic stress disorder.

  10. Forensic Physics 101: Falls from a height

    Science.gov (United States)

    Cross, Rod

    2008-09-01

    The physics of falling from a height, a topic that could be included in a course on forensic physics or in an undergraduate class as an example of Newton's laws, is applied to a common forensic problem.

  11. Oral Pathology in Forensic Investigation.

    Science.gov (United States)

    Shamim, Thorakkal

    2018-01-01

    Forensic odontology is the subdiscipline of dentistry which analyses dental evidence in the interest of justice. Oral pathology is the subdiscipline of dentistry that deals with the pathology affecting the oral and maxillofacial regions. This subdiscipline is utilized for identification through oral and maxillofacial pathologies with associated syndromes, enamel rod patterns, sex determination using exfoliative cytology, identification from occlusal morphology of teeth, and deoxyribonucleic acid profiling from teeth. This subdiscipline is also utilized for age estimation studies which include Gustafson's method, incremental lines of Retzius, perikymata, natal line formation in teeth, neonatal line, racemization of collagen in dentin, cemental incremental lines, thickness of the cementum, and translucency of dentin. Even though the expertise of an oral pathologist is not taken in forensic investigations, this paper aims to discuss the role of oral pathology in forensic investigation.

  12. Educating Jurors about Forensic Evidence: Using an Expert Witness and Judicial Instructions to Mitigate the Impact of Invalid Forensic Science Testimony.

    Science.gov (United States)

    Eastwood, Joseph; Caldwell, Jiana

    2015-11-01

    Invalid expert witness testimony that overstated the precision and accuracy of forensic science procedures has been highlighted as a common factor in many wrongful conviction cases. This study assessed the ability of an opposing expert witness and judicial instructions to mitigate the impact of invalid forensic science testimony. Participants (N = 155) acted as mock jurors in a sexual assault trial that contained both invalid forensic testimony regarding hair comparison evidence, and countering testimony from either a defense expert witness or judicial instructions. Results showed that the defense expert witness was successful in educating jurors regarding limitations in the initial expert's conclusions, leading to a greater number of not-guilty verdicts. The judicial instructions were shown to have no impact on verdict decisions. These findings suggest that providing opposing expert witnesses may be an effective safeguard against invalid forensic testimony in criminal trials. © 2015 American Academy of Forensic Sciences.

  13. Forensic entomology: implementing quality assurance for expertise work.

    Science.gov (United States)

    Gaudry, Emmanuel; Dourel, Laurent

    2013-09-01

    The Department of Forensic Entomology (Institut de Recherche Criminelle de la Gendarmerie Nationale, France) was accredited by the French Committee of Accreditation (Cofrac's Healthcare section) in October 2007 on the basis of NF EN ISO/CEI 17025 standard. It was the first accreditation in this specific field of forensic sciences in France and in Europe. The present paper introduces the accreditation process in forensic entomology (FE) through the experience of the Department of Forensic Entomology. Based upon the identification of necrophagous insects and the study of their biology, FE must, as any other expertise work in forensic sciences, demonstrate integrity and good working practice to satisfy both the courts and the scientific community. FE does not, strictly speaking, follow an analytical method. This could explain why, to make up for a lack of appropriate quality reference, a specific documentation was drafted and written by the staff of the Department of Forensic Entomology in order to define working methods complying with quality standards (testing methods). A quality assurance system is laborious to set up and maintain and can be perceived as complex, time-consuming and never-ending. However, a survey performed in 2011 revealed that the accreditation process in the frame of expertise work has led to new well-defined working habits, based on an effort at transparency. It also requires constant questioning and a proactive approach, both profitable for customers (magistrates, investigators) and analysts (forensic entomologists).

  14. Development of a clinical forensic medicine curriculum for emergency physicians in the USA.

    Science.gov (United States)

    Smock, W S

    1994-06-01

    To address the forensic needs of living patients, the Department of Emergency Medicine at the University of Louisville School of Medicine in Louisville, Kentucky, USA initiated the first clinical forensic medicine training programme in the USA. In July 1991, formal training in clinical forensic medicine was incorporated into the core curriculum of the USA's second oldest academic emergency medicine training programme. The University of Louisville, in cooperation with the Kentucky Medical Examiner's Office, developed the curriculum to provide the emergency physician with the knowledge base and technical skills to perform forensic evaluations of living patients. Forensic lectures are given monthly by local and regional forensic experts including: forensic pathologists, prosecuting attorneys, firearm and ballistics examiners, law enforcement officers, forensic chemists and forensic odontologists. Topics which are presented include: forensic pathology, forensic photography, ballistics and firearms analysis, paediatric physical and sexual assault, crime scene investigation, forensic odontology, courtroom and expert testimony and the forensic evaluation of penetrating trauma. As a result of the introduction of clinical forensic medicine into the core curriculum of an emergency medicine training programme the residents are now actively addressing the forensic issues encountered in the Emergency department. Key, often short-lived forensic evidence, which was frequently overlooked or discarded while delivering patient care is now recognized, documented and preserved. The development and introduction of a clinical forensic medicine curriculum into emergency medicine training has greatly enhanced the emergency physician's ability to recognize, document and address the forensic needs of their patients who are victims of violent and non-fatal trauma.

  15. Optimising crime scene temperature collection for forensic entomology casework.

    Science.gov (United States)

    Hofer, Ines M J; Hart, Andrew J; Martín-Vega, Daniel; Hall, Martin J R

    2017-01-01

    The value of minimum post-mortem interval (minPMI) estimations in suspicious death investigations from insect evidence using temperature modelling is indisputable. In order to investigate the reliability of the collected temperature data used for modelling minPMI, it is necessary to study the effects of data logger location on the accuracy and precision of measurements. Digital data logging devices are the most commonly used temperature measuring devices in forensic entomology, however, the relationship between ambient temperatures (measured by loggers) and body temperatures has been little studied. The placement of loggers in this study in three locations (two outdoors, one indoors) had measurable effects when compared with actual body temperature measurements (simulated with pig heads), some more significant than others depending on season, exposure to the environment and logger location. Overall, the study demonstrated the complexity of the question of optimal logger placement at a crime scene and the potential impact of inaccurate temperature data on minPMI estimations, showing the importance of further research in this area and development of a standard protocol. Initial recommendations are provided for data logger placement (within a Stevenson Screen where practical), situations to avoid (e.g. placement of logger in front of windows when measuring indoor temperatures), and a baseline for further research into producing standard guidelines for logger placement, to increase the accuracy of minPMI estimations and, thereby, the reliability of forensic entomology evidence in court. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. Drawbacks in the scientification of forensic science.

    Science.gov (United States)

    Biedermann, A; Curran, J

    2014-12-01

    This letter to the Editor comments on the article On the limitations of probability in conceptualizing pattern matches in forensic science by P. T. Jayaprakash (Forensic Science International, [10]). Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. Assessment and treatment of violent forensic psychiatric patients with a conduct or an antisocial personality disorder in the Netherlands

    NARCIS (Netherlands)

    Hornsveld, R.H.J.

    2007-01-01

    Because a Dutch treatment program for so-called terbeschikkinggestelden or violent forensic psychiatric inpatients was lacking, we took to developing an Aggression Control Therapy (ACT) in 2000, which was based on Goldstein, Glick, and Gibbs' Aggression Replacement Training (ART). The ACT program

  18. Fit for purpose quality management system for military forensic exploitation.

    Science.gov (United States)

    Wilson, Lauren Elizabeth; Gahan, Michelle Elizabeth; Robertson, James; Lennard, Chris

    2018-03-01

    In a previous publication we described a systems approach to forensic science applied in the military domain. The forensic science 'system of systems' describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military systems, with quality management being an important supporting system. Quality management systems help to ensure that organisations achieve their objective and continually improve their capability. Components of forensic science quality management systems can include standardisation of processes, accreditation of facilities to national/international standards, and certification of personnel. A fit for purpose quality management system should be balanced to allow organisations to meet objectives, provide continuous improvement; mitigate risk; and impart a positive quality culture. Considerable attention over the last decades has been given to the need for forensic science quality management systems to meet criminal justice and law enforcement objectives. More recently, the need for the forensic quality management systems to meet forensic intelligence objectives has been considered. This paper, for the first time, discusses the need for a fit for purpose quality management system for military forensic exploitation. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  19. Forensic Learning Disability Nursing Role Analysis

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne; Melling, Kat

    2011-01-01

    This article reports on a study carried out on the role constructs of forensic and nonforensic Learning Disability Nursing in relation to six binary themes. The aims were to identify if there were differences in perceptions of forensic learning disability nurses and nonforensic learning disability nurses in relation to the six binary themes of the…

  20. Midwest Forensics Resource Center Project Summary June 2005

    Energy Technology Data Exchange (ETDEWEB)

    David Baldwin

    2005-06-01

    The mission of the MFRC Research and Development Program, is to provide technological advances in forensic science for the benefit of our regional partners as well as the forensic community at large. Key areas of forensic science need are identified through our interactions with our Midwest partners and our R&D advisory group, as well as through our participation in national meetings in forensic science. Under the sponsorship of the National Institute of Justice, the MFRC solicits proposals for the development of practical and useful technology, instrumentation, and methodology that address needs in areas related to forensic science and its application to operational crime laboratories. The MFRC facilitates proposal development by working to establish partnerships between researchers and our regional partners. The MFRC administers a peer-review of the proposals and then funds the selected projects at a cost of approximately $55,000 each, with a 12-month period of performance. The process for selection of these projects includes the following steps: (1) drafting of a call for proposals by MFRC staff, (2) review of the draft call by members of the R&D advisory committee, (3) review and approval of the call by NIJ, (4) issuance of the call to ISU, Ames Laboratory, regional partners, and research organizations, (5) receipt of proposals, (6) review of proposals by R&D advisory committee, (7) ranking and selection by MFRC staff using advisory committee reviews, with concurrence by NIJ, (8) notification of proposers, (9) receipt and review of progress reports by MFRC, (10) receipt and review of final reports by MFRC, R&D advisory committee, and NIJ. The decision to fund any specific project is based upon a peer-reviewed call-for-proposal system administered by the MFRC. The reviewers are crime laboratory specialists and scientists who are asked to rate the proposals on four criteria areas including: (1) relevance to the mission of the MFRC, (2) technical approach and

  1. Aggression Replacement Training for Violent Young Men in a Forensic Psychiatric Outpatient Clinic

    NARCIS (Netherlands)

    Hornsveld, R.H.; Kraaimaat, F.W.; Muris, P.; Zwets, A.J.; Kanters, T.

    2015-01-01

    The effects of Aggression Replacement Training (ART) were explored in a group of Dutch violent young men aged 16 to 21 years, who were obliged by the court to follow a treatment program in a forensic psychiatric outpatient clinic. To evaluate the training, patients completed a set of self-report

  2. Personalized Medicine Applied to Forensic Sciences: New Advances and Perspectives for a Tailored Forensic Approach.

    Science.gov (United States)

    Santurro, Alessandro; Vullo, Anna Maria; Borro, Marina; Gentile, Giovanna; La Russa, Raffaele; Simmaco, Maurizio; Frati, Paola; Fineschi, Vittorio

    2017-01-01

    Personalized medicine (PM), included in P5 medicine (Personalized, Predictive, Preventive, Participative and Precision medicine) is an innovative approach to the patient, emerging from the need to tailor and to fit the profile of each individual. PM promises to dramatically impact also on forensic sciences and justice system in ways we are only beginning to understand. The application of omics (genomic, transcriptomics, epigenetics/imprintomics, proteomic and metabolomics) is ever more fundamental in the so called "molecular autopsy". Emerging fields of interest in forensic pathology are represented by diagnosis and detection of predisposing conditions to fatal thromboembolic and hypertensive events, determination of genetic variants related to sudden death, such as congenital long QT syndromes, demonstration of lesions vitality, identification of biological matrices and species diagnosis of a forensic trace on crime scenes without destruction of the DNA. The aim of this paper is to describe the state-of-art in the application of personalized medicine in forensic sciences, to understand the possibilities of integration in routine investigation of these procedures with classical post-mortem studies and to underline the importance of these new updates in medical examiners' armamentarium in determining cause of death or contributing factors to death. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  3. Ethical issues across different fields of forensic science.

    Science.gov (United States)

    Yadav, Praveen Kumar

    2017-01-01

    Many commentators have acknowledged the fact that the usual courtroom maxim to "tell the truth, the whole truth, and nothing but the truth" is not so easy to apply in practicality. In any given situation, what does the whole truth include? In case, the whole truth includes all the possible alternatives for a given situation, what should a forensic expert witness do when an important question is not asked by the prosecutor? Does the obligation to tell the whole truth mean that all possible, all probable, all reasonably probable, all highly probable, or only the most probable alternatives must be given in response to a question? In this paper, an attempt has been made to review the various ethical issues in different fields of forensic science, forensic psychology, and forensic DNA databases. Some of the ethical issues are common to all fields whereas some are field specific. These ethical issues are mandatory for ensuring high levels of reliability and credibility of forensic scientists.

  4. Defense Forensic Enterprise: Assessment and Status Report Personnel Accounting Extract

    Science.gov (United States)

    2013-12-01

    pathology , forensic anthropology, forensic toxicology, and DNA analysis to iden- tify human remains. Per DOD Directive 5205.15E, the stakeholders fall...Defense Forensic Enterprise Assessment and Status Report Personnel Accounting Extract Christine A. Hughes • Jeffrey E. Chilton John J. Clifford • C...community-related sections from a CNA report titled, “Defense Forensic Enterprise Assessment and Status Report” [1]. The first sec- tion within this

  5. Emerging trends in forensic science with special emphasis on nuclear and radiochemistry

    International Nuclear Information System (INIS)

    Krishnamurthy, Rukmani

    2011-01-01

    Forensic science uses the basic principles of all physical and natural science and have evolved many domain of its owns, like Anthropometry, fingerprint, Foot print, ballistics, documentation, Forensic Biology and Serology, Forensic Chemistry, Nuclear forensic science, Forensic Physic, Toxicology, Odontology, Forensic DNA, Cyber Forensic, Forensic Psychology, Forensic engineering etc., which provides a fool prove scientific aid to criminal justice administration. Nuclear forensic science is a fairly young discipline and only a small number of laboratories are active practitioners. However, the number of incidents of illicit trafficking reported and furthermore, the threat of nuclear terrorism calls for preparedness and for effective tools providing hints on the origin of the material and thus on the perpetrator. The determination of characteristic parameters is subject to ongoing research and development work in a number of nuclear measurement laboratories. Parameters like isotopic composition, chemical impurities, age of the material, macroscopic parameters and microstructure provide clues on the origin and on the intended use of the material. Today, nuclear forensics has reached a high degree of maturity and it is highly relevant in the areas of non-proliferation and of nuclear security. Continued development activities and strengthened international cooperation will be of key importance for the perfection of the discipline of nuclear forensics

  6. Impact of digitalization of mammographic units on average glandular doses in the Flemish Breast Cancer Screening Program

    OpenAIRE

    De Hauwere, An; Thierens, Hubert

    2012-01-01

    The impact of digitalization on the average glandular doses in 49 mammographic units participating in the Flemish Breast Cancer Screening Program was studied. Screen-film was changed to direct digital radiography and computed radiography in 25 and 24 departments respectively. Average glandular doses were calculated before and after digitalization for different PMMA-phantom thicknesses and for groups of 50 successive patients. For the transition from screen-film to computed radiography both ph...

  7. Alexithymia as a potential source of symptom over-reporting: An exploratory study in forensic patients and non-forensic participants.

    Science.gov (United States)

    Merckelbach, Harald; Prins, Chinouk; Boskovic, Irena; Niesten, Isabella; À Campo, Joost

    2018-04-01

    The traditional interpretation of symptom over-reporting is that it indicates malingering. We explored a different perspective, namely that over-reporting of eccentric symptoms is related to deficits in articulating internal experiences (i.e., alexithymia). Given that alexithymia has been linked to sleep problems and that fatigue may fuel inattentive responding to symptom lists, we administered measures of alexithymia (TAS-20) and symptom over-reporting (SIMS), but also sleep quality (SLEEP-50) to forensic psychiatric outpatients (n = 40) and non-forensic participants (n = 40). Forensic patients scored significantly higher on all three indices than non-forensic participants. In the total sample as well as in subsamples, over-reporting correlated positively and significantly with alexithymia, with rs being in the 0.50-0.65 range. Sleep problems were also related to over-reporting, but in the full sample and in the forensic subsample, alexithymia predicted variance in over-reporting over and above sleep problems. Although our study is cross-sectional in nature, its results indicate that alexithymia as a potential source of over-reporting merits systematic research. © 2018 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  8. Forensic psychiatry and the internet: practical perspectives on sexual predators and obsessional harassers in cyberspace.

    Science.gov (United States)

    McGrath, Michael G; Casey, Eoghan

    2002-01-01

    The growth of the Internet has revolutionized how society conducts business in many areas. Not to be left behind, the sexual predator and the obsessional harasser have found cyberspace to be a vehicle capable of meeting their needs: obtaining information, monitoring and contacting victims, developing fantasy, overcoming inhibitions, avoiding apprehension, and communicating with other offenders. Although clearly disparate offender categories, these two groups are included in this article because of the likelihood of their using the Internet in pursuit of their goals. Forensic psychiatrists should become familiar with computers and the Internet so that they can conduct relevant psychiatric evaluations of such individuals and can advise attorneys, victims, and law enforcement personnel competently, when retained in that capacity. This article discusses the Internet and its use by the sexual predator and the obsessional harasser, highlighting information of interest to the forensic psychiatrist, including the poorly understood field of digital evidence. Aspects of the Internet, such as on-line dating and cybersex also are covered, because they relate to sexual predation and stalking.

  9. Basic research in evolution and ecology enhances forensics.

    Science.gov (United States)

    Tomberlin, Jeffery K; Benbow, M Eric; Tarone, Aaron M; Mohr, Rachel M

    2011-02-01

    In 2009, the National Research Council recommended that the forensic sciences strengthen their grounding in basic empirical research to mitigate against criticism and improve accuracy and reliability. For DNA-based identification, this goal was achieved under the guidance of the population genetics community. This effort resulted in DNA analysis becoming the 'gold standard' of the forensic sciences. Elsewhere, we proposed a framework for streamlining research in decomposition ecology, which promotes quantitative approaches to collecting and applying data to forensic investigations involving decomposing human remains. To extend the ecological aspects of this approach, this review focuses on forensic entomology, although the framework can be extended to other areas of decomposition. Published by Elsevier Ltd.

  10. Influence of Music Therapy on Coping Skills and Anger Management in Forensic Psychiatric Patients: An Exploratory Study.

    Science.gov (United States)

    Hakvoort, Laurien; Bogaerts, Stefan; Thaut, Michael H; Spreen, Marinus

    2015-07-01

    The effect of music therapy on anger management and coping skills is an innovative subject in the field of forensic psychiatry. This study explores the following research question: Can music therapy treatment contribute to positive changes in coping skills, anger management, and dysfunctional behavior of forensic psychiatric patients? To investigate this question, first a literature review is offered on music therapy and anger management in forensic psychiatry. Then, an explorative study is presented. In the study, a pre- and post-test design was used with a random assignment of patients to either treatment or control condition. Fourteen participants' complete datasets were collected. All participants received "treatment as usual." Nine of the participants received a standardized, music therapy anger management program; the five controls received, unplanned, an aggression management program. Results suggested that anger management skills improved for all participants. The improvement of positive coping skills and diminishing of avoidance as a coping skill were measured to show greater changes in music therapy participants. When controlling for the exact number of treatment hours, the outcomes suggested that music therapy might accelerate the process of behavioral changes. © The Author(s) 2013.

  11. Radiochronology in nuclear forensics

    International Nuclear Information System (INIS)

    Alamelu, D.

    2016-01-01

    Nuclear forensics corresponds to the forensic analysis of nuclear materials. The samples analysed may either be those that are confiscated during any act of smuggling or that is retrieved from a postexplosion debris. The characterisation of the material is based on the isotopic composition, physical and chemical compositions, age and history of the material which are determined by suitable analytical techniques. The interpretation of the analytical results is necessary to understand the details of the material such as its provenance, the industrial history of the material as well as the implications of the probable use of the material

  12. Accuracy Rates of Sex Estimation by Forensic Anthropologists through Comparison with DNA Typing Results in Forensic Casework.

    Science.gov (United States)

    Thomas, Richard M; Parks, Connie L; Richard, Adam H

    2016-09-01

    A common task in forensic anthropology involves the estimation of the biological sex of a decedent by exploiting the sexual dimorphism between males and females. Estimation methods are often based on analysis of skeletal collections of known sex and most include a research-based accuracy rate. However, the accuracy rates of sex estimation methods in actual forensic casework have rarely been studied. This article uses sex determinations based on DNA results from 360 forensic cases to develop accuracy rates for sex estimations conducted by forensic anthropologists. The overall rate of correct sex estimation from these cases is 94.7% with increasing accuracy rates as more skeletal material is available for analysis and as the education level and certification of the examiner increases. Nine of 19 incorrect assessments resulted from cases in which one skeletal element was available, suggesting that the use of an "undetermined" result may be more appropriate for these cases. Published 2016. This article is a U.S. Government work and is in the public domain in the USA.

  13. Documentation and analysis of traumatic injuries in clinical forensic medicine involving structured light three-dimensional surface scanning versus photography.

    Science.gov (United States)

    Shamata, Awatif; Thompson, Tim

    2018-05-10

    Non-contact three-dimensional (3D) surface scanning has been applied in forensic medicine and has been shown to mitigate shortcoming of traditional documentation methods. The aim of this paper is to assess the efficiency of structured light 3D surface scanning in recording traumatic injuries of live cases in clinical forensic medicine. The work was conducted in Medico-Legal Centre in Benghazi, Libya. A structured light 3D surface scanner and ordinary digital camera with close-up lens were used to record the injuries and to have 3D and two-dimensional (2D) documents of the same traumas. Two different types of comparison were performed. Firstly, the 3D wound documents were compared to 2D documents based on subjective visual assessment. Additionally, 3D wound measurements were compared to conventional measurements and this was done to determine whether there was a statistical significant difference between them. For this, Friedman test was used. The study established that the 3D wound documents had extra features over the 2D documents. Moreover; the 3D scanning method was able to overcome the main deficiencies of the digital photography. No statistically significant difference was found between the 3D and conventional wound measurements. The Spearman's correlation established strong, positive correlation between the 3D and conventional measurement methods. Although, the 3D surface scanning of the injuries of the live subjects faced some difficulties, the 3D results were appreciated, the validity of 3D measurements based on the structured light 3D scanning was established. Further work will be achieved in forensic pathology to scan open injuries with depth information. Crown Copyright © 2018. Published by Elsevier Ltd. All rights reserved.

  14. Opportunities to preserve forensic evidence in emergency departments.

    Science.gov (United States)

    Peel, Matthew

    2016-11-10

    Victims of violence often seek assistance from emergency departments, so emergency nurses are ideally placed to identify them, and other 'forensic' patients, and protect the evidence that could support any ensuing legal process. Emergency nurses who are trained to identify, collect and preserve forensic evidence can support the identification, elimination and prosecution of suspects. This article gives an overview of forensic evidence, and explains how emergency nurses can preserve and collect samples effectively.

  15. [Professor Kazimierz Jaegermann--forensic pathologist--scientist--thinker].

    Science.gov (United States)

    Nasiłowski, Władysław

    2009-01-01

    Professor Kazimierz Jaegermann, a founder of the theory of medico-legal opinionating, passed away 20 years ago. Numerous specialists in forensic medicine and an ever increasing number of lawyers substantiate the importance and value of the creative thought and the entire research work of Professor Jaegermann that have been an inspiration of progress in forensic medicine and in the science of applied law. His unique ability to perform a scientific synthesis leading to recognizing forensic medicine as an applied bridging knowledge points to the eminently creative role played by Professor Jaegermann in development of forensic medicine. There is an urgent need to recall his research activities and to publish a complete collection of his articles and publications. With this idea in mind, I present below an article based on the text published in No. 1 of the Zeszyty Naukowe Katedry Medycyny Sadowej Slaskiej Akademii Medycznej in 1995.

  16. PIXE and ion beam analysis in forensics

    International Nuclear Information System (INIS)

    Bailey, Melanie; Warmenhoven, John; Chrislopher, Matt; Kirkby, Karen; Palitsin, Vladimir; Grime, Geoff; Jeynes, Chris; Jones, Brian; Wenn, Roger

    2013-01-01

    Full text: University of Surrey has, for the past four years, collaborated with police institutions from across Europe and the rest of the world lo scope potential applications of ion beam analysis (IBA) in forensic science. In doing this we have consulted practitioners across a range of forensic disciplines, and critically compared IBA with conventional characterisation techniques to investigate the areas in which IBA can add evidential value. In this talk, the results of this feasibility study will be presented, showing the types of sample for which IBA shows considerable promise. We will show how a combination of PIXE with other IBA techniques (EBS, PIGE, MeV-SIMS) can be used to give unprecedented characterisation of forensic samples and comment on the significance of these results for forensic casework. We will also show cases where IBA not appear to add any significant improvement over conventional techniques. (author)

  17. Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations.

    Science.gov (United States)

    Keegan, Elizabeth; Kristo, Michael J; Toole, Kaitlyn; Kips, Ruth; Young, Emma

    2016-02-02

    Nuclear forensic science, or "nuclear forensic", aims to answer questions about nuclear material found outside of regulatory control. In this Feature, we provide a general overview of nuclear forensics, selecting examples of key "nuclear forensic signatures" which have allowed investigators to determine the identity of unknown nuclear material in real investigations.

  18. Basic digital signal processing

    CERN Document Server

    Lockhart, Gordon B

    1985-01-01

    Basic Digital Signal Processing describes the principles of digital signal processing and experiments with BASIC programs involving the fast Fourier theorem (FFT). The book reviews the fundamentals of the BASIC program, continuous and discrete time signals including analog signals, Fourier analysis, discrete Fourier transform, signal energy, power. The text also explains digital signal processing involving digital filters, linear time-variant systems, discrete time unit impulse, discrete-time convolution, and the alternative structure for second order infinite impulse response (IIR) sections.

  19. The evaluation of forensic cases reported due to food poisoning

    Directory of Open Access Journals (Sweden)

    Beyza Urazel

    2014-03-01

    Full Text Available Objective: In this study it is aimed to examine forensic food poisoning cases and to evaluate the clinical presentation of food poisoning in people within the context of forensic medicine. Methods: In the study, 215 food poisoning cases are evaluated, which applied to the forensic medicine branch office in our city between 01.01.2007 and 31.12.2011. The forensic reports and forensic investigations of these cases are analyzed retrospectively. The cases are examined in terms of gender, age, the type of food consumed, the treatment applied and the result of the forensic report. Results: It is determined that in 83 cases (38.6% food poisoning was caused by chicken products, and in 178 cases (82.8% the poisoned people were students. In 3 cases (1.4% the poisoning was life threatening. For 75 cases (34.9% no forensic report was prepared in emergency service and among the 140 cases for which a forensic report was prepared, only 3 of the reports were prepared in a correct manner. Conclusions: It is determined that the demographic data of the cases complies with the city where the study was conducted. It is found out that in emergency services the food poisoning cases are usually misevaluated.

  20. Forensic Odontology: A Boon to Community in Medico-legal Affairs

    Directory of Open Access Journals (Sweden)

    Ramasamy Chidambaram

    2016-03-01

    Full Text Available Forensic odontology is a sub-discipline of dental science which involves the relationship between dentistry and the law. The specialty of forensic odontology is applied in radiographic investigation, human bite marks analysis, anthropologic examination and during mass disasters. Besides the fact that radiographs require pretentious laboratory, it is still claimed to be a facile, rapid, non-invasive method of age identification in the deceased. The budding DNA technology has conquered the traditional procedures and currently being contemplated as chief investigating tool in revealing the hidden mysteries of victims and suspects, especially in hopeless circumstances. Forensic odontology has played a chief role in solving cold cases and proved to be strong evidence in the court of law. Systematic collection of dental records and preservation of the same would marshal the legal officials in identification of the deceased. To serve the forensic operation and legal authorities, dental professionals need to be familiar with the basics of forensic odontology, which would create a consciousness to preserve the dental data. The aim of this paper is to emphasize the vital applications of forensic odontology in medico-legal issues. Conjointly the recent advancements applied in forensic human identification have been updated. Keywords: bite marks; dental records; forensic identification; mass disaster; medico-legal issues. | PubMed